Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
OS X Businesses Operating Systems Apple

Encrypting File System Options for Mac OS X? 54

fieldmouse asks: "I recently had a laptop running Mac OS X stolen. Despite the fact that I got it back, that incident has me looking for an encrypting file system for Mac OS X; preferably one that would create a psuedo drive that I could unlock once when I log on. Anybody have any suggestions?" About 2 years ago, Ask Slashdot did the Linux version of this question. Has this gap been filled in Apple's latest OS offering?
This discussion has been archived. No new comments can be posted.

Encrypting File System Options for Mac OS X?

Comments Filter:
  • Disk Image? (Score:5, Informative)

    by Drizzt Do'Urden ( 226671 ) on Thursday July 18, 2002 @07:42PM (#3913423) Homepage
    Create an encrypted disk image with Disk Copy, make it writable, and drop your sensitive data in it ;)
  • by Paul Burney ( 560340 ) on Thursday July 18, 2002 @07:58PM (#3913509) Homepage
    The application/system items on the drive don't need to be encrypted of course so just create a new disk image in disk copy, choosing the 128-bit AES encryption option. You will be prompted for a password to use. (Don't save it to the keychain, duh.) You will have to enter your password twice when you open the image.

    Now be very careful with your documents/items and always save them to the encrypted disk image.

    The other benefit is that keeping all your important things on that image allows for easy backups.
    • Do these AES images work with OS 9's Disk Copy? My only hesitation since I still have PGPDisk (the free version) which works between Mac OS 9 and Windows.
      • They will be mutually incompatible. You can't use PGPDisk with Classic in X (fails to mount) and you can't use AES images in MOS9.

        To convert, you'll have to copy your data out into unencrypted space via PGPDisk in MOS9, boot into X to copy your data into an AES image, and do a good wipe of your unencrypted data. The AES image can also be stored and mounted from a server, while PGPDisk didn't like that.

  • A Simple Solution (Score:4, Informative)

    by PastorOfMuppets ( 590944 ) on Thursday July 18, 2002 @08:01PM (#3913526)
    Use Disk Copy (located in the Utilities folder) to ccreate an encrypted disk image and add that image to you "Login Items" in the Login Prefrence Pane.
  • by xinu ( 64069 )
    Not that I've tried this or even really given it much thought about it. But the command line "crypt" in your .login and .logout could always crypt and decrypt your home dir. Just a thought.
  • by caveat ( 26803 )
    if there's a Linux solution, there's at least a relatively easy to create OS X solution, at least. (or does X fully support only HFS+ disks?)
    • Well, if you run a server and no carbon applications you are fine with UFS. HFS+ is still the way to go for 99% of all users though.
      • Carbon apps (at least well-written Carbon apps) work fine with UFS. I assume you meant Classic apps, which of course, can't see anything but HFS/HFS+ and certain remotely mounted volumes, and can't launch except from HFS+.
  • Disk Image (Score:4, Insightful)

    by mlknowle ( 175506 ) on Thursday July 18, 2002 @08:34PM (#3913712) Homepage Journal
    I made a 200mb disc image using Apple's (built in) Disk Copy app, and enabled the encryption options. I keep sensitive docs and client notes on it; whenever I need it, I open the disk image, type my passphrase and the disk pops up like any other removable media.

    When I'm finished, I just eject it. How secure is this? I'm not sure what function Disk Copy uses for encryption, but it is enough that if my laptop were stolen, I'd worry about the computer, not the data.
  • Crypt (Score:5, Informative)

    by xinu ( 64069 ) on Thursday July 18, 2002 @09:33PM (#3914047) Homepage Journal
    I'm going to post this again, but with a link this time.

    Look at Crypt [securemac.com] using Blowfish and all that jazz.

    Running Solaris as an Admin I have crypt encrypt some docs upon .login and upon .logout for some documents. Never tried it for OSX but I don't see how it should be any different other then it's going to pop up a GUI asking for your passwd.

    Following the UNIX and Perl mantra, there is always another way of doing something...

    • I hate to be a "meto", but I second this. Very cool app for encrypting discrete files on your Mac. It has the option of scrubbing the original file after encryption.
    • for the acronym impaired:
      that's TIMTOWDI:
      There is more than one way to do it.

