11.1.4 Encrypting the Content of Removable
Media
YaST treats removable media like external hard disks or USB flash drives the same as
any other hard disk. Container files or partitions on such media can be encrypted as
described above. However, enable Do Not Mount During Booting in the Fstab Options
dialog, because removable media are usually only connected while the system is running.
If you have encrypted your removable device with YaST, the KDE and GNOME
desktops automatically recognize the encrypted partition and prompt for the password
when the device is detected. If you plug in a FAT formatted removable device while
running KDE or GNOME, the desktop user entering the password automatically becomes
the owner of the device and can read and write files. For devices with a file system
other than FAT, change the ownership explicitly for users other than
root
to enable
these users to read or write files on the device.
11.2 Using Encrypted Home
Directories
To protect data in home directories against theft and hard disk removal, use the YaST
user management module to enable encryption of home directories. You can create
encrypted home directories for new or existing users. To encrypt or decrypt home di-
rectories of already existing users, you need to know their login password. See Sec-
tion “Managing Encrypted Home Directories” (Chapter 12, Managing Users with YaST,
↑Deployment Guide) for instructions.
Encrypted home partitions are created within a file container as described in
Sec-
tion 11.1.3, “Creating an Encrypted File as a Container”
(page 148). Two files are cre-
ated under
/home
for each encrypted home directory:
LOGIN
.img
The image holding the directory
LOGIN
.key
The image key, protected with the user's login password.
Encrypting Partitions and Files
149
Содержание LINUX ENTERPRISE DESKTOP 11
Страница 1: ...SUSE Linux Enterprise Server www novell com 11 March 17 2009 Security Guide...
Страница 9: ...32 7 Managing Audit Event Records Using Keys 433 33 Useful Resources 435...
Страница 10: ......
Страница 29: ...Part I Authentication...
Страница 30: ......
Страница 55: ...Figure 4 2 YaST LDAP Server Configuration LDAP A Directory Service 41...
Страница 126: ......
Страница 127: ...Part II Local Security...
Страница 128: ......
Страница 158: ......
Страница 173: ...Part III Network Security...
Страница 174: ......
Страница 194: ......
Страница 197: ...Figure 16 2 Scenario 2 Figure 16 3 Scenario 3 Configuring VPN Server 183...
Страница 210: ......
Страница 228: ......
Страница 229: ...Part IV Confining Privileges with Novell AppArmor...
Страница 230: ......
Страница 274: ......
Страница 300: ......
Страница 328: ......
Страница 340: ......
Страница 342: ......
Страница 386: ......
Страница 387: ...Part V The Linux Audit Framework...
Страница 388: ......