On 6 June 2020 06:37:23 CEST, Dale <rdalek1...@gmail.com> wrote:
>Howdy,
>
>I think I got a old 3TB hard drive to work.  After dd'ing it, redoing
>partitions and such, it seems to be working.  Right now, I'm copying a
>bunch of data to it to see how it holds up.  Oh, it's a PMR drive too. 
>lol  Once I'm pretty sure it is alive and working well, I want to play
>with encryption.  At some point, I plan to encrypt /home.  I found a
>bit
>of info with startpage but some is dated.  This is one link that seems
>to be from this year, at least updated this year. 
>
>https://linoxide.com/linux-how-to/encrypt-linux-filesystem/
>
>It seems like a nice one since it has commands and what it should look
>like when it is performing the commands.  I like knowing what I'm doing
>sort of matches what the howto shows.  It also seems to use LVM which I
>will be using as well.  I think I can follow that and get a working
>encrypted storage.  Later, I can attempt this on /home without doing it
>blind.  I also have the options in the kernel as well.  I'll post them
>at the bottom.  I enabled quite a lot a while back.  ;-) 
>
>Is this a secure method or is there a more secure way?  Is there any
>known issues with using this?  Anyone here use this method?  Keep in
>mind, LVM.  BTFRS, SP?, may come later. 
>
>One other question, can one change the password every once in a while? 
>Or once set, you stuck with it from then on? 
>
>If anyone has links to even better howtos, I'd love to check them out. 
>
>Dale
>
>:-)  :-) 
>
>
>root@fireball / # zcat /proc/config.gz | grep crypt | grep =y
>CONFIG_ARCH_HAS_MEM_ENCRYPT=y
>CONFIG_DM_CRYPT=y
>CONFIG_CRYPTO=y
>CONFIG_CRYPTO_ALGAPI=y
>CONFIG_CRYPTO_ALGAPI2=y
>CONFIG_CRYPTO_AEAD=y
>CONFIG_CRYPTO_AEAD2=y
>CONFIG_CRYPTO_SKCIPHER=y
>CONFIG_CRYPTO_SKCIPHER2=y
>CONFIG_CRYPTO_HASH=y
>CONFIG_CRYPTO_HASH2=y
>CONFIG_CRYPTO_RNG=y
>CONFIG_CRYPTO_RNG2=y
>CONFIG_CRYPTO_RNG_DEFAULT=y
>CONFIG_CRYPTO_AKCIPHER2=y
>CONFIG_CRYPTO_AKCIPHER=y
>CONFIG_CRYPTO_KPP2=y
>CONFIG_CRYPTO_ACOMP2=y
>CONFIG_CRYPTO_MANAGER=y
>CONFIG_CRYPTO_MANAGER2=y
>CONFIG_CRYPTO_MANAGER_DISABLE_TESTS=y
>CONFIG_CRYPTO_GF128MUL=y
>CONFIG_CRYPTO_NULL=y
>CONFIG_CRYPTO_NULL2=y
>CONFIG_CRYPTO_CRYPTD=y
>CONFIG_CRYPTO_AUTHENC=y
>CONFIG_CRYPTO_SIMD=y
>CONFIG_CRYPTO_GLUE_HELPER_X86=y
>CONFIG_CRYPTO_RSA=y
>CONFIG_CRYPTO_ECHAINIV=y
>CONFIG_CRYPTO_CBC=y
>CONFIG_CRYPTO_ECB=y
>CONFIG_CRYPTO_LRW=y
>CONFIG_CRYPTO_XTS=y
>CONFIG_CRYPTO_NHPOLY1305=y
>CONFIG_CRYPTO_NHPOLY1305_SSE2=y
>CONFIG_CRYPTO_NHPOLY1305_AVX2=y
>CONFIG_CRYPTO_ESSIV=y
>CONFIG_CRYPTO_HMAC=y
>CONFIG_CRYPTO_CRC32C=y
>CONFIG_CRYPTO_XXHASH=y
>CONFIG_CRYPTO_BLAKE2B=y
>CONFIG_CRYPTO_CRCT10DIF=y
>CONFIG_CRYPTO_MD5=y
>CONFIG_CRYPTO_RMD128=y
>CONFIG_CRYPTO_RMD160=y
>CONFIG_CRYPTO_RMD256=y
>CONFIG_CRYPTO_RMD320=y
>CONFIG_CRYPTO_SHA1=y
>CONFIG_CRYPTO_SHA1_SSSE3=y
>CONFIG_CRYPTO_SHA256_SSSE3=y
>CONFIG_CRYPTO_SHA512_SSSE3=y
>CONFIG_CRYPTO_SHA256=y
>CONFIG_CRYPTO_SHA512=y
>CONFIG_CRYPTO_WP512=y
>CONFIG_CRYPTO_AES=y
>CONFIG_CRYPTO_AES_TI=y
>CONFIG_CRYPTO_ARC4=y
>CONFIG_CRYPTO_BLOWFISH=y
>CONFIG_CRYPTO_BLOWFISH_COMMON=y
>CONFIG_CRYPTO_BLOWFISH_X86_64=y
>CONFIG_CRYPTO_CAMELLIA=y
>CONFIG_CRYPTO_CAMELLIA_X86_64=y
>CONFIG_CRYPTO_CAMELLIA_AESNI_AVX_X86_64=y
>CONFIG_CRYPTO_CAMELLIA_AESNI_AVX2_X86_64=y
>CONFIG_CRYPTO_DES=y
>CONFIG_CRYPTO_SERPENT=y
>CONFIG_CRYPTO_SERPENT_SSE2_X86_64=y
>CONFIG_CRYPTO_TWOFISH=y
>CONFIG_CRYPTO_TWOFISH_COMMON=y
>CONFIG_CRYPTO_TWOFISH_X86_64=y
>CONFIG_CRYPTO_TWOFISH_X86_64_3WAY=y
>CONFIG_CRYPTO_ANSI_CPRNG=y
>CONFIG_CRYPTO_DRBG_MENU=y
>CONFIG_CRYPTO_DRBG_HMAC=y
>CONFIG_CRYPTO_DRBG=y
>CONFIG_CRYPTO_JITTERENTROPY=y
>CONFIG_CRYPTO_USER_API=y
>CONFIG_CRYPTO_USER_API_HASH=y
>CONFIG_CRYPTO_USER_API_SKCIPHER=y
>CONFIG_CRYPTO_USER_API_RNG=y
>CONFIG_CRYPTO_LIB_AES=y
>CONFIG_CRYPTO_LIB_ARC4=y
>CONFIG_CRYPTO_LIB_DES=y
>CONFIG_CRYPTO_LIB_POLY1305_GENERIC=y
>CONFIG_CRYPTO_LIB_SHA256=y
>CONFIG_CRYPTO_HW=y
>root@fireball / #
>
>Just wanted to have a few extras.  ROFL 

Dale,

I didn't read the full page, but as it uses LUKS to manage the encryption, it 
is (at least similar) to what I do on my laptops.

A LUKS volume has support for multiple (I think 4) key slots (passwords that 
will decrypt the volume)

So, in order to change the password you would do:
1) add the new password into an unused slot
2) test the new password works
3) delete the old password (freeing the slot)

--
Joost

-- 
Sent from my Android device with K-9 Mail. Please excuse my brevity.

Reply via email to