Re: Advice on encrypted filesystem

2020-06-27 Thread David Christensen
On 2020-06-27 01:46, Andrei POPESCU wrote: The latest recommendation I saw for "cheap flash based" storage is 4MiB in order to align with erase block sizes, so now I'm starting all my partitions at 4MiB instead of 1MiB. Interesting subject -- thanks for bringing it up. :-) STFW there does

Re: Advice on encrypted filesystem

2020-06-27 Thread David Christensen
On 2020-06-27 12:47, David Christensen wrote: The ATA secure erase command is designed to erase all blocks, both host-accessible and hidden. STFW, "secure erase" (aka "security erase") is an older feature and may not erase all NAND blocks, just the "mapping table". (When I have done this on

Re: Advice on encrypted filesystem

2020-06-27 Thread David Christensen
On 6/27/20 6:00 AM, David Christensen wrote: On 2020-06-26 18:25, David Wright wrote: There's still the problem of what one does about sensitive data if one has been rash enough to write it unencrypted onto an SSD. Would shred -n 1   be preferable? Not really, because that doesn't hit the ex-fi

Re: Advice on encrypted filesystem

2020-06-27 Thread Andrei POPESCU
On Vi, 26 iun 20, 20:25:32, David Wright wrote: > > Ironically, 2048 is neither cargo cult nor magic, but *is* the default > used by LUKS when the kernel does not supply one, as documented two > paragraphs earlier. Are you suggesting a 1MB alignment might be > insufficient? If one were to specify

Re: Advice on encrypted filesystem

2020-06-27 Thread Admin4
1) backup your data to external usb drive 2) reinstall with encrypted enabled 3) restore data = a lot of unencrypted data get's overwritten (if user does not have a lot of data, generate some X-D) On 6/27/20 6:00 AM, David Christensen wrote: > On 2020-06-26 18:25, David Wright wrote: > >> There

Re: Advice on encrypted filesystem

2020-06-27 Thread David Christensen
On 2020-06-26 21:00, David Christensen wrote: On 2020-06-26 18:25, David Wright wrote: There's still the problem of what one does about sensitive data if one has been rash enough to write it unencrypted onto an SSD. Would shred -n 1   be preferable? Not really, because that doesn't hit the ex-f

Re: Advice on encrypted filesystem

2020-06-26 Thread David Christensen
On 2020-06-26 18:25, David Wright wrote: There's still the problem of what one does about sensitive data if one has been rash enough to write it unencrypted onto an SSD. Would shred -n 1 be preferable? Not really, because that doesn't hit the ex-file areas. What then? The best option is to c

Re: Advice on encrypted filesystem

2020-06-26 Thread David Wright
On Fri 26 Jun 2020 at 15:45:09 (-0400), Michael Stone wrote: > On Fri, Jun 26, 2020 at 02:06:57PM -0500, David Wright wrote: > > Agreed. But I wouldn't be writing any sensitive information to an SSD > > in the first place without encrypting it. (Not that I own any yet.) > > SSDs are more common th

Re: Advice on encrypted filesystem

2020-06-26 Thread Michael Stone
On Fri, Jun 26, 2020 at 02:06:57PM -0500, David Wright wrote: Agreed. But I wouldn't be writing any sensitive information to an SSD in the first place without encrypting it. (Not that I own any yet.) SSDs are more common than not in new computers so it's probably best to assume that people rea

Re: Advice on encrypted filesystem

2020-06-26 Thread David Wright
On Fri 26 Jun 2020 at 11:47:34 (-0400), Michael Stone wrote: > On Fri, Jun 26, 2020 at 08:25:49AM -0500, David Wright wrote: > > If encrypting an entire disk, scramble the disk first, then partition. > > If only encrypting a partition, partition the disk first. > > Alignments should be at least 2M

Re: Advice on encrypted filesystem

2020-06-26 Thread Michael Stone
On Fri, Jun 26, 2020 at 08:25:49AM -0500, David Wright wrote: If encrypting an entire disk, scramble the disk first, then partition. If only encrypting a partition, partition the disk first. Alignments should be at least 2M (4096 x 512B sectors). Scramble any sensitive pre-existing contents: # d

