Some information before asking the questions:
-> I have 192 GB of RAM (97 GB read/write speed).
-> When building ports I am building them completely in RAM.
-> Big ports take around 100 GB to build.
Back then on Linux I had directories with frequent reads/writes mounted on a RAM disk.
An example is Ryujinx (Nintendo Switch Emulator) which often compiles shader.
I had the application, configuration, share directory, game directory completely mounted on a RAM disk.
The benefit was a very smooth experience with almost no pop-ups during shader compilation.
My goal for FreeBSD is it to run the whole OS on a RAM disk.
To achieve it, I have some ideas, but I do not know how I could make them possible.
What I basically want is:
1) Having the OS itself on a drive full-disk encrypted with something equivalent to linux serpent cipher.
I know that FreeBSD has GELI/GEOM to offer, with GEOM being the stronger one ?
2) During boot I want to decrypt that device, creating a RAM disk, and copying over the files to the RAM disk, then continuing the boot process like normal.
Can I have the boot loader encrypted on a USB flash drive ?
Do I need to set some kernel options for that ?
Or do I need to set options in boot/loader.conf ?
Or do I need to compile a custom kernel ?
3) Encrypt the decrypted backup device after boot
4) Before shutting down, I want to decrypt the backup device, make a incremental backup and only backup files which have been modified, and leave the unmodified files as they are, preferably compress the whole backup.
Probably rsync would be an option to achieve such kind of backup, but tar can also help, I guess.
Tar archives can also be compressed, but I do not know whether rsync offers compression options, too.
It is probably not so easy to achieve that, but I always wanted to have a OS completely on a RAM disk.
Other benefits I see there, are:
-> If the OS ever gets infected due to some mistake by me, I can easily revert back by shutting the computer down, and just restore a copy prior to the infection.
-> The system will be a lot snappier.
-> No performance penalty due to encryption, but with all files being encrypted on the backup device.
-> I have 192 GB of RAM (97 GB read/write speed).
-> When building ports I am building them completely in RAM.
-> Big ports take around 100 GB to build.
Back then on Linux I had directories with frequent reads/writes mounted on a RAM disk.
An example is Ryujinx (Nintendo Switch Emulator) which often compiles shader.
I had the application, configuration, share directory, game directory completely mounted on a RAM disk.
The benefit was a very smooth experience with almost no pop-ups during shader compilation.
My goal for FreeBSD is it to run the whole OS on a RAM disk.
To achieve it, I have some ideas, but I do not know how I could make them possible.
What I basically want is:
1) Having the OS itself on a drive full-disk encrypted with something equivalent to linux serpent cipher.
I know that FreeBSD has GELI/GEOM to offer, with GEOM being the stronger one ?
2) During boot I want to decrypt that device, creating a RAM disk, and copying over the files to the RAM disk, then continuing the boot process like normal.
Can I have the boot loader encrypted on a USB flash drive ?
Do I need to set some kernel options for that ?
Or do I need to set options in boot/loader.conf ?
Or do I need to compile a custom kernel ?
3) Encrypt the decrypted backup device after boot
4) Before shutting down, I want to decrypt the backup device, make a incremental backup and only backup files which have been modified, and leave the unmodified files as they are, preferably compress the whole backup.
Probably rsync would be an option to achieve such kind of backup, but tar can also help, I guess.
Tar archives can also be compressed, but I do not know whether rsync offers compression options, too.
It is probably not so easy to achieve that, but I always wanted to have a OS completely on a RAM disk.
Other benefits I see there, are:
-> If the OS ever gets infected due to some mistake by me, I can easily revert back by shutting the computer down, and just restore a copy prior to the infection.
-> The system will be a lot snappier.
-> No performance penalty due to encryption, but with all files being encrypted on the backup device.