Sebastiaan L. Zoutendijk wrote:
> Dear Dale,
>
> On Friday 5 June 2020, 11.37pm -0500, Dale wrote:
>
>> Is this a secure method or is there a more secure way? Is there any
>> known issues with using this? Anyone here use this method? Keep in
>> mind, LVM. BTFRS, SP?, may come later.
> A
Rich Freeman wrote:
> On Sat, Jun 6, 2020 at 8:47 PM Victor Ivanov wrote:
>> On 06/06/2020 21:12, Rich Freeman wrote:
>>> Maybe we're miscommunicating, but it seems like you're moving the
>>> goalposts here.
>>> ...
>>> Your original point was, "The problem here is that a leaked header
>>> immedia
On Sat, Jun 6, 2020 at 8:47 PM Victor Ivanov wrote:
>
> On 06/06/2020 21:12, Rich Freeman wrote:
> > Maybe we're miscommunicating, but it seems like you're moving the
> > goalposts here.
> > ...
> > Your original point was, "The problem here is that a leaked header
> > immediately means a compromi
On 06/06/2020 21:12, Rich Freeman wrote:
> My point remains:
>
> The header is as secure as the disk. If the disk is secure against
> brute-force, then so is the header.
I never said otherwise. This was, in fact, explicitly stated in my
concluding remarks of my original post where I say "If using
On 6/6/20 6:34 PM, Dale wrote:
Neil Bothwick wrote:
On Sat, 6 Jun 2020 11:34:28 -0500, Dale wrote:
From what I've read, I like my way better. I did have to change the
names from bzimage* to kernel* but other than that, I can use the
naming method I've used for years and keep the good kernels
Neil Bothwick wrote:
> On Sat, 6 Jun 2020 11:34:28 -0500, Dale wrote:
>
From what I've read, I like my way better. I did have to change the
names from bzimage* to kernel* but other than that, I can use the
naming method I've used for years and keep the good kernels I want.
>>> mak
On Sat, 6 Jun 2020 11:34:28 -0500, Dale wrote:
> >> From what I've read, I like my way better. I did have to change the
> >> names from bzimage* to kernel* but other than that, I can use the
> >> naming method I've used for years and keep the good kernels I want.
> > make install names the kern
Dear Dale,
On Friday 5 June 2020, 11.37pm -0500, Dale wrote:
> Is this a secure method or is there a more secure way? Is there any
> known issues with using this? Anyone here use this method? Keep in
> mind, LVM. BTFRS, SP?, may come later.
Another thing to keep in mind: if you only
On Sat, Jun 6, 2020 at 3:38 PM Victor Ivanov wrote:
>
> On 06/06/2020 19:51, Rich Freeman wrote:
> > Sure, if the attacker has a copy of the header they can spend as much
> > time as they wish brute-forcing it. However, the same is true if they
> > have the entire disk, and that is precisely the
On 06/06/2020 19:51, Rich Freeman wrote:
> If you're talking about the drive header that is actually written to
> disk, it is as secure as the entire drive is, since the drive contains
> the header.
I never said it was any less secure. It would be daft to even assume
something like that as it's de
On 6 June 2020 16:22:49 CEST, antlists wrote:
>On 06/06/2020 09:23, Michael wrote:
>> Yes, getting the thread wrong and damaging the female thread in the
>enclosure,
>> while thinking this/almost/ fits, is not good for your nerves.
>There are
>> thread gauges which you can match the pitch of a s
On 6 June 2020 17:07:37 CEST, Dale wrote:
>antlists wrote:
>> On 06/06/2020 08:49, Dale wrote:
>>> First drive seems to have died. Got part way copying files and
>>> things got interesting. When checking smartctrl, it even puked on
>my
>>> keyboard. Drive only had a few hundred hours on it so m
On Sat, Jun 6, 2020 at 10:07 AM Victor Ivanov wrote:
>
> The problem here is that a leaked header immediately means a compromised
> volume. An adversary who gets hold of the header can now spend as much
> time as they would like to brute force a password (depending on password
> strength) and deri
Peter Humphrey wrote:
> On Saturday, 6 June 2020 17:16:23 BST Dale wrote:
>> Jack wrote:
>>> sys-libs/gpm perhaps?