Re: Advice on encrypted filesystem

2020-06-26 Thread rhkramer
Thanks -- very helpful! I mayb have some more questions as I triy to digest this, but can't spend time on it today. Nothing new below this line. On Friday, June 26, 2020 09:25:49 AM David Wright wrote: > On Thu 25 Jun 2020 at 07:40:43 (-0400), rhkra...@gmail.com wrote: > > On Wednesday, June 24

Re: Advice on encrypted filesystem

2020-06-26 Thread David Wright
On Thu 25 Jun 2020 at 07:40:43 (-0400), rhkra...@gmail.com wrote: > On Wednesday, June 24, 2020 10:20:55 PM David Wright wrote: > > On Wed 24 Jun 2020 at 21:28:38 (-0400), rhkra...@gmail.com wrote: > > > On my Wheezy system, I used cryptsetup to set up a LUKs encrypted file > > > system on a dedic

Resolved (at least the sound) Re: Zoom client for Linux (was: Re: Advice on encrypted filesystem)

2020-06-25 Thread rhkramer
On Thursday, June 25, 2020 10:14:50 AM rhkra...@gmail.com wrote: > Can you give me any clues about how you told it which audio device to use > (and which you told it to use)? Ahh, I found the settings screen and switched the audio (to "Built In Analog Audio Stereo") and tested it -- it works. (I

Re: Advice on encrypted filesystem

2020-06-25 Thread rhkramer
On Thursday, June 25, 2020 07:29:53 AM rhkra...@gmail.com wrote: > At least for the Jessie system, I'd like to install some encrypted > filesystems without reinstalling (or replacing) Jessie. Does anybody know what the DI (Debian Installer) installs by default for an encrypted fi

Zoom client for Linux (was: Re: Advice on encrypted filesystem)

2020-06-25 Thread rhkramer
On Thursday, June 25, 2020 09:25:06 AM David wrote: > Hi, are you aware that Zoom has available a Linux-compatible > desktop client application that runs without a browser? Thanks, yes, that is one of the ways I tried to join the zoom meeting on my Jessie system -- the client says it requires / w

Re: Sound in Jitsi/BBB [was: dvice on encrypted filesystem]

2020-06-25 Thread tomas
On Thu, Jun 25, 2020 at 03:57:53PM +0200, Nicolas George wrote: > to...@tuxteam.de (12020-06-25): > > You don't use Pulseaudio? Current Firefoxen have ALSA enabled for Debian, > > but their ALSA support seems to have fallen prey to bitrot. I didn't > > manage to get them working. > > > > If you in

Re: Sound in Jitsi/BBB [was: dvice on encrypted filesystem]

2020-06-25 Thread Nicolas George
to...@tuxteam.de (12020-06-25): > You don't use Pulseaudio? Current Firefoxen have ALSA enabled for Debian, > but their ALSA support seems to have fallen prey to bitrot. I didn't > manage to get them working. > > If you insist in not having Pulse (I do), there's apulse (the package > is named like

Sound in Jitsi/BBB [was: dvice on encrypted filesystem]

2020-06-25 Thread tomas
On Thu, Jun 25, 2020 at 03:34:02PM +0200, Nicolas George wrote: > David (12020-06-25): > > Hi, are you aware that Zoom has available a Linux-compatible > > desktop client application that runs without a browser? > > > > It works on Buster, apart from needing to be told which audio > > device to us

Re: Advice on encrypted filesystem

2020-06-25 Thread Nicolas George
David (12020-06-25): > Hi, are you aware that Zoom has available a Linux-compatible > desktop client application that runs without a browser? > > It works on Buster, apart from needing to be told which audio > device to use every time it is run. > Available here: > https://zoom.us/download#client_

Re: Advice on encrypted filesystem

2020-06-25 Thread David
On Thu, 25 Jun 2020 at 21:30, wrote: > I might consider reinstalling the Buster system, > I might even replace it with testing as, for some purposes, I need a Firefox > more up-to-date than that in Buster. > > (I tried to join a Zoom meeting and could not get sound, I got a message that > my Fire

