Red Hat DIRECTORY SERVER 8.1 - 11-01-2010 Manual de usuario Pagina 102

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 106
  • Tabla de contenidos
  • SOLUCIÓN DE PROBLEMAS
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 101
It is also worth noting that a technically skilled intruder having physical access
to a turned-off computer could infect it, leaving no traces, by replacing the
bootloader with an infected one (evil maid attack).
12.3. Keeping your key pair in a safer place
To increase the security of your secret key you may decide to store your key
pair in a different location than the default directory chosen by GnuPG, which
for Windows is C:\Documents and Settings\your_username\
Application Data\GnuPG in the local machine.
The easier solution is to keep the GnuPG files in an external USB drive, or an
encrypted volume in the local hard disk. A more complex solution involves the
use of a smart card.
12.3.1. External USB drive
First, mount the external drive and move there all GnuPG files (your keyring, the
random seed file, and configuration files) that were contained in the default
directory. The mailclient must not be running while you move the files.
Then, you must tell GnuPG where the new location is, by passing the additional
parameter --homedir new_location to the GnuPG executable. This is
done directly inside the OpenPGP Preferences, via the menu command
OpenPGP → Preferences → Advanced, in the field Additional parameters for
GnuPG. How to do this was explained in Section 9.1.4.
For instance, the figure at page 72 shows Enigmail configured as to have
GnuPG look for the keyrings in the X:\gnupg directory.
Once you have done this, you can use Enigmail in the usual way. Remember to
have your external drive mounted before running Enigmail or GnuPG.
12.3.2. Encrypted volume
You may store the GnuPG files on, instead of an external drive, an encrypted
virtual volume in the local hard disk (or even, for extra protection, an encrypted
virtual volume on an external drive itself).
There are many on-the-fly encryption programs available, some of the most
known ones being:
PGP Whole Disk Encryption (commercial), http://www.pgp.com
TrueCrypt (open-source and free), http://www.truecrypt.org
FreeOTFE (open-source and free), http://www.freeotfe.org
The encrypted virtual volume will behave just like an external drive. Once you
have installed the encryption program of your choice, created the encrypted
virtual volume, and mounted it, do the necessary setup by following the same
steps explained in Section 12.3.1.
102
Vista de pagina 101
1 2 ... 97 98 99 100 101 102 103 104 105 106

Comentarios a estos manuales

Sin comentarios