Public key systems booting considerations
When restarting a machine after a power failure, all of the stored secret keys are lost, and no process can access secure network services, such as mounting an NFS. Root processes could continue if there were someone to enter the password that decrypts the secret key of the root user. The solution is to store the root-user decrypted secret key in a file that the key server can read.
Not all setuid subroutine calls operate correctly. For example, if a setuid subroutine is called by owner A, and owner A has not logged into the machine since it started, the subroutine cannot access any secure network services as A. However, most setuid subroutine calls are owned by the root user, and the root user secret key is always stored at startup time.