Re: Advice on encrypted filesystem

2020-06-25 Thread rhkramer
On Wednesday, June 24, 2020 10:20:55 PM David Wright wrote: > On Wed 24 Jun 2020 at 21:28:38 (-0400), rhkra...@gmail.com wrote: > > On my Wheezy system, I used cryptsetup to set up a LUKs encrypted file > > system on a dedicated partition > > What were the contents of this partition: the OS itsel

Re: Advice on encrypted filesystem

2020-06-25 Thread rhkramer
On Wednesday, June 24, 2020 09:34:00 PM Roberto C. Sánchez wrote: > On Wed, Jun 24, 2020 at 09:28:38PM -0400, rhkra...@gmail.com wrote: > > I'm wondering if cryptsetup is still something like "state of the art" or > > if there is anything more secure and simpler to learn to setup? > > Assuming you

Re: Advice on encrypted filesystem

2020-06-25 Thread john doe
On 6/25/2020 3:34 AM, Roberto C. Sánchez wrote: On Wed, Jun 24, 2020 at 09:28:38PM -0400, rhkra...@gmail.com wrote: On my Wheezy system, I used cryptsetup to set up a LUKs encrypted file system on a dedicated partition (actually, two filesystems). It was a PITA learning how to do it, and it wa

Re: Advice on encrypted filesystem

2020-06-24 Thread David Wright
On Wed 24 Jun 2020 at 21:28:38 (-0400), rhkra...@gmail.com wrote: > On my Wheezy system, I used cryptsetup to set up a LUKs encrypted file > system > on a dedicated partition What were the contents of this partition: the OS itself, or /home, or an independent filesystem that you'd probably moun

Re: Advice on encrypted filesystem

2020-06-24 Thread David Christensen
On 2020-06-24 18:34, Roberto C. Sánchez wrote: On Wed, Jun 24, 2020 at 09:28:38PM -0400, rhkra...@gmail.com wrote: On my Wheezy system, I used cryptsetup to set up a LUKs encrypted file system on a dedicated partition (actually, two filesystems). It was a PITA learning how to do it, and it was

Re: Advice on encrypted filesystem

2020-06-24 Thread Roberto C . Sánchez
On Wed, Jun 24, 2020 at 09:28:38PM -0400, rhkra...@gmail.com wrote: > On my Wheezy system, I used cryptsetup to set up a LUKs encrypted file > system > on a dedicated partition (actually, two filesystems). > > It was a PITA learning how to do it, and it was 6 years ago, and it looks > like >

Advice on encrypted filesystem

2020-06-24 Thread rhkramer
On my Wheezy system, I used cryptsetup to set up a LUKs encrypted file system on a dedicated partition (actually, two filesystems). It was a PITA learning how to do it, and it was 6 years ago, and it looks like I have to relearn it to do it again on Jessie and / or Buster (and on a backup devi

Re: Performance of encrypted filesystem

2009-08-30 Thread Celejar
[Catching up on a d-u backlog:] On Sun, 16 Aug 2009 12:03:25 +0300 Γιώργος Πάλλας wrote: > Teemu Likonen wrote: > > On 2009-08-12 09:38 (+0300), Teemu Likonen wrote: > > > > > >> Do you (or anybody) have numbers or educated guesses on how much it > >> slows down the disk operation or how it w

Re: Performance of encrypted filesystem

2009-08-16 Thread Γιώργος Πάλλας
Teemu Likonen wrote: > On 2009-08-12 09:38 (+0300), Teemu Likonen wrote: > > >> Do you (or anybody) have numbers or educated guesses on how much it >> slows down the disk operation or how it will affect CPU load? >> > > I found such an article and it seems to indicate that LUKS system has n

Re: Performance of encrypted filesystem

2009-08-15 Thread Teemu Likonen
On 2009-08-12 09:38 (+0300), Teemu Likonen wrote: > Do you (or anybody) have numbers or educated guesses on how much it > slows down the disk operation or how it will affect CPU load? I found such an article and it seems to indicate that LUKS system has no much performance penalty on disk IO. ht

