Package: installation-reports Boot method: businesscard ISO Image version: 2006-08-07 build from http://cdimage.debian.org/cdimage/daily-builds/sid_d-i/arch-latest/i386/iso-cd/debian-testing-i386-businesscard.iso
Machine: VMWare Player 1.0.1 build-19317 Memory: 128MB Partitions: Filesystem Type 1K-blocks Used Available Use% Mounted on /dev/mapper/crypt0 ext3 917414 270869 597600 32% / tmpfs tmpfs 63580 0 63580 0% /dev/shm /dev/sda2 ext3 45162 10727 32026 26% /boot /dev/mapper/crypt1 ext3 89361 4127 80466 5% /srv tmpfs tmpfs 10240 100 10140 1% /dev # /etc/fstab: static file system information. # # <file system> <mount point> <type> <options> <dump> <pass> proc /proc proc defaults 0 0 /dev/mapper/crypt0 / ext3 defaults,errors=remount-ro 0 1 /dev/sda2 /boot ext3 defaults 0 2 /dev/mapper/crypt1 /srv ext3 defaults 0 2 /dev/sda5 none swap sw,loop=/dev/loop0,encryption=serpent128 0 0 /dev/hdc /media/cdrom0 udf,iso9660 user,noauto 0 0 /dev/fd0 /media/floppy0 auto rw,user,noauto 0 0 /etc/crypttab: crypt0 /dev/sda1 none luks crypt1 /dev/sda3 none luks cryptsetup status crypt{0,1}: /dev/mapper/crypt0 is active: cipher: aes-cbc-essiv:sha256 keysize: 256 bits device: /dev/.static/dev/sda1 offset: 2056 sectors size: 1957811 sectors mode: read/write /dev/mapper/crypt1 is active: cipher: blowfish-cbc-essiv:sha256 keysize: 256 bits device: /dev/.static/dev/sda3 offset: 2056 sectors size: 190724 sectors mode: read/write losetup -a: /dev/loop/0: [000c]:4381 (/dev/sda5) offset=4096 encryption=serpent128 multi-key-v3 /proc/swaps: Filename Type Size Used Priority /dev/loop0 partition 96344 0 -1 Initial boot worked: [O] Configure network HW: [O] Config network: [O] Detect CD: [O] Load installer modules: [O] Detect hard drives: [O] Partition hard drives: [O] Create file systems: [O] Mount partitions: [O] Install base system: [O] Install boot loader: [O] Reboot: [O] This install was focused on testing installation onto dm-crypt encrypted root partition. 1. For dm-crypt I could choose the blowfish cipher with a keysize of 448 bits. The blowfish kernel module supports such a large keysize, but unfortunately cryptsetup is not too happy about it and segfaults during luksOpen of the device. It was possible to continue the installation after changing the keysize to 256 bits. (Bug#381973) cheers, Max -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]