similar to: luks ecrypted storage poll - lvm - possible?

Displaying 20 results from an estimated 5000 matches similar to: "luks ecrypted storage poll - lvm - possible?"

2018 Dec 21
1
Re: luks ecrypted storage poll - lvm - possible?
On Thu, Dec 20, 2018 at 04:57:41PM -0500, John Ferlan wrote: > > > On 12/20/18 11:56 AM, lejeczek wrote: > > hi everyone, > > > > do we get to encrypt lvm pools in/with libvirt? > > The pool or the volumes? > > > > > I'm on Centos 7.x but see mention of it, not even on the net. > > I have no idea which libvirt version is in Centos
2018 Dec 20
0
Re: luks ecrypted storage poll - lvm - possible?
On 12/20/18 11:56 AM, lejeczek wrote: > hi everyone, > > do we get to encrypt lvm pools in/with libvirt? The pool or the volumes? > > I'm on Centos 7.x but see mention of it, not even on the net. I have no idea which libvirt version is in Centos versions, but support was added in libvirt 3.9.0 (Nov. 2017) via commit 2518fd3b6a with a followup commit 9b837963 for libvirt
2015 Mar 04
2
LUKS encypted partition using --key-file can only be decrypted with --key-file
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi all, I created a LUKS encrypted partition via a udev-triggered script on 6.6 using --key-file /tmp/foo. This worked fine, and I can decrypt the LUKS partition via script and manually using --key-file with luksOpen. The odd problem is that I can't decrypt the partition using the prompt. If I manually create a file with the passphrase in it
2015 Feb 10
1
LUKS on EL6 / enable block device after reboot
Is there an easy way (cli) to enable a luks encrypted partition after reboot (a partition that was not enabled while booting, because not in the crypttab). I can execute the necessary command stack [1] but just wondering if there is an "enterprise/easy" way to do that ... [1] cryptsetup luksOpen $(blkid -t TYPE="crypto_LUKS" -o device) \ luks-$(cryptsetup luksUUID
2015 Sep 14
1
LUKS encypted partition using --key-file can only be decrypted with --key-file
On 04/03/15 06:33 PM, Robert Nichols wrote: > On 03/04/2015 03:16 PM, Digimer wrote: >> -----BEGIN PGP SIGNED MESSAGE----- >> Hash: SHA1 >> >> Hi all, >> >> I created a LUKS encrypted partition via a udev-triggered script on >> 6.6 using --key-file /tmp/foo. This worked fine, and I can decrypt the >> LUKS partition via script and manually using
2023 May 19
1
[libguestfs PATCH 3/3] LUKS-on-LVM inspection test: test /dev/mapper/VG-LV translation
On Fri, May 19, 2023 at 04:08:49PM +0200, Laszlo Ersek wrote: > In the LUKS-on-LVM inspection test, call the "check_filesystems" function > yet another time, now with such "--key" options that exercise the recent > "/dev/mapper/VG-LV" -> "/dev/VG/LV" translation (unescaping) from > libguestfs-common. > > Bugzilla:
2015 Mar 06
3
LVM encryption and new volume group
Hi Chris, thanks for your answer. It is the first time I decided to encrypt my lvm. I choosed to encrypt the volume group, not every logical volume itself, because in case of doing lvm snapshots in that group they will be encrypted too? And how do I create a new encrypted volume group? Regards Tim Am 6. M?rz 2015 01:58:23 MEZ, schrieb Chris Murphy <lists at colorremedies.com>: >On
2020 Jan 21
12
[PATCH 0/1] WIP: Support LUKS-encrypted partitions
The following patch attempts to implement sparsification of LUKS-encrypted partitions. It uses lsblk to pair the underlying LUKS block device with its mapped name. Also, --allow-discards was added by default to luks_open(). There are several potential issues that I can think of: 1) If and entire device is encrypted (not just one of more partitions), the lsblk trick might not work. 2) The
2017 Jun 20
2
CentOS 6 and luksOpen
Leon Fauster wrote: >> Am 20.06.2017 um 16:53 schrieb m.roth at 5-cent.us: >> >> Upgraded a RAID. Copied everything from backup. >> >> And then my manager said I had to encrypt the drive. >> >> I've done that, and made the filesystem, but I can't mount it. >> >> CentOS 6. >> I have the entry in /etc/crypttab, and a key in
2011 Apr 26
2
Password to be ecrypted?