Permormance of encrypted filesystem

2009-08-11 Thread Teemu Likonen
On 2009-08-06 19:21 (-0500), Manoj Srivastava wrote: > I encrypt everything except /boot -- even swap. I do that on my laptop as well. Do you (or anybody) have numbers or educated guesses on how much it slows down the disk operation or how it will affect CPU load? -- To UNSUBSCRIBE, email to de

Re: Etch to 5.0.2 upgrade failed - Encrypted filesystem will not boot

2009-08-11 Thread Ron Johnson
On 2009-08-10 18:49, line...@ruiner.halo.nu wrote: [snip] The root filesystem is encrypted to make it more difficult for a local attacker to replace system binaries with backdoored versions. I don't think this is a valid reason for encrypting root. -- Scooty Puff, Sr The Doom-Bringer -- To

Re: Etch to 5.0.2 upgrade failed - Encrypted filesystem will not boot

2009-08-11 Thread Andrew Reid
On Tuesday 11 August 2009 17:41:48 line...@ruiner.halo.nu wrote: > Ok I guess the system is just hosed. If no one has any more suggestions in > the next couple days I will reinstall. > > > I will never trust Debian upgrades again, at least not when encrypted > filesystems are in use. Well, all

Re: Etch to 5.0.2 upgrade failed - Encrypted filesystem will not boot

2009-08-11 Thread lineman
Ok I guess the system is just hosed. If no one has any more suggestions in the next couple days I will reinstall. I will never trust Debian upgrades again, at least not when encrypted filesystems are in use. On Mon, Aug 10, 2009 at 06:49:51PM -0500, line...@ruiner.halo.nu wrote: > > hmm

Re: Etch to 5.0.2 upgrade failed - Encrypted filesystem will not boot

2009-08-10 Thread lineman
> hmmm not sure, you could try > turning of quiet mode remove the quiet from the kernel option on boot > and maybe try turning on debug (add debug to the kernal options) There is no quiet mode in my kernel line. Adding the debug option didn't seem to add any additional relevant information; >

Re: Etch to 5.0.2 upgrade failed - Encrypted filesystem will not boot

2009-08-07 Thread Andrew Reid
On Wednesday 05 August 2009 19:54:50 line...@ruiner.halo.nu wrote: > I tried configuring fstab to use the UUID from blkid, but I had the same > problem. Could the problem be that the SCSI drives are not coming up until > cryptsetup has loaded? Hi again lineman (and list). Just for another da

Re: Etch to 5.0.2 upgrade failed - Encrypted filesystem will not boot

2009-08-07 Thread Siggy Brentrup
On Thu, Aug 06, 2009 at 19:21 -0500, Manoj Srivastava wrote: > On Thu, Aug 06 2009, Siggy Brentrup wrote: > > > On Tue, Aug 04, 2009 at 18:50 -0500, line...@halo.nu wrote: > >> Hi - > > > >> I have a Debian Etch system which I recently upgraded to v5.0.2. > >> The file system was encrypted with LU

Re: Etch to 5.0.2 upgrade failed - Encrypted filesystem will not boot

2009-08-07 Thread Siggy Brentrup
On Thu, Aug 06, 2009 at 18:29 -0400, Andrew Reid wrote: > On Thursday 06 August 2009 04:16:42 Siggy Brentrup wrote: > > Please bear with me, I'm asking this out of curiousity. Why did you > > encrypt the full root FS? I can understand that you want your $HOME > > encrypted, to a lesser degree I c

Re: Etch to 5.0.2 upgrade failed - Encrypted filesystem will not boot

2009-08-06 Thread Manoj Srivastava
On Thu, Aug 06 2009, Siggy Brentrup wrote: > On Tue, Aug 04, 2009 at 18:50 -0500, line...@halo.nu wrote: >> Hi - > >> I have a Debian Etch system which I recently upgraded to v5.0.2. >> The file system was encrypted with LUKS at install time. > > Please bear with me, I'm asking this out of curious

