Displaying 20 results from an estimated 10000 matches similar to: "extending ldlinux.sys to ask for a password"
2020 Mar 30
0
[PATCH 1/7] New APIs: cryptsetup-open and cryptsetup-close.
This commit deprecates luks-open/luks-open-ro/luks-close for the more
generic sounding names cryptsetup-open/cryptsetup-close, which also
correspond directly to the cryptsetup commands.
The optional cryptsetup-open readonly flag is used to replace the
functionality of luks-open-ro.
The optional cryptsetup-open crypttype parameter can be used to select
the type (corresponding to cryptsetup open
2020 Sep 07
0
[PATCH v2 1/7] New APIs: cryptsetup-open and cryptsetup-close.
This commit deprecates luks-open/luks-open-ro/luks-close for the more
generic sounding names cryptsetup-open/cryptsetup-close, which also
correspond directly to the cryptsetup commands.
The optional cryptsetup-open readonly flag is used to replace the
functionality of luks-open-ro.
The optional cryptsetup-open crypttype parameter can be used to select
the type (corresponding to cryptsetup open
2020 Sep 17
2
Re: [PATCH v2 1/7] New APIs: cryptsetup-open and cryptsetup-close.
On Monday, 7 September 2020 11:43:54 CEST Richard W.M. Jones wrote:
> This commit deprecates luks-open/luks-open-ro/luks-close for the more
> generic sounding names cryptsetup-open/cryptsetup-close, which also
> correspond directly to the cryptsetup commands.
>
> The optional cryptsetup-open readonly flag is used to replace the
> functionality of luks-open-ro.
>
> The
2011 Sep 22
0
CEBA-2011:0987 CentOS 5 x86_64 cryptsetup-luks Update
CentOS Errata and Bugfix Advisory 2011:0987
Upstream details at : https://rhn.redhat.com/errata/RHBA-2011-0987.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( md5sum Filename )
x86_64:
43373cbbed09bbc76a26cdee67af757f cryptsetup-luks-1.0.3-8.el5.i386.rpm
5d9d213b916577d8cd99cc194e583691 cryptsetup-luks-1.0.3-8.el5.x86_64.rpm
2017 Jun 20
2
CentOS 6 and luksOpen
Leon Fauster wrote:
>> Am 20.06.2017 um 16:53 schrieb m.roth at 5-cent.us:
>>
>> Upgraded a RAID. Copied everything from backup.
>>
>> And then my manager said I had to encrypt the drive.
>>
>> I've done that, and made the filesystem, but I can't mount it.
>>
>> CentOS 6.
>> I have the entry in /etc/crypttab, and a key in
2016 Dec 02
0
[PATCH] New API: cryptsetup_reencrypt: change the master volume key on LUKS partitions.
Note that cryptsetup-reencrypt is a separate package on Fedora, but is
already part of the appliance on Debian/Ubuntu.
---
appliance/packagelist.in | 1 +
daemon/luks.c | 46 ++++++++++++++++++++++++++++++++++++++++++++++
generator/actions.ml | 18 ++++++++++++++++++
gobject/Makefile.inc | 2 ++
src/MAX_PROC_NR | 2 +-
5 files changed, 68 insertions(+), 1
2011 Nov 26
1
damaged encrypted LUKS device
Hi people,
i had created encrypted device with cryptsetup/LUKS which i setup with
an ext4 filesystem. This device is an external USB harddisk. When i
plugin this device it will be automatically mounted by my gnome3 system
(Debian Wheezey/Testing), but this week i got an error. I did ask the
ask the LUKS developers what is the problem and they told me that this
is an ext4 problem.
The error
2017 Jun 20
0
CentOS 6 and luksOpen
> Am 20.06.2017 um 17:12 schrieb m.roth at 5-cent.us:
>
> Leon Fauster wrote:
>>> Am 20.06.2017 um 16:53 schrieb m.roth at 5-cent.us:
>>>
>>> Upgraded a RAID. Copied everything from backup.
>>>
>>> And then my manager said I had to encrypt the drive.
>>>
>>> I've done that, and made the filesystem, but I can't
2005 May 07
1
SYSLINUX: Cannot read ldlinux.sys
My question is the following:
I need to "syslinux" a harddisk(partition-type is FAT16, size is about
100mb). I created a Dos-Bootdisk with WindowsXP and removed everything
except command.com, io.sys and msdos.sys. Then I copied syslinux.com
(and even ldlinux.sys) to the disk but nothing seems to help, I always
get the "SYSLINUX: Cannot read ldlinux.sys"-error. Should I use
2015 Mar 08
1
LVM encryption and new volume group
I'm sorry, but grep -i crypt /var/log/anaconda/anaconda.program.log
returns nothing. But I have got an entry in /etc/crypttab.