      From the 2nd edition Camel book.
  • http://homepage.mac.com/hteric/FileSharing1.html Also has compression in utility. Uses built in SSL to create blowfish or triple des encrypted files. Not so elegant as the image, but more shareable.
  • Disc Image (Score:1, Insightful)

    by djupedal ( 584558 )
    ...allows encryption
  • CFS (Score:4, Interesting)

    by Anonymous Coward on Friday July 19, 2002 @01:27AM (#3914938)
    Use Matt Blaze's CFS. It supports encrypted (3DES) volumes, with timeout support among others. It's NFS loopback mount, so it will work on pretty much any UNIX -- including MacOS X and *BSD. NetBSD has TCFS which is AFAIK more tightly integrated (at VFS level).
    Get CFS here: http://www.crypto.com/software/
  • Here's another vote for Disk Copy.app. Very simple and easy to use. If you need to encrypt only a few files, try Puzzle Palace.
  • i don't personally encrypt my drive, although after reading the other replies, I may tinker with that a bit.. what i've been doing with my powerbook g4 is using Open Firmware Password which prevents booting from anything except a single designated 10.x partition. If you try to boot from another partition, CD, or external drive, you're presented with a very plain password screen with no instructions. I then have the screen saver set to require my password to get back to the finder. it's not obviously quite as secure as encrypting an entire volume, but is fairly secure..
    • If you try to boot from another partition, CD, or external drive, you're presented with a very plain password screen with no instructions. I then have the screen saver set to require my password to get back to the finder. it's not obviously quite as secure as encrypting an entire volume, but is fairly secure.
      The open firmware password method is a very useful if you are limiting physical access to the computer... however, if the computer was stolen, you don't have that sort of control.

      The thief could very easily remove the hard drive from the computer and place it into another one to circumvent Open Firmware Passwording. Thus, in addition to Open Firmware Passwording you must also have some sort of encryption to safeguard the files on the disk.

  • by ekc ( 594380 ) on Friday July 19, 2002 @12:35PM (#3917790)
    As others have mentioned, Disk Copy is definitely the way to go for creating a password-encrypted volume in Mac OS X. You can make the disk images as large as you want, they are functionally pretty much indistinguishable from normal volumes, and there's no reformatting involved.

    I just wanted to add one point about storing your passwords that makes life even simpler. Try using Keychain Access to create a second keychain you call "secure" or something to that effect. Make this temporarily the default keychain so that when you create your disk images, you can store the passwords to this new keychain. Configure the keychain so that it will relock itself after a short period of time (say 15 minutes), then set the default back to your regular keychain.

    That way, you need only enter the password once to have access to every encrypted disk image, and in my experience, by the time you're done and you unmount the volumes, everything will be locked again!
  • Nice to hear that fieldmouse's laptop was returned, but it begs the question: how did you get it back? Since you were successful in this, I'm interested in whatever actions you took beforehand/afterward which facilitated recovery. Or was it just dumb luck? Tips to help the rest of us prevent/deal with a theft?
  • For keeping your passwords safe from the average laptop thief, Disk Copy is probably fine. But for protecting your sensitive info from The Man, I'd be just a little wary of proprietary packages. Has anyone seen the source code for Disk Copy? Are you absolutely sure that there are no backdoors for law enforcement? Apple would stand up to the Feds in defense of their loyal customers, right?

    Depending on the level of security you're after, I recommend open source software that's been audited by lots of paranoid geeks.

    --
    Design + Activism [backspace.com]
  • I have been using encrypted disk images in Mac OS X for well over a year now and it works very well.

    I was worried, at first, that disk images could become corrupted if something went wrong and make the entire contents unreadable. They are actually quite robust. You can even open a terminal and kill the process called hdid which will force unmount the image in the middle of a copy operation, and your data is still safe.

    You can open an image from an AppleTalk server and use that to encrypt your network traffic. It works, I've checked it with a packet sniffer.

    Part of the reason images are so good for backups is that they preserve the relative pointing of aliases. If you just do a finder drag-and-drop copy with a folder, any copied aliases from that folder will point to the item in the original and not the copy.

    The encryption process can make use of both AltiVec (Velocity Engine) and multiple processors. With a G4, you hardly notice the processor time needed to perform the encryption/decryption.

FORTUNE'S FUN FACTS TO KNOW AND TELL: A cucumber is not a vegetable but a fruit.

Working...