Re: Etch to 5.0.2 upgrade failed - Encrypted filesystem will not boot

2009-08-06 Thread Andrew Reid
On Thursday 06 August 2009 04:16:42 Siggy Brentrup wrote: > On Tue, Aug 04, 2009 at 18:50 -0500, line...@halo.nu wrote: > > Hi - > > > > I have a Debian Etch system which I recently upgraded to v5.0.2. > > The file system was encrypted with LUKS at install time. > > Please bear with me, I'm asking

Re: Etch to 5.0.2 upgrade failed - Encrypted filesystem will not boot

2009-08-06 Thread Siggy Brentrup
On Tue, Aug 04, 2009 at 18:50 -0500, line...@halo.nu wrote: > Hi - > I have a Debian Etch system which I recently upgraded to v5.0.2. > The file system was encrypted with LUKS at install time. Please bear with me, I'm asking this out of curiousity. Why did you encrypt the full root FS? I can un

Re: Etch to 5.0.2 upgrade failed - Encrypted filesystem will not boot

2009-08-05 Thread Andrew Reid
On Wednesday 05 August 2009 19:54:50 line...@ruiner.halo.nu wrote: > I tried configuring fstab to use the UUID from blkid, but I had the same > problem. Could the problem be that the SCSI drives are not coming up until > cryptsetup has loaded? This could happen if the new kernel's initramfs doe

Re: Etch to 5.0.2 upgrade failed - Encrypted filesystem will not boot

2009-08-05 Thread Alex Samad
On Wed, Aug 05, 2009 at 06:54:50PM -0500, line...@ruiner.halo.nu wrote: > I tried configuring fstab to use the UUID from blkid, but I had the same > problem. Could the problem be that the SCSI drives are not coming up until > cryptsetup has loaded? hmmm not sure, you could try turning of quiet

Re: Etch to 5.0.2 upgrade failed - Encrypted filesystem will not boot

2009-08-05 Thread lineman
I tried configuring fstab to use the UUID from blkid, but I had the same problem. Could the problem be that the SCSI drives are not coming up until cryptsetup has loaded? Here is some info on my configuration: t...@magnesium:/etc/initramfs-tools/conf.d$ cat resume RESUME=/dev/mapper/magnesium

Re: Etch to 5.0.2 upgrade failed - Encrypted filesystem will not boot

2009-08-04 Thread Alex Samad
On Tue, Aug 04, 2009 at 06:50:56PM -0500, line...@halo.nu wrote: > Hi - > > I have a Debian Etch system which I recently upgraded to v5.0.2. The file > system was encrypted with LUKS at install time. > > The upgrade appeared to go well, however when I boot into the new system, it > gives the f

Etch to 5.0.2 upgrade failed - Encrypted filesystem will not boot

2009-08-04 Thread lineman
Hi - I have a Debian Etch system which I recently upgraded to v5.0.2. The file system was encrypted with LUKS at install time. The upgrade appeared to go well, however when I boot into the new system, it gives the following error: Volume group "hostname" not found cryptsetup: Source device /d

Etch -> Lenny upgrade broke encrypted filesystem

2009-07-28 Thread lineman
Hi - I have a cryptsetup encrypted filesystem on Etch. I set it up at install time. When I updated to 5.0.2, it no longer boots. The kernel says "Waiting for root file system", then "cryptsetup: source device /dev/sda5 not found" The system still boots when I select th

Etch -> Lenny upgrade broke encrypted filesystem

2009-07-28 Thread lineman
Hi - I have a cryptsetup encrypted filesystem on Etch. I set it up at install time. When I updated to 5.0.2, it no longer boots. The kernel says "Waiting for root file system", then "cryptsetup: source device /dev/sda5 not found" The system still boots when I select th

Re: Fsck encrypted filesystem

2009-01-30 Thread Emanoil Kotsev
Richard Hector wrote: >> I don't understand why ubuntu users keep coming to debian forumes with >> their ubuntu problems. > > I don't see that anyone has done that in this thread; I was merely using > it as an example. > > I know that Debian can set up sudo at install time, though I don't think