>> That should be the one. I have that installed and I use it on those
>> rare occasions when the GUI doesn't come up and I need to edit a config
>> file by pasting from a error to a
On 2020.06.06 12:34, Dale wrote:
Neil Bothwick wrote:
> On Sat, 6 Jun 2020 10:13:56 -0500, Dale wrote:
>
If you do copy yours manually to /boot, what command do you use
for
dracut? Maybe I'm doing it a hard way or something and you have
a
easier method.
>>> cd /usr/src/linux
On Saturday, 6 June 2020 17:16:23 BST Dale wrote:
> Jack wrote:
> > sys-libs/gpm perhaps?
>
> That should be the one. I have that installed and I use it on those
> rare occasions when the GUI doesn't come up and I need to edit a config
> file by pasting from a error to a file. It comes in handy
On Sat, 6 Jun 2020 11:16:23 -0500
Dale wrote:
> Jack wrote:
> > sys-libs/gpm perhaps?
>
> That should be the one. I have that installed and I use it on those
> rare occasions when the GUI doesn't come up and I need to edit a
> config file by pasting from a error to a file. It comes in handy
[Quoting order corrected]
On Saturday, 6 June 2020 17:05:13 BST Jack wrote:
> On 6/6/20 12:01 PM, jdm wrote:
> > I have had to use the Gentoo Minimal Installation Cd to rescue my
> > system due something going wrong with UEFI boot crazyness. Which is
> > resolved now.
> >
> > What I have noticed
On Sat, 6 Jun 2020 12:05:13 -0400
Jack wrote:
> sys-libs/gpm perhaps?
>
> On 6/6/20 12:01 PM, jdm wrote:
> > Hello,
> >
> > I have had to use the Gentoo Minimal Installation Cd to rescue my
> > system due something going wrong with UEFI boot crazyness. Which is
> > resolved now.
> >
> > What I h
Neil Bothwick wrote:
> On Sat, 6 Jun 2020 10:13:56 -0500, Dale wrote:
>
If you do copy yours manually to /boot, what command do you use for
dracut? Maybe I'm doing it a hard way or something and you have a
easier method.
>>> cd /usr/src/linux
>>> make all modules_install install
Jack wrote:
> sys-libs/gpm perhaps?
That should be the one. I have that installed and I use it on those
rare occasions when the GUI doesn't come up and I need to edit a config
file by pasting from a error to a file. It comes in handy since typing
it in manually could result in a typo etc.
I ke
On Sat, 6 Jun 2020 10:13:56 -0500, Dale wrote:
> >> If you do copy yours manually to /boot, what command do you use for
> >> dracut? Maybe I'm doing it a hard way or something and you have a
> >> easier method.
> > cd /usr/src/linux
> > make all modules_install install
> > dracut --kver=$(cat
sys-libs/gpm perhaps?
On 6/6/20 12:01 PM, jdm wrote:
Hello,
I have had to use the Gentoo Minimal Installation Cd to rescue my
system due something going wrong with UEFI boot crazyness. Which is
resolved now.
What I have noticed is that you can use a mouse and copy/paste at the
command prompt i
Hello,
I have had to use the Gentoo Minimal Installation Cd to rescue my
system due something going wrong with UEFI boot crazyness. Which is
resolved now.
What I have noticed is that you can use a mouse and copy/paste at the
command prompt in what looks like framebuffer/tty session or whatever
t
Neil Bothwick wrote:
> On Fri, 5 Jun 2020 15:57:07 -0500, Dale wrote:
>
>> When you install your kernel, do you use make install or do you copy the
>> kernel to /boot manually? I do mine manually but also copy it manually
>> as well. That makes it hard for me to recall how to use the dracut
>> co
antlists wrote:
> On 06/06/2020 08:49, Dale wrote:
>> First drive seems to have died. Got part way copying files and
>> things got interesting. When checking smartctrl, it even puked on my
>> keyboard. Drive only had a few hundred hours on it so maybe the
>> drive was iffy from the start or that
On 6/6/20 10:10 AM, Rich Freeman wrote:
One of the problems with drive-managed SMR is that it can seem to be
ok when you're just doing light duty access, and then when one of your
other drives fails and you're doing a zfs resilver the SMR drive
starts performing an order of magnitude or more wors
On 06/06/2020 09:23, Michael wrote:
Yes, getting the thread wrong and damaging the female thread in the enclosure,
while thinking this/almost/ fits, is not good for your nerves. There are
thread gauges which you can match the pitch of a screw/bolt and help determine
the thread specification, bu
On 06/06/2020 14:57, antlists wrote:
Oh - the other thing - if it's PMR and you're copying files onto it,
expect a puke! That thing on WD Reds going PMR, I copied most of that on
to the linux raid mailing list and the general feeling I get is "PMR is
bad".
