Eduardo M KALINOWSKI escreveu:
> I intend to use encrypted partitions in my new system, probably
> using dm-crypt with the suggested settings. I understand this will have
> an impact on performance, but how big it is? I'm talking about a Core 2
> Duo E8400 (@ 3.0GHz) with 2Gb of RAM. Will it be
Giorgos D. Pallas wrote:
> Eduardo M KALINOWSKI wrote:
>> I intend to use encrypted partitions in my new system, probably
>> using dm-crypt with the suggested settings. I understand this will have
>> an impact on performance, but how big it is? I'm talking about a Core 2
>> Duo E8400 (@ 3.0GHz
Eduardo M KALINOWSKI wrote:
> I intend to use encrypted partitions in my new system, probably
> using dm-crypt with the suggested settings. I understand this will have
> an impact on performance, but how big it is? I'm talking about a Core 2
> Duo E8400 (@ 3.0GHz) with 2Gb of RAM. Will it be re
Sam Kuper wrote:
> I don't know about dm-crypt performance, but you might be interested
> in seeing the TrueCrypt benchmarks posted here:
> http://www.truecrypt.org/screenshots2.ph
Interesting. It just lacks an "unencrypted" test for comparison. :-)
Those values are considerably above the maximum
2008/10/23 Eduardo M KALINOWSKI <[EMAIL PROTECTED]>
>
>I intend to use encrypted partitions in my new system, probably
> using dm-crypt with the suggested settings. I understand this will have
> an impact on performance, but how big it is? I'm talking about a Core 2
> Duo E8400 (@ 3.0GHz) with
On Mon, Sep 22, 2008 at 07:22:44PM -0400, Rick Thomas wrote:
> Since top-posting is discouraged on this list, my comments are at the
> bottom of this email...
Right, but just scrolling to the bottom and typing your message is just
as bad IMO
[snip heaps of unnecessay text]
> I have the same qu
Since top-posting is discouraged on this list, my comments are at the
bottom of this email...
On Sep 21, 2008, at 12:32 AM, DanMitton wrote:
If I don't want to use "none" and be prompted for the passphrase,
how can I
do it? I have the passphrase on a USB thumb drive, but how do I
spe
If I don't want to use "none" and be prompted for the passphrase, how can I
do it? I have the passphrase on a USB thumb drive, but how do I specify the
key file name? /dev/sdc1/somedirectory/somefile ??
Cassiano Bertol Leal wrote:
>
> On Thu, Sep 4, 2008 at 5:23 PM, Alexander Golovin
> <[E
Hi Alexander,
you may want to look here for simple step by tep guide on how to
encrypt partitions with luks encryption.
http://www.linuxconfig.org/Partition_Encryption
On Sun, Sep 7, 2008 at 7:53 AM, markus reichelt <[EMAIL PROTECTED]> wrote:
>>On Thu, Sep 04, 2008 at 08:03:48PM +0200, Maciej Ko
>On Thu, Sep 04, 2008 at 08:03:48PM +0200, Maciej Korze? wrote:
>> Alexander Golovin wrote:
>>> [...]
>>> 2. Created the cryptographic device mapper: cryptsetup -y
>>> create crypt /dev/hda6 (entered passphrase twice) [...]
>>
>> cryptoloop is not the best choice:
>> http://mareichelt.de/pub/texts.
On Thu, 4 Sep 2008 17:48:34 -0300
"Cassiano Leal" <[EMAIL PROTECTED]> wrote:
> options, refer to "man /etc/crypttab"
>
> My guess is that if you correct your step 3 to include all four
> fields in /etc/crypttab you will be automatically asked for the
> passphrase next time you boot the machine, s
I've used cryptsetup with luks options, saved new data, rebooted my
system, asked about passphrase in the boot level, and now I have mounted
my crypto partition with saved data.
That's what I did step by step:
1. I've added modules: aes, dm_mod, dm_crypt, to /etc/modules
2. Created the cryptog
On Thu, Sep 4, 2008 at 5:23 PM, Alexander Golovin <[EMAIL PROTECTED]>wrote:
>
> Hi Cassiano!
Hi!
> You've written:
> "a far as I know the mapping should be recreated each time you reboot
> using /sbin/cryptsetup. We are using luks extension and at each reboot
> we need to issue cryptsetup luk
Hi Cassiano!
You've written:
"a far as I know the mapping should be recreated each time you reboot
using /sbin/cryptsetup. We are using luks extension and at each reboot
we need to issue cryptsetup luksOpen .
/etc/crypttab should make the use of this command unecessary. The
passphrase will th
On Thu, Sep 04, 2008 at 08:03:48PM +0200, Maciej Korzeń wrote:
> Alexander Golovin wrote:
>> [...]
>> 2. Created the cryptographic device mapper: cryptsetup -y create crypt
>> /dev/hda6 (entered passphrase twice)
>> [...]
>
> cryptoloop is not the best choice:
> http://mareichelt.de/pub/texts.cryp
On Thu, Sep 4, 2008 at 2:48 PM, Andrea Bicciolo <[EMAIL PROTECTED]>wrote:
> Alexander,
>
> a far as I know the mapping should be recreated each time you reboot using
> /sbin/cryptsetup. We are using luks extension and at each reboot we need to
> issue cryptsetup luksOpen .
/etc/crypttab should
Alexander Golovin wrote:
[...]
2. Created the cryptographic device mapper: cryptsetup -y create crypt
/dev/hda6 (entered passphrase twice)
[...]
cryptoloop is not the best choice:
http://mareichelt.de/pub/texts.cryptoloop.php.
:-)
--
Maciej Korzeń
[EMAIL PROTECTED], [EMAIL PROTECTED]
--
T
Alexander,
a far as I know the mapping should be recreated each time you reboot
using /sbin/cryptsetup. We are using luks extension and at each reboot
we need to issue cryptsetup luksOpen .
Then we can mount /dev/mapper/mappername.
Hope this help,
Andrea
Alexander Golovin ha scritto:
I w
On Thu, Sep 4, 2008 at 2:25 PM, Alexander Golovin <[EMAIL PROTECTED]>wrote:
>
> I was trying to encrypt my ext3 partition /dev/hda6, that's what I did:
>
> 1. I've added modules: aes, dm_mod, dm_crypt, to /etc/modules
> 2. Created the cryptographic device mapper: cryptsetup -y create crypt
> /dev
> This means you've the wrong password.
>
> Common reasons are different keyboard setups or differences in the key
> generation algorithms between SuSE's twofish and cryptoapi. Take a
> SuSE-Kernel and their version of losetup and type the password on the
> console, to verify the keymapping.
I re
20 matches
Mail list logo