Displaying 20 results from an estimated 37 matches for "luksopened".
Did you mean:
luksopen
2017 Jun 20
2
CentOS 6 and luksOpen
Leon Fauster wrote:
>> Am 20.06.2017 um 16:53 schrieb m.roth at 5-cent.us:
>>
>> Upgraded a RAID. Copied everything from backup.
>>
>> And then my manager said I had to encrypt the drive.
>>
>> I've done that, and made the filesystem, but I can't mount it.
>>
>> CentOS 6.
>> I have the entry in /etc/crypttab, and a key in
2017 Jun 20
2
CentOS 6 and luksOpen
Upgraded a RAID. Copied everything from backup.
And then my manager said I had to encrypt the drive.
I've done that, and made the filesystem, but I can't mount it.
CentOS 6.
I have the entry in /etc/crypttab, and a key in /etc/crypt.pw, and the
luks UUID in /etc/fstab. I cannot find the command that tells it to create
the device in /dev/mapper from the info in /etc/crypttab.
Clues for
2017 Jun 20
0
CentOS 6 and luksOpen
> Am 20.06.2017 um 17:12 schrieb m.roth at 5-cent.us:
>
> Leon Fauster wrote:
>>> Am 20.06.2017 um 16:53 schrieb m.roth at 5-cent.us:
>>>
>>> Upgraded a RAID. Copied everything from backup.
>>>
>>> And then my manager said I had to encrypt the drive.
>>>
>>> I've done that, and made the filesystem, but I can't
2017 Jun 20
0
CentOS 6 and luksOpen
> Am 20.06.2017 um 16:53 schrieb m.roth at 5-cent.us:
>
> Upgraded a RAID. Copied everything from backup.
>
> And then my manager said I had to encrypt the drive.
>
> I've done that, and made the filesystem, but I can't mount it.
>
> CentOS 6.
> I have the entry in /etc/crypttab, and a key in /etc/crypt.pw, and the
> luks UUID in /etc/fstab. I cannot
2019 Oct 04
0
FYI: cryptsetup luksOpen now requires loads of RAM
https://gitlab.com/cryptsetup/cryptsetup/issues/488
This prevents virt-* tools from opening encrypted partitions
automatically.
Even 1024M isn't sufficient. I had to bump the memory up to 1400M to
make it work, which is just too big for routine use. Even worse if
the RAM size isn't quite large enough (eg 1200M) cryptsetup crashes.
I'm not sure what to do about this now. The worst
2015 Sep 14
1
LUKS encypted partition using --key-file can only be decrypted with --key-file
On 04/03/15 06:33 PM, Robert Nichols wrote:
> On 03/04/2015 03:16 PM, Digimer wrote:
>> -----BEGIN PGP SIGNED MESSAGE-----
>> Hash: SHA1
>>
>> Hi all,
>>
>> I created a LUKS encrypted partition via a udev-triggered script on
>> 6.6 using --key-file /tmp/foo. This worked fine, and I can decrypt the
>> LUKS partition via script and manually using
2015 Mar 04
2
LUKS encypted partition using --key-file can only be decrypted with --key-file
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hi all,
I created a LUKS encrypted partition via a udev-triggered script on
6.6 using --key-file /tmp/foo. This worked fine, and I can decrypt the
LUKS partition via script and manually using --key-file with luksOpen.
The odd problem is that I can't decrypt the partition using the
prompt. If I manually create a file with the passphrase in it
2018 Dec 20
2
luks ecrypted storage poll - lvm - possible?
hi everyone,
do we get to encrypt lvm pools in/with libvirt?
I'm on Centos 7.x but see mention of it, not even on the net.
Or in other words - can guests(lxc I'm thinking of) run off ecrypted lvm
where at least the part when dev gets luksOpened is taken care of by
libvirt?
many thanks, L.
2015 Feb 10
1
LUKS on EL6 / enable block device after reboot
Is there an easy way (cli) to enable a luks encrypted partition
after reboot (a partition that was not enabled while booting,
because not in the crypttab).
I can execute the necessary command stack [1] but just wondering if
there is an "enterprise/easy" way to do that ...
[1] cryptsetup luksOpen $(blkid -t TYPE="crypto_LUKS" -o device) \
luks-$(cryptsetup luksUUID
2008 Oct 15
2
Encrypting tmp swap and home
Hi everyone,
I added a page under the HowTos for Encryption, and then added a guide
for encrypting /tmp /swap and /home using cryptsetup and LUKS keys on
LVM, when you already have partitions setup.
http://wiki.centos.org/HowTos/EncryptTmpSwapHome
Regards,
Max
2008 Aug 28
3
potential wiki on encryption
Hello all,
I posted the whole disk encryption instructions in the forum that has been briefly discussed on the list. I joined the list per Ned's post on the thread.
http://www.centos.org/modules/newbb/viewtopic.php?viewmode=flat&topic_id=15923&forum=42
I have a couple of questions about the process of creating a wiki.
