Re: [Hampshire] OpenVPN + TrueCrypt

Top Page
Author: Jon Fautley
Date:  
To: hampshire
Subject: Re: [Hampshire] OpenVPN + TrueCrypt

Reply to this message
gpg: failed to create temporary file '/var/lib/lurker/.#lk0x56abe100.hantslug.org.uk.21604': Permission denied
gpg: keyblock resource '/var/lib/lurker/pubring.gpg': Permission denied
gpg: Signature made Fri Aug 14 10:35:56 2009 BST
gpg: using DSA key 9111B5743CA26D44
gpg: Can't check signature: No public key
On Fri, 14 Aug 2009 10:12:15 +0100
Stephen Nelson-Smith <sanelson@???> wrote:

> >  * udev (see /etc/udev/rules.d/*) to create your own device node
> >      (e.g. /dev/vpn-keys), identifying the device by device ID, UUID
> >      or filesystem label.
>
> This sounds like the way to do it. Thanks for the hint.


While that would solve the problem you've described, the whole solution
still smells of "doing it wrong". There are specialist USB devices out
there that are designed to hold secure certificates. You should really
be using one of those*.

Cheers,

/j
* although to be fair, I have no idea if OpenVPN would support these
  devices. I certainly hope it would, though...
-- 
Jon Fautley RHCE, RHCDS, RHCX, RHCA  email: jfautley@???
Senior Consultant                    cell :     +44 7841 558683
Global Professional Services
Red Hat UK, 200 Fowler Avenue, Farnborough, Hampshire, GU14 7JP