Encrypting File System Options for Mac OS X? 54
fieldmouse asks: "I recently had a laptop running Mac OS X stolen. Despite the fact that I got it back, that incident has me looking for an encrypting file system for Mac OS X; preferably one that would create a psuedo drive that I could unlock once when I log on. Anybody have any suggestions?" About 2 years ago, Ask Slashdot did the Linux version of this question. Has this gap been filled in Apple's latest OS offering?
Disk Image? (Score:5, Informative)
Use Disk Copy and stay neat (Score:5, Informative)
Now be very careful with your documents/items and always save them to the encrypted disk image.
The other benefit is that keeping all your important things on that image allows for easy backups.
Re:Use Disk Copy and stay neat (Score:1)
Re:Use Disk Copy and stay neat (Score:3, Informative)
They will be mutually incompatible. You can't use PGPDisk with Classic in X (fails to mount) and you can't use AES images in MOS9.
To convert, you'll have to copy your data out into unencrypted space via PGPDisk in MOS9, boot into X to copy your data into an AES image, and do a good wipe of your unencrypted data. The AES image can also be stored and mounted from a server, while PGPDisk didn't like that.
Re:Use Disk Copy and stay neat (Score:2, Interesting)
Re:Use Disk Copy and stay neat (Score:1)
Re:Use Disk Copy and stay neat (Score:3, Informative)
Re:Use Disk Copy and stay neat (Score:1)
hdiutil: mount: mount failed (57344).
hdiutil: mount failed - unknown error (57344)
But I've mounted the disk images numerous times from the finder.
A Simple Solution (Score:4, Informative)
Or the old fashioned way (Score:1, Informative)
Re:Or the old fashioned way (Score:1, Interesting)
Re:Or the old fashioned way (Score:1)
The real problem with this is that it's far too easy to recover the original unencrypted material if you just delete it. You also need to do a multi-pass wipe. I don't know of any tools to do this (apart from Wipe in Classic), but you could write one pretty easily.
There's also the issue of multiple concurrent login sessions, but since I assume you meant login via the GUI login pane, that's not so much of an issue (except when you try to ssh into the machine).
well (Score:1)
Re:well (Score:1)
Re:well (Score:1)
Disk Image (Score:4, Insightful)
When I'm finished, I just eject it. How secure is this? I'm not sure what function Disk Copy uses for encryption, but it is enough that if my laptop were stolen, I'd worry about the computer, not the data.
Advance Encryption Standard (AES) (Score:3, Informative)
(or you could just mod up the previous guy
Including the all important "What is the Advanced Encryption Standard (AES)?"
Crypt (Score:5, Informative)
Look at Crypt [securemac.com] using Blowfish and all that jazz.
Running Solaris as an Admin I have crypt encrypt some docs upon .login and upon .logout for some documents. Never tried it for OSX but I don't see how it should be any different other then it's going to pop up a GUI asking for your passwd.
Following the UNIX and Perl mantra, there is always another way of doing something...
Re:Crypt (Score:1)
Re:Crypt (Score:1)
that's TIMTOWDI:
There is more than one way to do it.
From the 2nd edition Camel book.
DropAES encrypt as you go (Score:1)
Disc Image (Score:1, Insightful)
CFS (Score:4, Interesting)
Get CFS here: http://www.crypto.com/software/
Disk Copy (Score:1)
also Open Firmware Password utility (Score:1)
Re:also Open Firmware Password utility (Score:5, Insightful)
The thief could very easily remove the hard drive from the computer and place it into another one to circumvent Open Firmware Passwording. Thus, in addition to Open Firmware Passwording you must also have some sort of encryption to safeguard the files on the disk.
Disk Copy with second keychain (Score:5, Informative)
I just wanted to add one point about storing your passwords that makes life even simpler. Try using Keychain Access to create a second keychain you call "secure" or something to that effect. Make this temporarily the default keychain so that when you create your disk images, you can store the passwords to this new keychain. Configure the keychain so that it will relock itself after a short period of time (say 15 minutes), then set the default back to your regular keychain.
That way, you need only enter the password once to have access to every encrypted disk image, and in my experience, by the time you're done and you unmount the volumes, everything will be locked again!
Recovering Stolen Goods (Score:2)
Show me the code (Score:2)
Depending on the level of security you're after, I recommend open source software that's been audited by lots of paranoid geeks.
--
Design + Activism [backspace.com]
Experience with the disk image solution (Score:1)
I was worried, at first, that disk images could become corrupted if something went wrong and make the entire contents unreadable. They are actually quite robust. You can even open a terminal and kill the process called hdid which will force unmount the image in the middle of a copy operation, and your data is still safe.
You can open an image from an AppleTalk server and use that to encrypt your network traffic. It works, I've checked it with a packet sniffer.
Part of the reason images are so good for backups is that they preserve the relative pointing of aliases. If you just do a finder drag-and-drop copy with a folder, any copied aliases from that folder will point to the item in the original and not the copy.
The encryption process can make use of both AltiVec (Velocity Engine) and multiple processors. With a G4, you hardly notice the processor time needed to perform the encryption/decryption.