Disk Encryption HOWTO

David Braun

2004-08-17

Revision History
Revision 1.42004-08-17Revised by: DB
bug fixes, hints toward plausible deniability and dm-crypt
Revision 1.32003-12-18Revised by: DB
added link to Diceware
Revision 1.22003-10-09Revised by: DB
added idle logout and Gentoo instructions
Revision 1.12003-09-13Revised by: DB
added step to zero out keychain
Revision 1.02003-08-28Revised by: tmm
Initial release, reviewed by LDP
Revision 0.922003-08-27Revised by: DB
first submission to LDP

A method is described for encrypting a hard disk, either in whole or in part, with the encryption key stored on an external medium for increased security.


Table of Contents
1. Introduction
1.1. Technical Summary
1.2. Copyright and License
1.3. Disclaimer
1.4. Acknowledgments
1.5. Feedback
1.6. Approaches
1.7. Threat Model
1.8. Caveats
1.9. Requirements
1.10. Looking to the Future
2. Procedure
2.1. Prepare the Keychain
2.2. Prepare the Asset
2.3. Scripts
2.4. Testing and Backup
2.5. Rescue Disk
2.6. Installing Linux
3. More Information
Glossary
A. GNU Free Documentation License
A.1. PREAMBLE
A.2. APPLICABILITY AND DEFINITIONS
A.3. VERBATIM COPYING
A.4. COPYING IN QUANTITY
A.5. MODIFICATIONS
A.6. COMBINING DOCUMENTS
A.7. COLLECTIONS OF DOCUMENTS
A.8. AGGREGATION WITH INDEPENDENT WORKS
A.9. TRANSLATION
A.10. TERMINATION
A.11. FUTURE REVISIONS OF THIS LICENSE
A.12. ADDENDUM: How to use this License for your documents