Re: udisksctl unlock parameter for keyfiles

2012-09-12 Thread Raph
On Tue, Sep 11, 2012 at 03:17:47PM -0400, Sebastian Fischmeister wrote: > Cryptsetup requires root access and I don't want that for my backup > mechanism. Also I don't want to call sudo in a cron job. The encrypted > drive should be mountable by a regular user (e.g., automounting an > encrypted usb

Re: udisksctl unlock parameter for keyfiles

2012-09-12 Thread David Zeuthen
Hi, On Tue, Sep 11, 2012 at 3:17 PM, Sebastian Fischmeister wrote: > Cryptsetup requires root access and I don't want that for my backup > mechanism. Also I don't want to call sudo in a cron job. The encrypted > drive should be mountable by a regular user (e.g., automounting an > encrypted usb st

Re: udisksctl unlock parameter for keyfiles

2012-09-12 Thread David Zeuthen
Hi, On Wed, Sep 12, 2012 at 10:09 AM, Martin Pitt wrote: >> Is it difficult to mount an encrypted drive through dbus-send? It >> seems that there is an awful lot of details in the parameters that >> need to be just right. > > In that case it seems easier to use libudisks, possibly from > introspe

Re: udisksctl unlock parameter for keyfiles

2012-09-12 Thread Martin Pitt
Hello Sebastian, Sebastian Fischmeister [2012-09-12 9:32 -0400]: > Anyways, it seems that udisksctl doesn't support this feature. Right, it always reads passphrases from the terminal. > Is it difficult to mount an encrypted drive through dbus-send? It > seems that there is an awful lot of detai

Re: udisksctl unlock parameter for keyfiles

2012-09-12 Thread Sebastian Fischmeister
Thanks for the discussion so far. > However, the worrying part here is that in order to do this > noninteractively, you need to store the cleartext passphrase at a > place where the cron job can read it. What's the point of encrypting > your disks when the password is on a (proverbial) sticker rig