similar to: LVM encryption and new volume group

Displaying 20 results from an estimated 10000 matches similar to: "LVM encryption and new volume group"

2015 Mar 06
3
LVM encryption and new volume group
Hi Chris, thanks for your answer. It is the first time I decided to encrypt my lvm. I choosed to encrypt the volume group, not every logical volume itself, because in case of doing lvm snapshots in that group they will be encrypted too? And how do I create a new encrypted volume group? Regards Tim Am 6. M?rz 2015 01:58:23 MEZ, schrieb Chris Murphy <lists at colorremedies.com>: >On
2015 Mar 06
1
LVM encryption and new volume group
On 03/05/2015 06:58 PM, Chris Murphy wrote: > On Thu, Mar 5, 2015 at 2:09 PM, Tim <lists at kiuni.de> wrote: >> Hello list, >> >> I bought a Thinkpad T420 and installed CentOS 7 recently. >> >> I choosed to use lvm encryption for the entire volume group. It works so far. >> >> But now I am planning to install a second hard disk. My thought is to
2015 Mar 08
1
LVM encryption and new volume group
I'm sorry, but grep -i crypt /var/log/anaconda/anaconda.program.log returns nothing. But I have got an entry in /etc/crypttab. I only found this with grep -i luks /var/log/anaconda/anaconda.*: /var/log/anaconda/anaconda.storage.log:20:47:55,959 DEBUG blivet: LUKS.__init__: /var/log/anaconda/anaconda.storage.log:20:49:25,009 DEBUG storage.ui: LUKS.__init__:
2015 Mar 06
0
LVM encryption and new volume group
On Thu, Mar 5, 2015 at 2:09 PM, Tim <lists at kiuni.de> wrote: > Hello list, > > I bought a Thinkpad T420 and installed CentOS 7 recently. > > I choosed to use lvm encryption for the entire volume group. It works so far. > > But now I am planning to install a second hard disk. My thought is to create a new volume group on this additional disk. > > But how can I
2015 Mar 07
2
How to install tp_smapi and acpi_call kernel modules
Hello, I've got a Thinkpad T420 and would like to use full tlp functionality. Therefore I need the kernel module tp_smapi and acpi_call. Have a look right here: http://linrunner.de/en/tlp/docs/tlp-linux-advanced-power-management.html#installation There are only fedora related packages but none for RHEL/CentOS. Should I install that repo and hardcode the mirror to the fc21 repo? Regards Tim
2015 Mar 07
1
How to install tp_smapi and acpi_call kernel modules
Thanks for your answer. tlp and tlp-rdw are already installed from epel. But these packages miss that kernel modules. So when I want these I have to add the repo and replace $release in the mirror url with 21 of fedora, right? Am 7. M?rz 2015 15:39:14 MEZ, schrieb Bob Marcan <bob.marcan at gmail.com>: >On Sat, 07 Mar 2015 12:52:27 +0100 >Tim <lists at kiuni.de> wrote: >
2014 Oct 22
5
Q. LUKS or ecryptfs-utils ?
I am now investigating encrypting our IMAP user spool files. Does anyone have experience with handling encrypted data stores using either or both of the subject methods and would care tio share their observations? Which is the preferred method (I know: it depends, but on what?)? What administrative pain does each cause? Our IMAP host is a KVM guest so spinning up a duplicate and simply
2015 Mar 06
0
LVM encryption and new volume group
On Thu, Mar 5, 2015 at 10:25 PM, Tim <lists at kiuni.de> wrote: > Hi Chris, > > thanks for your answer. > > It is the first time I decided to encrypt my lvm. I choosed to encrypt the > volume group, not every logical volume itself, because in case of doing lvm > snapshots in that group they will be encrypted too? Yes, anything that's COW'd is also encrypted in
2019 Nov 26
6
[PATCH options v2 0/3] options: Allow multiple and default --key parameters.