Re: Fsck encrypted filesystem

2009-01-29 Thread Richard Hector
On Thu, 2009-01-29 at 23:33 +0100, Emanoil Kotsev wrote: > Alex Potter wrote: > > > On Mon, 26 Jan 2009 21:50:08 +0100, Richard Hector wrote: > > > >> I think it's the normal Ubuntu way, right? > > > > It is. > > > > I don't understand why ubuntu users keep coming to debian forumes with their

Re: Fsck encrypted filesystem

2009-01-29 Thread Emanoil Kotsev
Ron Johnson wrote: > Let's not forget NetworkMangler. I installed dual-boot Ubuntu on my > kids's computer because of the handy gui partition resizer tool, but > *hated* the actual Ubuntu installation. Must be too used to the CLI. > long lives cli, amen! -- To UNSUBSCRIBE, email to debian

Re: Fsck encrypted filesystem

2009-01-29 Thread Ron Johnson
On 01/29/2009 04:33 PM, Emanoil Kotsev wrote: Alex Potter wrote: On Mon, 26 Jan 2009 21:50:08 +0100, Richard Hector wrote: I think it's the normal Ubuntu way, right? It is. I don't understand why ubuntu users keep coming to debian forumes with their ubuntu problems. besides the explanat

Re: Fsck encrypted filesystem

2009-01-29 Thread Emanoil Kotsev
Alex Potter wrote: > On Mon, 26 Jan 2009 21:50:08 +0100, Richard Hector wrote: > >> I think it's the normal Ubuntu way, right? > > It is. > I don't understand why ubuntu users keep coming to debian forumes with their ubuntu problems. besides the explanation given by ubuntu for dropping the r

Re: Fsck encrypted filesystem

2009-01-26 Thread Alex Potter
On Mon, 26 Jan 2009 21:50:08 +0100, Richard Hector wrote: > I think it's the normal Ubuntu way, right? It is. -- Regards Alex http://www.badphorm.co.uk/ -- To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debi

Re: Fsck encrypted filesystem

2009-01-26 Thread Alex Samad
On Mon, Jan 26, 2009 at 02:17:39AM -0600, line...@ruiner.halo.nu wrote: > Hi > > I have a relaively recent debian install with LUKS encrypted filesystem, > default options. > > An error has been detected on the HD and it will not boot anymore, FSCK wants > the root

Re: Fsck encrypted filesystem

2009-01-26 Thread Richard Hector
On Mon, 2009-01-26 at 11:25 +0100, Johannes Wiedersich wrote: > - From what you write, I have to assume that there is a good reason, why > the person who installed the system did not give you the root password. Isn't that normal if you choose to setup sudo during installation? I don't think I've

Re: Fsck encrypted filesystem

2009-01-26 Thread Johannes Wiedersich
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 line...@ruiner.halo.nu wrote: > Hi > > I have a relaively recent debian install with LUKS encrypted > filesystem, default options. > > An error has been detected on the HD and it will not boot anymore, > FSCK wants the root

Re: Fsck encrypted filesystem

2009-01-26 Thread subscriptions
On Mon, 2009-01-26 at 09:17 +0100, line...@ruiner.halo.nu wrote: > Hi > > I have a relaively recent debian install with LUKS encrypted filesystem, > default options. > > An error has been detected on the HD and it will not boot anymore, FSCK wants > the root password to

Re: Fsck encrypted filesystem

2009-01-26 Thread Γιώργος Πάλλας
line...@ruiner.halo.nu wrote: Hi I have a relaively recent debian install with LUKS encrypted filesystem, default options. An error has been detected on the HD and it will not boot anymore, FSCK wants the root password to do system maintenence. I do not know the root password and I would

Re: Fsck encrypted filesystem

2009-01-26 Thread Adrian Levi
2009/1/26 : > Hi > > I have a relaively recent debian install with LUKS encrypted filesystem, > default options. > > An error has been detected on the HD and it will not boot anymore, FSCK wants > the root password to do system maintenence. > > > I do not know the

Fsck encrypted filesystem

2009-01-26 Thread lineman
Hi I have a relaively recent debian install with LUKS encrypted filesystem, default options. An error has been detected on the HD and it will not boot anymore, FSCK wants the root password to do system maintenence. I do not know the root password and I would like to fsck the drive. How can

Re: Editing run level S (was encrypted filesystem that can be mounted remotely?)

