After reading this question about how often tmp is cleared, it would be best for our setup if tmp is encrypted. How do I encrypt it?
My fstab looks like this:
proc /proc proc nodev,noexec,nosuid 0 0
/dev/mapper/vg_doulos-root / ext4 errors=remount-ro 0 1
# /boot was on /dev/sda1 during installation
UUID=205a1a54-7dfa-45a6-a7e3-4a7234b3a473 /boot ext4 defaults 0 2
/dev/mapper/vg_doulos-home /home ext4 defaults 0 2
/dev/mapper/vg_doulos-tmp /tmp ext4 defaults 0 2
# swap was on /dev/sda2 during installation
#UUID=705e9f69-bf95-4d44-9119-c40076d10333 none swap sw 0 0
/dev/mapper/cryptswap1 none swap sw 0 0
crypttab:
# <target name> <source device> <key file> <options>
cryptswap1 /dev/sda2 /dev/urandom swap,cipher=aes-cbc-essiv:sha256
Is it sufficient to put something like this in crypttab?
crypttmp /dev/mapper/vg_doulos-tmp /dev/urandom
and then this to replace the tmp file entry in fstab?
/dev/mapper/crypttmp /tmp ext4 defaults 0 2
/tmp
beats most alternatives, when it comes to privacy of the files it contains.) – Eliah Kagan May 31 '12 at 08:05/tmp
stays there and can be recovered quickly and trivially. – Eliah Kagan May 31 '12 at 08:21/run
,/run/lock
, and/run/shm
listed astmpfs
filesystems (when I runmount
)./tmp
itself is just part of the/
filesystem (i.e., when I runmount | grep /tmp
, I get no output). Of course, if you did have/tmp
configured as atmpfs
ramdisk, then you wouldn't have to shred it either. (Actually, there are exploits to read from RAM pulled from a computer that was recently on. But protecting against that sort of attack involves mainly an increase in physical security.) – Eliah Kagan May 31 '12 at 08:32/tmp
atmpfs
ramdisk on your machine(s)? – Eliah Kagan May 31 '12 at 08:35