v1: https://www.redhat.com/archives/libguestfs/2019-November/msg00036.html
2018 Nov 27
1
NBDE, clevis and tang for non-root disk
Radu Radutiu wrote: > On Tue, Nov 27, 2018 at 3:14 PM mark <m.roth at 5-cent.us> wrote: > >> What we do is to have the encryption key of the secondary filesystem in >> /etc/crypttab, which is, of course, 600. As it boots, it decrypts from >> that as it mounts the rest of the system. >> > Thanks, this is working as expected and it gave me the hint needed to
2008 Oct 15
2
Encrypting tmp swap and home
Hi everyone, I added a page under the HowTos for Encryption, and then added a guide for encrypting /tmp /swap and /home using cryptsetup and LUKS keys on LVM, when you already have partitions setup. http://wiki.centos.org/HowTos/EncryptTmpSwapHome Regards, Max
2015 Mar 04
2
LUKS encypted partition using --key-file can only be decrypted with --key-file
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi all, I created a LUKS encrypted partition via a udev-triggered script on 6.6 using --key-file /tmp/foo. This worked fine, and I can decrypt the LUKS partition via script and manually using --key-file with luksOpen. The odd problem is that I can't decrypt the partition using the prompt. If I manually create a file with the passphrase in it
2007 Sep 17
3
Sourcing encrypted files
Colleagues, I have an unusual problem; I am wondering whether anyone has dealt with it and found a solution. I have a script that needs to be encrypted. R will then be run on the script. There are various means to decrypt the file, some of which leave the decrypted code on the hard drive for an excessive period. One means that I have considered to deal with this is the following
2019 Nov 26
1
Re: [PATCH common v2 3/3] options: Allow default --key parameters.
Hi Rich and Pino, Commenting after a test. I've installed a RHEL 7 virtual machine with 2 disks, using the graphical installer. During the installation, I selected the 2 disks as well as encryption checkbox. It asked me for only one password. After the installation, when the machine boots, it asks for the password (showing a device UUID) only once. When connected as root, I can see that there
2019 Nov 29
8
[PATCH 0/1] Allow UUIDs for --key identifiers.
This combined patch series enables to decrypt LUKS devices on inspection by allowing the UUID of the LUKS device with the --key syntax. I opted for reusing the option instead of adding another one, as I think that device names and UUIDs are different enough that can be properly distinguished. A test for this (patch #4) can be applied only when the patches for common are applied, and the
2017 Jun 20
2
CentOS 6 and luksOpen
Leon Fauster wrote: >> Am 20.06.2017 um 16:53 schrieb m.roth at 5-cent.us: >> >> Upgraded a RAID. Copied everything from backup. >> >> And then my manager said I had to encrypt the drive. >> >> I've done that, and made the filesystem, but I can't mount it. >> >> CentOS 6. >> I have the entry in /etc/crypttab, and a key in
2010 Feb 02
3
dm-crypt/LUKS the state of the art for block device encryption?
it's been a while since i've played with filesystem encryption so, on centos 5.4 (and other linux distros), is dm-crypt/LUKS considered to be the state of the art WRT encryption? i remember other solutions like loop-aes and others, but what's considered the gold standard these days? rday -- ======================================================================== Robert P. J. Day
2017 Jun 20
2
CentOS 6 and luksOpen
Upgraded a RAID. Copied everything from backup. And then my manager said I had to encrypt the drive. I've done that, and made the filesystem, but I can't mount it. CentOS 6. I have the entry in /etc/crypttab, and a key in /etc/crypt.pw, and the luks UUID in /etc/fstab. I cannot find the command that tells it to create the device in /dev/mapper from the info in /etc/crypttab. Clues for
2018 Sep 19
5
[PATCH 0/2] RFC: --key option for tools
Hi, the following series adds a --key option in the majority of tools: this makes it possible to pass LUKS credentials programmatically, avoid the need to manually input them, or unsafely pass them via stdin. Thanks, Pino Toscano (2): mltools: create a cmdline_options struct Introduce a --key option in tools that accept keys builder/cmdline.ml | 2 +-
2020 Mar 30
9
[PATCH 0/7] Support Windows BitLocker (RHBZ#1808977).
These commits, along with the associated changes to common: https://www.redhat.com/archives/libguestfs/2020-March/msg00286.html support the transparent decryption and inspection of Windows guests encrypted with BitLocker encryption. To do the BitLocker decryption requires cryptsetup 2.3.0 (although cryptsetup 2.3 is not required for existing LUKS use). It also requires a new-ish Linux kernel, I