2006-07-19 Thread Osamu Aoki
On Tue, Jul 11, 2006 at 09:19:08PM +0100, Digby Tarvin wrote: > Leading on from the earlier posters question about configuring an > encrypted filesystem that does not interrupt the boot process with > a password prompt... > > Can anyone tell me what the 'Debian way' is

Re: encrypted filesystem that can be mounted remotely?

2006-07-12 Thread Dave Patterson
* Anonymous <[EMAIL PROTECTED]> [2006-07-11 17:00:56 -]: > I'd like to keep some of the data on my computer's hard drive > encrypted, but not necessarily all of it. But I also need to be able > to reboot the computer remotely and log into by SSH without the > encrypted FS mounted, then mount t

Editing run level S (was encrypted filesystem that can be mounted remotely?)

2006-07-11 Thread Digby Tarvin
Leading on from the earlier posters question about configuring an encrypted filesystem that does not interrupt the boot process with a password prompt... Can anyone tell me what the 'Debian way' is to remove something (in this case 'cryptdisks') from runlevel 'S'?

Re: encrypted filesystem that can be mounted remotely?

2006-07-11 Thread Digby Tarvin
n and run /etc/init.d/cryptdisks enter the password, and finally mount the encrypted filesystem. In my opinion it would be better if cryptdisks actually did the mounting (as I believe /etc/init.d/boot.crypto does on SuSE). It seems in Debian there is an assumption that someone will be on

Re: encrypted filesystem that can be mounted remotely?

2006-07-11 Thread Michael Dominok
On Tue, 2006-07-11 at 17:00 +, Anonymous wrote: > I'd like to keep some of the data on my computer's hard drive > encrypted, but not necessarily all of it. But I also need to be able > to reboot the computer remotely and log into by SSH without the > encrypted FS mounted, then mount the encrypt

Re: encrypted filesystem that can be mounted remotely?

2006-07-11 Thread Alec Berryman
Anonymous on 2006-07-11 17:00:56 -: > I'd like to keep some of the data on my computer's hard drive > encrypted, but not necessarily all of it. But I also need to be able > to reboot the computer remotely and log into by SSH without the > encrypted FS mounted, then mount the encrypted partitio

encrypted filesystem that can be mounted remotely?

2006-07-11 Thread Anonymous
I'd like to keep some of the data on my computer's hard drive encrypted, but not necessarily all of it. But I also need to be able to reboot the computer remotely and log into by SSH without the encrypted FS mounted, then mount the encrypted partition in the SSH session (from a trusted machine, of

Re: Module loading at boot (was re: setting up an encrypted filesystem..)

2006-04-27 Thread Digby Tarvin
On Thu, Apr 27, 2006 at 09:24:52PM -0500, Mumia W wrote: > Digby Tarvin wrote: > >[...] > >Does anyone know if there is a way to capture all of the console > >messages that are displayed during boot? > >[...] > > Enable boot logging in /etc/default/bootlogd That seems to do the trick - thanks. R

Re: Module loading at boot (was re: setting up an encrypted filesystem..)

2006-04-27 Thread Mumia W
Digby Tarvin wrote: [...] Does anyone know if there is a way to capture all of the console messages that are displayed during boot? [...] Enable boot logging in /etc/default/bootlogd -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROT

Module loading at boot (was re: setting up an encrypted filesystem..)

2006-04-27 Thread Digby Tarvin
On Thu, Apr 27, 2006 at 08:02:48AM -0400, Roberto C. Sanchez wrote: > Digby Tarvin wrote: > ... > > > >But I have no idea why the '.load' suffixes - and it would appear > >that the system doesn't know either, because all it does is produce > >a series of 'FATAL' messages on the console during boot.

Re: setting up an encrypted filesystem..

