On Mon, Sep 22, 2008 at 07:22:44PM -0400, Rick Thomas wrote:
> Since top-posting is discouraged on this list, my comments are at the
> bottom of this email...
Right, but just scrolling to the bottom and typing your message is just
as bad IMO
[snip heaps of unnecessay text]
> I have the same qu
Since top-posting is discouraged on this list, my comments are at the
bottom of this email...
On Sep 21, 2008, at 12:32 AM, DanMitton wrote:
If I don't want to use "none" and be prompted for the passphrase,
how can I
do it? I have the passphrase on a USB thumb drive, but how do I
spe
If I don't want to use "none" and be prompted for the passphrase, how can I
do it? I have the passphrase on a USB thumb drive, but how do I specify the
key file name? /dev/sdc1/somedirectory/somefile ??
Cassiano Bertol Leal wrote:
>
> On Thu, Sep 4, 2008 at 5:23 PM, Alexander Golovin
> <[E
Hi Alexander,
you may want to look here for simple step by tep guide on how to
encrypt partitions with luks encryption.
http://www.linuxconfig.org/Partition_Encryption
On Sun, Sep 7, 2008 at 7:53 AM, markus reichelt <[EMAIL PROTECTED]> wrote:
>>On Thu, Sep 04, 2008 at 08:03:48PM +0200, Maciej Ko
>On Thu, Sep 04, 2008 at 08:03:48PM +0200, Maciej Korze? wrote:
>> Alexander Golovin wrote:
>>> [...]
>>> 2. Created the cryptographic device mapper: cryptsetup -y
>>> create crypt /dev/hda6 (entered passphrase twice) [...]
>>
>> cryptoloop is not the best choice:
>> http://mareichelt.de/pub/texts.
On Thu, 4 Sep 2008 17:48:34 -0300
"Cassiano Leal" <[EMAIL PROTECTED]> wrote:
> options, refer to "man /etc/crypttab"
>
> My guess is that if you correct your step 3 to include all four
> fields in /etc/crypttab you will be automatically asked for the
> passphrase next time you boot the machine, s
I've used cryptsetup with luks options, saved new data, rebooted my
system, asked about passphrase in the boot level, and now I have mounted
my crypto partition with saved data.
That's what I did step by step:
1. I've added modules: aes, dm_mod, dm_crypt, to /etc/modules
2. Created the cryptog
On Thu, Sep 4, 2008 at 5:23 PM, Alexander Golovin <[EMAIL PROTECTED]>wrote:
>
> Hi Cassiano!
Hi!
> You've written:
> "a far as I know the mapping should be recreated each time you reboot
> using /sbin/cryptsetup. We are using luks extension and at each reboot
> we need to issue cryptsetup luk
Hi Cassiano!
You've written:
"a far as I know the mapping should be recreated each time you reboot
using /sbin/cryptsetup. We are using luks extension and at each reboot
we need to issue cryptsetup luksOpen .
/etc/crypttab should make the use of this command unecessary. The
passphrase will th
On Thu, Sep 04, 2008 at 08:03:48PM +0200, Maciej Korzeń wrote:
> Alexander Golovin wrote:
>> [...]
>> 2. Created the cryptographic device mapper: cryptsetup -y create crypt
>> /dev/hda6 (entered passphrase twice)
>> [...]
>
> cryptoloop is not the best choice:
> http://mareichelt.de/pub/texts.cryp
On Thu, Sep 4, 2008 at 2:48 PM, Andrea Bicciolo <[EMAIL PROTECTED]>wrote:
> Alexander,
>
> a far as I know the mapping should be recreated each time you reboot using
> /sbin/cryptsetup. We are using luks extension and at each reboot we need to
> issue cryptsetup luksOpen .
/etc/crypttab should
Alexander Golovin wrote:
[...]
2. Created the cryptographic device mapper: cryptsetup -y create crypt
/dev/hda6 (entered passphrase twice)
[...]
cryptoloop is not the best choice:
http://mareichelt.de/pub/texts.cryptoloop.php.
:-)
--
Maciej Korzeń
[EMAIL PROTECTED], [EMAIL PROTECTED]
--
T
Alexander,
a far as I know the mapping should be recreated each time you reboot
using /sbin/cryptsetup. We are using luks extension and at each reboot
we need to issue cryptsetup luksOpen .
Then we can mount /dev/mapper/mappername.
Hope this help,
Andrea
Alexander Golovin ha scritto:
I w
On Thu, Sep 4, 2008 at 2:25 PM, Alexander Golovin <[EMAIL PROTECTED]>wrote:
>
> I was trying to encrypt my ext3 partition /dev/hda6, that's what I did:
>
> 1. I've added modules: aes, dm_mod, dm_crypt, to /etc/modules
> 2. Created the cryptographic device mapper: cryptsetup -y create crypt
> /dev
14 matches
Mail list logo