1. How does the peer-review process work?
2. Is there a place
2018 Dec 21
1
Re: luks ecrypted storage poll - lvm - possible?
...3b6a with a
> followup commit 9b837963 for libvirt 4.5.0 (June 2018) to "further
> clarify" that only LUKS encryption is supported.
>
> >
> > Or in other words - can guests(lxc I'm thinking of) run off ecrypted lvm
> > where at least the part when dev gets luksOpened is taken care of by
> > libvirt?
>
> It should work with the appropriate secret and volume being used.
Only for the QEMU driver. AFAIR, we never wired up any luks support
into the LXC driver.
Regards,
Daniel
--
|: https://berrange.com -o- https://www.flickr.com/photos/dberra...
2011 Aug 08
1
virt-manager - how to add /dev/mapper as a storage pool
Hi,
I would like to be able to configure VMs running off dm-crypt devices
that were unlocked in the host. Unlocked dm-crypt devices show up in
/dev/mapper/devicename, with devicename being the second parameter
given to cryptsetup luksOpen.
The LVM storage pool type insists on searching in /dev/vgname and
cannot be tricked into reading /dev/mapper by giving it a fake VG
named mapper; the LVM
2015 Mar 06
3
LVM encryption and new volume group
Hi Chris,
thanks for your answer.
It is the first time I decided to encrypt my lvm. I choosed to encrypt the volume group, not every logical volume itself, because in case of doing lvm snapshots in that group they will be encrypted too?
And how do I create a new encrypted volume group?
Regards
Tim
Am 6. M?rz 2015 01:58:23 MEZ, schrieb Chris Murphy <lists at colorremedies.com>:
>On
2020 Jan 21
12
[PATCH 0/1] WIP: Support LUKS-encrypted partitions
The following patch attempts to implement sparsification of
LUKS-encrypted partitions. It uses lsblk to pair the underlying LUKS
block device with its mapped name. Also, --allow-discards was added
by default to luks_open().
There are several potential issues that I can think of:
1) If and entire device is encrypted (not just one of more partitions),
the lsblk trick might not work.
2) The
2020 Sep 17
2
Re: [PATCH v2 1/7] New APIs: cryptsetup-open and cryptsetup-close.
On Monday, 7 September 2020 11:43:54 CEST Richard W.M. Jones wrote:
> This commit deprecates luks-open/luks-open-ro/luks-close for the more
> generic sounding names cryptsetup-open/cryptsetup-close, which also
> correspond directly to the cryptsetup commands.
>
> The optional cryptsetup-open readonly flag is used to replace the
> functionality of luks-open-ro.
>
> The
2020 Jan 21
0
[PATCH 1/1] WIP: sparsify: Support LUKS-encrypted partitions
---
daemon/listfs.ml | 18 +++++++++++++++---
daemon/luks.c | 1 +
2 files changed, 16 insertions(+), 3 deletions(-)
diff --git a/daemon/listfs.ml b/daemon/listfs.ml
index bf4dca6d4..48880f2e5 100644
--- a/daemon/listfs.ml
+++ b/daemon/listfs.ml
@@ -19,6 +19,7 @@
open Printf
open Std_utils
+open Utils
(* Enumerate block devices (including MD, LVM, LDM and partitions) and use
*
2018 Dec 20
0
Re: luks ecrypted storage poll - lvm - possible?
...(Nov. 2017) via commit 2518fd3b6a with a
followup commit 9b837963 for libvirt 4.5.0 (June 2018) to "further
clarify" that only LUKS encryption is supported.
>
> Or in other words - can guests(lxc I'm thinking of) run off ecrypted lvm
> where at least the part when dev gets luksOpened is taken care of by
> libvirt?
It should work with the appropriate secret and volume being used.
John
>
> many thanks, L.
>
> _______________________________________________
> libvirt-users mailing list
> libvirt-users@redhat.com
> https://www.redhat.com/mailman/listinf...
2015 Mar 06
0
LVM encryption and new volume group
On Thu, Mar 5, 2015 at 10:25 PM, Tim <lists at kiuni.de> wrote:
> Hi Chris,
>
> thanks for your answer.
>
> It is the first time I decided to encrypt my lvm. I choosed to encrypt the
> volume group, not every logical volume itself, because in case of doing lvm
> snapshots in that group they will be encrypted too?
Yes, anything that's COW'd is also encrypted in
2015 Mar 04
0
LUKS encypted partition using --key-file can only be decrypted with --key-file
On 03/04/2015 03:16 PM, Digimer wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> Hi all,
>
> I created a LUKS encrypted partition via a udev-triggered script on
> 6.6 using --key-file /tmp/foo. This worked fine, and I can decrypt the
> LUKS partition via script and manually using --key-file with luksOpen.
>
> The odd problem is that I can't