Hi All; I am using Asterisk 1.8, how I can protect my self from hackers in case they was able to see my sip.conf file? I need the password to be encrypted, how? Regards Bilal
2014 Oct 22
5
Q. LUKS or ecryptfs-utils ?
I am now investigating encrypting our IMAP user spool files. Does anyone have experience with handling encrypted data stores using either or both of the subject methods and would care tio share their observations? Which is the preferred method (I know: it depends, but on what?)? What administrative pain does each cause? Our IMAP host is a KVM guest so spinning up a duplicate and simply
2023 Apr 14
2
ecrypting image file breaks efi/boot of the guest/Ubuntu - ?
On Fri, Apr 14, 2023 at 13:39:17 +0200, lejeczek wrote: > > > On 11/04/2023 09:13, Peter Krempa wrote: > > On Sat, Apr 08, 2023 at 11:25:18 +0200, lejeczek wrote: > > > Hi guys. > > > > > > I've have a guest and that guest differs from all other guest by: > > > > > > ? <os> > > > ??? <type arch='x86_64'
2020 Jan 22
3
[PATCH 1/1] sparsify: support LUKS-encrypted partitions
From: Jan Synacek <jan.synacek@redhat.com> --- daemon/listfs.ml | 19 ++++++++++++++++--- daemon/luks.c | 9 +++++---- generator/actions_core.ml | 3 ++- gobject/Makefile.inc | 2 ++ inspector/inspector.c | 2 +- sparsify/in_place.ml | 2 +- 6 files changed, 27 insertions(+), 10 deletions(-) diff --git a/daemon/listfs.ml b/daemon/listfs.ml index
2015 Mar 08
1
LVM encryption and new volume group
I'm sorry, but grep -i crypt /var/log/anaconda/anaconda.program.log returns nothing. But I have got an entry in /etc/crypttab. I only found this with grep -i luks /var/log/anaconda/anaconda.*: /var/log/anaconda/anaconda.storage.log:20:47:55,959 DEBUG blivet: LUKS.__init__: /var/log/anaconda/anaconda.storage.log:20:49:25,009 DEBUG storage.ui: LUKS.__init__:
2020 Jan 27
3
[PATCH v2 1/2] mltools, options: support --allow-discards when decrypting LUKS devices
--- mltools/tools_utils-c.c | 8 ++++---- mltools/tools_utils.ml | 6 +++--- mltools/tools_utils.mli | 8 ++++++-- options/decrypt.c | 5 +++-- options/inspect.c | 2 +- options/options.h | 2 +- 6 files changed, 18 insertions(+), 13 deletions(-) diff --git a/mltools/tools_utils-c.c b/mltools/tools_utils-c.c index 6c43b8d..1dcebc4 100644 --- a/mltools/tools_utils-c.c +++
2023 Apr 08
1
ecrypting image file breaks efi/boot of the guest/Ubuntu - ?
Hi guys. I've have a guest and that guest differs from all other guest by: ? <os> ??? <type arch='x86_64' machine='pc-q35-rhel9.0.0'>hvm</type> ??? <loader readonly='yes' secure='yes' type='pflash'>/usr/share/edk2/ovmf/OVMF_CODE.secboot.fd</loader> <nvram>/var/lib/libvirt/qemu/nvram/ubusrv1_VARS.fd</nvram>
2020 Feb 23
4
Encrypted container on CentOS VPS
On 02/17/2020 05:03 AM, lejeczek via CentOS wrote: > On 16/02/2020 15:18, H wrote: >> I wonder if it is possible to set up an encrypted "file container" on a CentOS VPS? I am the root user of the VPS but the hosting company also has access to the VPS and thus all files. Is it possible to create a LUKS-container on the VPS and those files only be accessible by me? IOW, most of
2023 Apr 14
1
ecrypting image file breaks efi/boot of the guest/Ubuntu - ?
On 11/04/2023 09:13, Peter Krempa wrote: > On Sat, Apr 08, 2023 at 11:25:18 +0200, lejeczek wrote: >> Hi guys. >> >> I've have a guest and that guest differs from all other guest by: >> >> ? <os> >> ??? <type arch='x86_64' machine='pc-q35-rhel9.0.0'>hvm</type> >> ??? <loader readonly='yes'
2019 Nov 12
1
[PATCH] tests: luks: Test the --key options.
Requires this series: https://www.redhat.com/archives/libguestfs/2019-November/msg00036.html
2017 Jun 20
2
CentOS 6 and luksOpen
Upgraded a RAID. Copied everything from backup. And then my manager said I had to encrypt the drive. I've done that, and made the filesystem, but I can't mount it. CentOS 6. I have the entry in /etc/crypttab, and a key in /etc/crypt.pw, and the luks UUID in /etc/fstab. I cannot find the command that tells it to create the device in /dev/mapper from the info in /etc/crypttab. Clues for