Whoops have I got my PMR and SMR mixe
On 06/06/2020 11:32, Michael wrote:
Of particular interest to me is recovery of encrypted files/partitions, using
a different installation than the original. Having to keep a copy of the
original installation kernel keys for ext4 with any data backups and
additionally remembering to refresh them
On Sat, Jun 6, 2020 at 9:57 AM antlists wrote:
>
> Oh - the other thing - if it's PMR and you're copying files onto it,
> expect a puke! That thing on WD Reds going PMR, I copied most of that on
> to the linux raid mailing list and the general feeling I get is "PMR is
> bad".
>
You're mixing up P
On 06/06/2020 05:37, Dale wrote:
> One other question, can one change the password every once in a while?
> Or once set, you stuck with it from then on?
A point I forgot to mention in my previous email is regarding passwords.
While most encryption methods will allow for a password change (CryFS
On 06/06/2020 08:49, Dale wrote:
First drive seems to have died. Got part way copying files and things
got interesting. When checking smartctrl, it even puked on my
keyboard. Drive only had a few hundred hours on it so maybe the drive
was iffy from the start or that enclosure did damage some
On 06/06/2020 12:05, Rich Freeman wrote:
> Usually you want the encryption as close to the disk as possible
> because if somebody gets your disk it gives them less to work with.
> They don't know that you have a logical volume called "home" on it,
> and so on.
I concur with Rich on this.
One of
Dale:
...
> Is there not a standard sized screw that should fit all 3.5" and even
> 2.5" drives??
...
The threads used is UNC 6-32 [1] and M3 [2], where the UNC ones are used
for 3.5" hard drives and M3 for CD and 2.5" drives. There might be others
also, but I havn't seen thoose.
The above just
On Sat, Jun 6, 2020 at 3:49 AM Dale wrote:
>
> Thanks for both replies. I found one other Gentoo one but it was encrypting
> the whole thing, /boot and all, plus they used efi. I didn't find the one
> you linked too.
The Gentoo guide that was linked uses an example of encrypting a partition.
On Saturday, 6 June 2020 08:49:54 BST Dale wrote:
> J. Roeleveld wrote:
> > On 6 June 2020 06:37:23 CEST, Dale wrote:
> >> Howdy,
> >>
> >> I think I got a old 3TB hard drive to work. After dd'ing it, redoing
> >> partitions and such, it seems to be working. Right now, I'm copying a
> >> bunch
On Saturday, 6 June 2020 04:06:54 BST Dale wrote:
> We have reds, purples, greens and all sort of color codes for hard
> drives, maybe they need to color code their screws as well. :/
>
> Now to go find a grab bag or something. This sucks.
Yes, getting the thread wrong and damaging the female
J. Roeleveld wrote:
> On 6 June 2020 06:37:23 CEST, Dale wrote:
>> Howdy,
>>
>> I think I got a old 3TB hard drive to work. After dd'ing it, redoing
>> partitions and such, it seems to be working. Right now, I'm copying a
>> bunch of data to it to see how it holds up. Oh, it's a PMR drive too.
On 6 June 2020 06:37:23 CEST, Dale wrote:
>Howdy,
>
>I think I got a old 3TB hard drive to work. After dd'ing it, redoing
>partitions and such, it seems to be working. Right now, I'm copying a
>bunch of data to it to see how it holds up. Oh, it's a PMR drive too.
>lol Once I'm pretty sure it
On 6 June 2020 06:37:23 CEST, Dale wrote:
>Howdy,
>
>I think I got a old 3TB hard drive to work. After dd'ing it, redoing
>partitions and such, it seems to be working. Right now, I'm copying a
>bunch of data to it to see how it holds up. Oh, it's a PMR drive too.
>lol Once I'm pretty sure it
41 matches
Mail list logo