So I've got this USB disk, and a server running backups to the USB disk.
I want:
#1: The USB disk to be encrypted, so it requires a password (NOT a certificate or keyfile, if possible) to be mounted on any other computer.
#2: The USB disk to automatically be mounted on windows startup, without a user logging in, without anyone being prompted for a password, on THIS computer.
The professional paranoids who make TrueCrypt provide me with a host of options, but unfortunately not this option. The closest they come is a System Favourite Volume, which does exactly what I want *as long as the boot disk is, itself, encrypted*. And the problem with THAT is that a reboot then requires a password in order for the machine to come back up, which is not desirable in a server machine.
So!
What other options are out there?
EDIT: There are backup programs that can write to AES256-encrypted zip files, on a nonencrypted disk. That's maybe kinda sorta good enough? But I'd rather the whole disk be garbage without a password.
I want:
#1: The USB disk to be encrypted, so it requires a password (NOT a certificate or keyfile, if possible) to be mounted on any other computer.
#2: The USB disk to automatically be mounted on windows startup, without a user logging in, without anyone being prompted for a password, on THIS computer.
The professional paranoids who make TrueCrypt provide me with a host of options, but unfortunately not this option. The closest they come is a System Favourite Volume, which does exactly what I want *as long as the boot disk is, itself, encrypted*. And the problem with THAT is that a reboot then requires a password in order for the machine to come back up, which is not desirable in a server machine.
So!
What other options are out there?
EDIT: There are backup programs that can write to AES256-encrypted zip files, on a nonencrypted disk. That's maybe kinda sorta good enough? But I'd rather the whole disk be garbage without a password.
(no subject)
Date: 2013-03-04 07:10 pm (UTC)I'm puzzled by the situation that would create this requirement, but you're probably exasperated enough about it without having to explain them again.
(no subject)
Date: 2013-03-04 07:30 pm (UTC)#2: I want a server that boots on it's own without intervention, for example from Windows Update
#3: I want to be able to take the USB disk offsite (and replace it with a second disk) to allow for offsite backups that do not compromise the contents of the backups if the disk is lost or stolen or something.
#4: I want to be able to restore those backups on a different system in case of fire, motherboard failure, explosion, Grey Goo, or moose.
(no subject)
Date: 2013-03-04 08:00 pm (UTC)I think your moose coping strategies may be inadequate.So.. write a batch/script that uses command-line Truecrypt to mount the file, then use one of the various tricks to run that script as a service so it executes before login.
(no subject)
Date: 2013-03-04 08:28 pm (UTC)Requires storing the passphrase in plain text, but we've pretty much already given up on worrying about this if the HOST machine is compromised.
(no subject)
Date: 2013-03-04 09:12 pm (UTC)I don't know if there's any intelligent way to pipe data from encrypted storage to, say, a command line. Even if there was, it would be only a provide a small obstacle to an intruder, since one could rewrite the script/alter the target file to intercept the password. But then again, if the host is compromised they don't need the password-- they can read straight off the auto-mounted disk, yes?
(no subject)
Date: 2013-03-04 09:35 pm (UTC)(no subject)
Date: 2013-03-04 11:49 pm (UTC)Obviously once you've plugged the drive physically into the machine in question, to some degree all bets are off. Still, I'd prefer a solution where you could have multiple keys allowed to decrypt the backups, and you could say "OK, still let me read the contents of the drive, but don't let the (suspected or known to be hacked) machine with this key do anything".
(no subject)
Date: 2013-03-05 02:03 am (UTC)(no subject)
Date: 2013-03-05 01:45 pm (UTC)(no subject)
Date: 2013-03-05 04:10 pm (UTC)(no subject)
Date: 2013-03-05 04:30 pm (UTC)(no subject)
Date: 2013-03-05 04:56 pm (UTC)(no subject)
Date: 2013-03-05 05:59 pm (UTC)(no subject)
Date: 2013-03-05 12:25 pm (UTC)* Because needing a specific key that cannot be reproduced if lost is less good than needing a password that can be typed in again.
* Because there's no easy way that I know of to say "any key signed by this authority is good"
And fundamentally:
* the purpose of this is not to protect the data from a hacker compromising the normal machine, it's to protect the disk itself from being read while offsite, except in the case of someone who knows the passphrase using this disk in a disaster recovery situation. The "sensitive" data is stored unencrypted on the host machine, and is available to the host machine while running. We're just trying to stick a nice big roadblock in the face of someone who steals the offsite backup disk.
(no subject)
Date: 2013-03-04 07:24 pm (UTC)(no subject)
Date: 2013-03-04 08:41 pm (UTC)(no subject)
Date: 2013-03-04 08:46 pm (UTC)(no subject)
Date: 2013-03-05 01:58 am (UTC)What is your backup software of choice - given no new hardware costs, I assume this means alternate paid backup software is out too.
(no subject)
Date: 2013-03-05 12:57 am (UTC)http://www.theverge.com/2013/3/4/4064574/nins-head-like-a-hole-mashed-with-call-me-maybe-is-perfect
(no subject)
Date: 2013-03-05 06:47 pm (UTC)Got a different link?
(no subject)
Date: 2013-03-05 08:12 pm (UTC)