On login the home directory automatically gets decrypted. Internally, it is provided by
means of the pam module pam_mount. If you need to add an additional login method
that provides encrypted home directories, you have to add this module to the respective
configuration file in
/etc/pam.d/
. For more information see also
Chapter 2, Authen-
tication with PAM
(page 17) and the man page of
pam_mount
.
WARNING: Security Restrictions
Encrypting a user's home directory does not provide strong security from other
users. If strong security is required, the system should not be shared physically.
To enhance security, also encrypt the
swap
partition and the
/tmp
and
/var/
tmp
directories, because these may contain temporary images of critical data.
You can encrypt
swap
,
/tmp
, and
/var/tmp
with the YaST partitioner as de-
scribed in
Section 11.1.1, “Creating an Encrypted Partition during Installation”
(page 147) or
Section 11.1.3, “Creating an Encrypted File as a Container”
(page 148).
11.3 Using vi to Encrypt Single ASCII
Text Files
The disadvantage of using encrypted partitions is that while the partition is mounted,
at least
root
can access the data. To prevent this, vi can be used in encrypted mode.
Use
vi -x
filename
to edit a new file. vi prompts you to set a password, after
which it encrypts the content of the file. Whenever you access this file, vi requests the
correct password.
For even more security, you can place the encrypted text file in an encrypted partition.
This is recommended because the encryption used in vi is not very strong.
150
Security Guide
Содержание LINUX ENTERPRISE DESKTOP 11
Страница 1: ...SUSE Linux Enterprise Server www novell com 11 March 17 2009 Security Guide...
Страница 9: ...32 7 Managing Audit Event Records Using Keys 433 33 Useful Resources 435...
Страница 10: ......
Страница 29: ...Part I Authentication...
Страница 30: ......
Страница 55: ...Figure 4 2 YaST LDAP Server Configuration LDAP A Directory Service 41...
Страница 126: ......
Страница 127: ...Part II Local Security...
Страница 128: ......
Страница 158: ......
Страница 173: ...Part III Network Security...
Страница 174: ......
Страница 194: ......
Страница 197: ...Figure 16 2 Scenario 2 Figure 16 3 Scenario 3 Configuring VPN Server 183...
Страница 210: ......
Страница 228: ......
Страница 229: ...Part IV Confining Privileges with Novell AppArmor...
Страница 230: ......
Страница 274: ......
Страница 300: ......
Страница 328: ......
Страница 340: ......
Страница 342: ......
Страница 386: ......
Страница 387: ...Part V The Linux Audit Framework...
Страница 388: ......