In the meantime the following workaround may be used : creating a .fdi file corresponding to the encrypted volume's UUID and specifying a mountpoint (/etc/hal/fdi/policy/30user.fdi) copied from : http://webcvs.freedesktop.org/hal/hal/doc/conf/storage-policy-examples.fdi?revision=1.1 ).
Here my encrypted volume (replace "_WHATEVER_YOUR_VOLUME_UUID_IS_" by your volume's UUID) will be mounted as /media/my_crypted <?xml version="1.0" encoding="ISO-8859-1"?> <!-- -*- SGML -*- --> <deviceinfo version="0.2"> <device> <match key="block.is_volume" bool="true"> <match key="volume.fsusage" string="crypto"> <match key="volume.uuid" string="_WHATEVER_YOUR_VOLUME_UUID_IS_"> <merge key="volume.policy.desired_mount_point" type="string">my_crypted</merge> </match> </match> </match> </device> </deviceinfo> Hope this helps. Best regards, -- Olivier BERGER <[EMAIL PROTECTED]> Ingénieur Recherche - Dept INF INT Evry (http://www.int-evry.fr) OpenPGP-Id: 1024D/6B829EEC