summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--sbin/geom/class/eli/geli.811
1 files changed, 6 insertions, 5 deletions
diff --git a/sbin/geom/class/eli/geli.8 b/sbin/geom/class/eli/geli.8
index d86f527..3f1da72 100644
--- a/sbin/geom/class/eli/geli.8
+++ b/sbin/geom/class/eli/geli.8
@@ -630,12 +630,13 @@ The offset and size of the corrupted data will be printed on the console.
It is important to know against which attacks
.Nm
provides protection for your data.
-If data is modified or copied from one place on the disk
-to another,
+If data is modified in-place or copied from one place on the disk
+to another even without modification,
.Nm
-should be able to detect such a modification.
-If an attacker can remember the encrypted data, modify them and write them
-back to the same place, the modification will not be detected.
+should be able to detect such a change.
+If an attacker can remember the encrypted data, he can overwrite any future
+changes with the data he owns without notice.
+In other words
.Nm
will not protect your data against replay attacks.
.Sh SEE ALSO
OpenPOWER on IntegriCloud