Tobias Frost schrieb:
I have to correct myself: in git, there is at least a file for the
HiFn796x crypto chips, which is used on the soekris card.
It is available in 2.6.25:
CONFIG_CRYPTO_DEV_HIFN_795X:
This option allows you to have support for HIFN 795x crypto adapters.
--
Tomasz Chmi
I have to correct myself: in git, there is at least a file for the
HiFn796x crypto chips, which is used on the soekris card.
And after registering, there are some data sheets available.
I'll take
a look into it.
On Thu, 2008-04-03 at 17:21 +0200, Tomasz Chmielewski wrote:
> Tobias Frost schrieb:
Tomasz Chmielewski wrote:
Tobias Frost schrieb:
to throw another number into the round, I got around 2-3 MByte/s on the
new ABI.
BTW: Does someone know a Mini-PCI crypto accelerator card fit for
LUKS/device-mapper? I found some two solutiions the net, but all of them
are very "secret", that is y
Yes, this is the other card I found.
However, as written on some list (lost the URL), the 2.4 driver must be
buggy as hell and datasheets are
subject to NDAs.
> > Boards, http://www.caviumnetworks.com/acceleration_boards_Mini-PCI.htm)
>
> VPN 1411 from Soekris could in theory help: http://soekr
Tobias Frost schrieb:
to throw another number into the round, I got around 2-3 MByte/s on the
new ABI.
BTW: Does someone know a Mini-PCI crypto accelerator card fit for
LUKS/device-mapper? I found some two solutiions the net, but all of them
are very "secret", that is you need probably a NDA t
to throw another number into the round, I got around 2-3 MByte/s on the
new ABI.
BTW: Does someone know a Mini-PCI crypto accelerator card fit for
LUKS/device-mapper? I found some two solutiions the net, but all of them
are very "secret", that is you need probably a NDA to get more infos
like dat
On Sun, Mar 09, 2008 at 11:54:29PM +0100, Anders Lennartsson wrote:
> As a further note on the subject of this thread, I did manage to
> install Debian Etch on a fully encrypted USB-stick (1 GB) with two
> partitions, one for root and one for swap. I used default settings for
> LUKS encryption whic
Hello,
On Thu, 03 Apr 2008, Tomasz Chmielewski wrote:
> kexec and kexec-tools work on debian-arm - I use it on FSG-3:
>
> http://wpkg.org/Running_Debian_on_Freecom_FSG-3#kexec
Great. I just managed to get kexec-tools compiled. Now I've to go
and compile that kernel!
Regards,
Kapil.
--
--
To
Kapil Hari Paranjape schrieb:
Hello,
On Thu, 03 Apr 2008, Martin Michlmayr wrote:
* Kapil Hari Paranjape <[EMAIL PROTECTED]> [2008-04-01 16:15]:
However, I note that there is supposed to be some support for
kexec on arm since 2.6.22 but it is not built-in for the Debian
kernels. Is the reason
Hello,
On Thu, 03 Apr 2008, Martin Michlmayr wrote:
> * Kapil Hari Paranjape <[EMAIL PROTECTED]> [2008-04-01 16:15]:
> > However, I note that there is supposed to be some support for
> > kexec on arm since 2.6.22 but it is not built-in for the Debian
> > kernels. Is the reason for this documented
* Anders Lennartsson <[EMAIL PROTECTED]> [2008-03-09 23:54]:
> > Thanks for your report. I'll add crypto-modules when we update the
> > installer to 2.6.24. (Which will happen after beta1 is released,
> > which should hopefully be soon.)
>
> Thanks for spotting my report and adding the modules.
* Kapil Hari Paranjape <[EMAIL PROTECTED]> [2008-04-01 16:15]:
> I didn't check that kexec is currently not supported on "arm"
> under Debian. :-(
>
> However, I note that there is supposed to be some support for
> kexec on arm since 2.6.22 but it is not built-in for the Debian
> kernels. Is the r
Hello,
On Sun, 23 Mar 2008, I said a foolish thing when I wrote:
> 2. The sysadmin logs in via ssh and runs "kexec" to boot
>the real-file system. The key for the real file-system
>is given as a command line parameter to "kexec" (after
>the sysadmin has de-crypted it).
I didn't check
Hello,
On Sat, 22 Mar 2008, Anders Lennartsson wrote:
> > On Tue, 11 Mar 2008 at 07:13:41 +0100, Admir Trakic <[EMAIL PROTECTED]>
> > wrote:
> snip
> > Anders,
> >
> > Is there any way to incoporate this hint:
> > http://www.debian-administration.org/articles/579 where usage of
> > serial port w
> On Tue, 11 Mar 2008 at 07:13:41 +0100, Admir Trakic <[EMAIL PROTECTED]> wrote:
snip
> Anders,
>
> Is there any way to incoporate this hint:
> http://www.debian-administration.org/articles/579 where usage of
> serial port would be avoided?
>
> ;-)
After browsing the howto slightly my guess is t
On 3/9/08, Anders Lennartsson <[EMAIL PROTECTED]> wrote:
> On Sun, 2008-03-09, at 21:24:50 +0100, Martin Michlmayr wrote:
> > * Anders Lennartsson <[EMAIL PROTECTED]> [2008-02-24 07:42]:
> > > Feb 23 19:03:55 anna[9635]: DEBUG: resolver (crypto-modules): package
> > > doesn't exist (ignored)
> > >
On Sun, 2008-03-09, at 21:24:50 +0100, Martin Michlmayr wrote:
> * Anders Lennartsson <[EMAIL PROTECTED]> [2008-02-24 07:42]:
> > Feb 23 19:03:55 anna[9635]: DEBUG: resolver (crypto-modules): package
> > doesn't exist (ignored)
> >
> > and a short investigation gives that it seems natural because
* Anders Lennartsson <[EMAIL PROTECTED]> [2008-02-24 07:42]:
> Feb 23 19:03:55 anna[9635]: DEBUG: resolver (crypto-modules): package doesn't
> exist (ignored)
>
> and a short investigation gives that it seems natural because they are
> not built by the source package:
> http://packages.debian.org
On Mon, 2008-02-25, at 07:08:35 +0100, Rick Thomas wrote:
> I don't know how much load you're going to put on your proposed
> Kerberos KDC, but the extra CPU load placed on it by encrypting the
> filesystem may make it unresponsive, given the Slug's not-very-fast CPU.
My production environment is
I don't know how much load you're going to put on your proposed
Kerberos KDC, but the extra CPU load placed on it by encrypting the
filesystem may make it unresponsive, given the Slug's not-very-fast CPU.
Let us know how it turns out.
Rick
On Feb 24, 2008, at 1:42 AM, Anders Lennartsson wro
After using my slug for some time to serve files with Debian installed
I thought I'd try using it for a kerberos kdc (tested and works ok) on
an encrypted root file system (current experiment). Not much load and
file access so this might be ok.
But for encryption during a fresh install on the slug
21 matches
Mail list logo