2006-04-27 Thread Roberto C. Sanchez
Digby Tarvin wrote: However it leads me on to another related question.. After the install (Etch, netinstall) the /etc/modules file contained the following: # /etc/modules: kernel modules to load at boot time. # # This file contains the names of kernel modules that should be loaded # at

Re: setting up an encrypted filesystem..

2006-04-27 Thread Felix C. Stegerman
On 2006-04-27 05:09:35, Digby Tarvin wrote: > I've been looking at mechanism for setting up an encrypted filesystem > under Etch, and I have the basics working as follows: ... > However it seems that I need to add an entry to /etc/modprobe.d in > order to get the device mapper

Re: setting up an encrypted filesystem..

2006-04-27 Thread Digby Tarvin
On Thu, Apr 27, 2006 at 12:12:32PM +0200, Jochen Schulz wrote: > Digby Tarvin: > > > > However it seems that I need to add an entry to /etc/modprobe.d in > > order to get the device mapper module loaded. Or should it be > > /etc/modules.conf or /etc/modules that I edit? > > Modules which you want

Re: setting up an encrypted filesystem..

2006-04-27 Thread Jochen Schulz
Digby Tarvin: > > However it seems that I need to add an entry to /etc/modprobe.d in > order to get the device mapper module loaded. Or should it be > /etc/modules.conf or /etc/modules that I edit? Modules which you want to load at boot have to be named in /etc/modules (one module name er line).

setting up an encrypted filesystem..

2006-04-26 Thread Digby Tarvin
I've been looking at mechanism for setting up an encrypted filesystem under Etch, and I have the basics working as follows: a. Initial Setup 1. apt-get install cryptosetup 2. modprobe dm-mod 3. cryptsetup -y create chda14 /dev/hda14 4. mkfs -t ext3 /dev/m

Re: encrypted filesystem

2001-10-26 Thread Walter Hofmann
en using absolute end relative numbers. Using absolute numbers means that you cannot copy the encrypted filesystem to a different place. There seems to be another problem with the crypto patch and kernels >=2.4.10: It simply doesn't work! (Probably because of the block device in page cache changes) Walter

Re: encrypted filesystem

2001-10-25 Thread Adam Warner
On Fri, 2001-10-26 at 11:26, Gabor Gludovatz wrote: > Hi, > > does someone know of a sulution which I could use to encrypt a filesystem > transparently? I want my data to be encoded on the disk and I'd like to > mount it at the same time, and access+modify it. > > In the good old times there was

Re: encrypted filesystem

2001-10-25 Thread Jeronimo Pellegrini
On Fri, Oct 26, 2001 at 12:26:46AM +0200, Gabor Gludovatz wrote: > Hi, > > does someone know of a sulution which I could use to encrypt a filesystem > transparently? I want my data to be encoded on the disk and I'd like to > mount it at the same time, and access+modify it. > > In the good old tim

encrypted filesystem

2001-10-25 Thread Gabor Gludovatz
Hi, does someone know of a sulution which I could use to encrypt a filesystem transparently? I want my data to be encoded on the disk and I'd like to mount it at the same time, and access+modify it. In the good old times there was a patch, the kerneli patch, with which I could encrypt any filesys

Re: Loopback encrypted filesystem, anyone?

2000-12-14 Thread Damon Muller
Quoth Lance Simmons, > I've looked at the archives but haven't found much helpful on this. > Have other people had success at creating loopback encrypted > filesystems? If you don't want to mess around with patching kernels (and a few userland apps, from memory), a good alternative is cfs, the Cr

Re: Loopback encrypted filesystem, anyone?

2000-12-14 Thread Hung Hin Lik, Shell
Lance Simmons wrote: > > I've looked at the archives but haven't found much helpful on this. > Have other people had success at creating loopback encrypted > filesystems? Did you read the encryption-HOWTO ? I can create the crypted-fs after reading the HOWTO.. Well, I have written a document ab

Loopback encrypted filesystem, anyone?

2000-12-14 Thread Lance Simmons
I've looked at the archives but haven't found much helpful on this. Have other people had success at creating loopback encrypted filesystems? The international kernel patch includes how-to pages, but I don't seem to be following the instructions. In particular, I'm not sure what patch to use on th