O'Reilly logo

Xen Virtualization by Prabhakar Chaganti

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

In this chapter we explored two different mechanisms for encrypting the root file systems used by Xen guest domains:

  • Device mapper encryption—A mechanism for encrypting block devices using the cryptographic API provided by the Linux kernel.
  • Device mapper encryption using LUKS—A standard format for encryption that extends dm-crypt.

In the next chapter, we will explore the options available for the migration of live Xen instances and the restoration of saved Xen domains.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required