I only found this with grep -i luks /var/log/anaconda/anaconda.*:
/var/log/anaconda/anaconda.storage.log:20:47:55,959 DEBUG blivet:
LUKS.__init__:
/var/log/anaconda/anaconda.storage.log:20:49:25,009 DEBUG storage.ui:
LUKS.__init__:
2011 Sep 22
0
CEBA-2011:0987 CentOS 5 i386 cryptsetup-luks Update
CentOS Errata and Bugfix Advisory 2011:0987
Upstream details at : https://rhn.redhat.com/errata/RHBA-2011-0987.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( md5sum Filename )
i386:
46b5fa919e72f7feeb280b43decc335e cryptsetup-luks-1.0.3-8.el5.i386.rpm
dfcf63435dbd6cdd8d1779514329cc4b cryptsetup-luks-devel-1.0.3-8.el5.i386.rpm
Source:
2015 Sep 14
1
LUKS encypted partition using --key-file can only be decrypted with --key-file
On 04/03/15 06:33 PM, Robert Nichols wrote:
> On 03/04/2015 03:16 PM, Digimer wrote:
>> -----BEGIN PGP SIGNED MESSAGE-----
>> Hash: SHA1
>>
>> Hi all,
>>
>> I created a LUKS encrypted partition via a udev-triggered script on
>> 6.6 using --key-file /tmp/foo. This worked fine, and I can decrypt the
>> LUKS partition via script and manually using
2020 Oct 12
0
Re: [PATCH v3 0/8] Windows BitLocker support.
On Fri, Oct 09, 2020 at 04:33:53PM +0100, Richard W.M. Jones wrote:
>On Fri, Oct 09, 2020 at 05:02:57PM +0200, Martin Kletzander wrote:
>> Basically what I did was create a small disk, create one partition
>> over the whole disk, then cryptsetup luksFormat the partition, open
>> it and format it with a filesystem (without any LVM). That is one
>> of the things you were
2020 Jan 21
0
Re: [PATCH 0/1] WIP: Support LUKS-encrypted partitions
On Tue, Jan 21, 2020 at 03:07:11PM +0100, Jan Synacek wrote:
> The following patch attempts to implement sparsification of
> LUKS-encrypted partitions. It uses lsblk to pair the underlying LUKS
> block device with its mapped name. Also, --allow-discards was added
> by default to luks_open().
>
> There are several potential issues that I can think of:
>
> 1) If and entire
2020 Oct 09
3
Re: [PATCH v3 0/8] Windows BitLocker support.
On Fri, Oct 09, 2020 at 05:02:57PM +0200, Martin Kletzander wrote:
> Basically what I did was create a small disk, create one partition
> over the whole disk, then cryptsetup luksFormat the partition, open
> it and format it with a filesystem (without any LVM). That is one
> of the things you were adding support for, but it is not limited to
> Windows Bitlocker setup, it can just
2020 Feb 24
0
Encrypted container on CentOS VPS
On 23/02/2020 19:06, H wrote:
> On 02/17/2020 05:03 AM, lejeczek via CentOS wrote:
>> On 16/02/2020 15:18, H wrote:
>>> I wonder if it is possible to set up an encrypted "file container" on a CentOS VPS? I am the root user of the VPS but the hosting company also has access to the VPS and thus all files. Is it possible to create a LUKS-container on the VPS and those
2015 Mar 06
0
LVM encryption and new volume group
On Thu, Mar 5, 2015 at 10:25 PM, Tim <lists at kiuni.de> wrote:
> Hi Chris,
>
> thanks for your answer.
>
> It is the first time I decided to encrypt my lvm. I choosed to encrypt the
> volume group, not every logical volume itself, because in case of doing lvm
> snapshots in that group they will be encrypted too?
Yes, anything that's COW'd is also encrypted in
2017 Jun 20
0
CentOS 6 and luksOpen
> Am 20.06.2017 um 16:53 schrieb m.roth at 5-cent.us:
>
> Upgraded a RAID. Copied everything from backup.
>
> And then my manager said I had to encrypt the drive.
>
> I've done that, and made the filesystem, but I can't mount it.
>
> CentOS 6.
> I have the entry in /etc/crypttab, and a key in /etc/crypt.pw, and the
> luks UUID in /etc/fstab. I cannot
2019 Jul 23
2
mdadm issue
Gordon Messmer wrote:
> On 7/23/19 11:12 AM, mark wrote:
>
>> Now, cryptsetup gives me the same UUID as I have in /etc/mdadm.conf.
>> The
>> entry in /etc/crypttab looks identical to the RAIDs for root and swap,
>> but nope.
>
>
> Can you post those files somewhere?? I'm confused by the idea that
> cryptsetup is involved in or using the same UUID as an
2019 Oct 17
0
Using Clevis/Tang (NBDE) to automatically decrypt volumes from within libguestfs
This is about Network-Bound Disk Encryption (NBDE) not to be confused
of course with NBD! NBDE is where you use disk encryption in your
virtual machines. But instead of having to type a passphrase when the
guest boots, there is a network server which gives out tokens, so as
long as the guest is booted from the trusted network it is able to
boot unattended.
In RHEL[1] we have three pieces of