Displaying 20 results from an estimated 20000 matches similar to: "tmp option of crypttab"
2017 Jun 20
2
CentOS 6 and luksOpen
Leon Fauster wrote:
>> Am 20.06.2017 um 16:53 schrieb m.roth at 5-cent.us:
>>
>> Upgraded a RAID. Copied everything from backup.
>>
>> And then my manager said I had to encrypt the drive.
>>
>> I've done that, and made the filesystem, but I can't mount it.
>>
>> CentOS 6.
>> I have the entry in /etc/crypttab, and a key in
2017 Jun 20
0
CentOS 6 and luksOpen
> Am 20.06.2017 um 17:12 schrieb m.roth at 5-cent.us:
>
> Leon Fauster wrote:
>>> Am 20.06.2017 um 16:53 schrieb m.roth at 5-cent.us:
>>>
>>> Upgraded a RAID. Copied everything from backup.
>>>
>>> And then my manager said I had to encrypt the drive.
>>>
>>> I've done that, and made the filesystem, but I can't
2010 Jul 21
0
[PATCH] RFC: Encrypted swap support
(depends on Advance Storage Configuration patch)
This patch adds the option of requesting, at install time, that swap LVs be encrypted. The modifications include:
* Introduction of the ovirt_swap_encrypt install parameter
* Inclusion of all required packages
* Inclusion of required kernel modules
* Introduction of /etc/ovirt-crypttab to hold encrypted swap configuration (Couldn't use
2017 Jun 20
2
CentOS 6 and luksOpen
Upgraded a RAID. Copied everything from backup.
And then my manager said I had to encrypt the drive.
I've done that, and made the filesystem, but I can't mount it.
CentOS 6.
I have the entry in /etc/crypttab, and a key in /etc/crypt.pw, and the
luks UUID in /etc/fstab. I cannot find the command that tells it to create
the device in /dev/mapper from the info in /etc/crypttab.
Clues for
2015 Feb 10
1
LUKS on EL6 / enable block device after reboot
Is there an easy way (cli) to enable a luks encrypted partition
after reboot (a partition that was not enabled while booting,
because not in the crypttab).
I can execute the necessary command stack [1] but just wondering if
there is an "enterprise/easy" way to do that ...
[1] cryptsetup luksOpen $(blkid -t TYPE="crypto_LUKS" -o device) \
luks-$(cryptsetup luksUUID
2017 Jun 20
0
CentOS 6 and luksOpen
> Am 20.06.2017 um 16:53 schrieb m.roth at 5-cent.us:
>
> Upgraded a RAID. Copied everything from backup.
>
> And then my manager said I had to encrypt the drive.
>
> I've done that, and made the filesystem, but I can't mount it.
>
> CentOS 6.
> I have the entry in /etc/crypttab, and a key in /etc/crypt.pw, and the
> luks UUID in /etc/fstab. I cannot
2015 Mar 08
1
LVM encryption and new volume group
I'm sorry, but grep -i crypt /var/log/anaconda/anaconda.program.log
returns nothing. But I have got an entry in /etc/crypttab.
I only found this with grep -i luks /var/log/anaconda/anaconda.*:
/var/log/anaconda/anaconda.storage.log:20:47:55,959 DEBUG blivet:
LUKS.__init__:
/var/log/anaconda/anaconda.storage.log:20:49:25,009 DEBUG storage.ui:
LUKS.__init__:
2019 Jul 23
2
mdadm issue
Just rebuilt a C6 box last week as C7. Four drives, and sda and sdb for
root, with RAID-1 and luks encryption.
Layout:
lsblk
NAME MAJ:MIN RM SIZE RO TYPE
MOUNTPOINT
sda 8:0 0 931.5G 0 disk
??sda1 8:1 0 200M 0 part
/boot/efi
??sda2
2019 Jul 23
2
mdadm issue
Gordon Messmer wrote:
> On 7/23/19 11:12 AM, mark wrote:
>
>> Now, cryptsetup gives me the same UUID as I have in /etc/mdadm.conf.
>> The
>> entry in /etc/crypttab looks identical to the RAIDs for root and swap,
>> but nope.
>
>
> Can you post those files somewhere?? I'm confused by the idea that
> cryptsetup is involved in or using the same UUID as an
2015 Mar 06
0
LVM encryption and new volume group
On Thu, Mar 5, 2015 at 10:25 PM, Tim <lists at kiuni.de> wrote:
> Hi Chris,
>
> thanks for your answer.
>
> It is the first time I decided to encrypt my lvm. I choosed to encrypt the
> volume group, not every logical volume itself, because in case of doing lvm
> snapshots in that group they will be encrypted too?
Yes, anything that's COW'd is also encrypted in
2019 Jul 23
1
mdadm issue
> Am 23.07.2019 um 22:39 schrieb Gordon Messmer <gordon.messmer at gmail.com>:
>
> I still don't understand how this relates to md125. I don't see it referenced in mdadm.conf. It sounds like you see it in the output from lsblk, but only because you manually assembled it. Do you expect there to be a luks volume there?
To check:
cryptsetup isLuks <device>
2017 Jun 22
1
CentOS 6 and crypttab
Folks,
I have an issue: I've gotten that drive that I posted about the other
day encrypted, and things were looking good... until there was a
problem with another RAID attached to the box, and I wound up having to
reboot.
What had been /dev/sdb came up as /dev/sdc. So... is there any way
other than using /dev/disk/by-uuid/<uUUID> as the second field in
/etc/crypttab to deal with
2014 Nov 11
1
login fail on crypted /home
I have a fesh install of CentOS release 6.6 on my laptop. I want to use
a more secure config with /home crypted. But when this partition is
mounted I cannot login anymore on my laptop. Only root can login. This
occur at level 5 (graphic login) or 3 (text login). The message is
"Cannot enter home directory. Using /."
Logged as root I can create a new user (with useradd) and his home
2015 Mar 06
3
LVM encryption and new volume group
Hi Chris,
thanks for your answer.
It is the first time I decided to encrypt my lvm. I choosed to encrypt the volume group, not every logical volume itself, because in case of doing lvm snapshots in that group they will be encrypted too?
And how do I create a new encrypted volume group?
Regards
Tim
Am 6. M?rz 2015 01:58:23 MEZ, schrieb Chris Murphy <lists at colorremedies.com>:
>On
2015 Mar 06
1
LVM encryption and new volume group
On 03/05/2015 06:58 PM, Chris Murphy wrote:
> On Thu, Mar 5, 2015 at 2:09 PM, Tim <lists at kiuni.de> wrote:
>> Hello list,
>>
>> I bought a Thinkpad T420 and installed CentOS 7 recently.
>>
>> I choosed to use lvm encryption for the entire volume group. It works so far.
>>
>> But now I am planning to install a second hard disk. My thought is to
2018 Nov 26
0
NBDE, clevis and tang for non-root disk
Hi,
Has anybody managed to get network disk bound disk encryption to work with
a non-root disk? It works fine for the root device, but the moment I add
another volume to /etc/crypttab the system will no longer boot
automatically. A tcpdump on the tang server shows no traffic while the
system is stuck at the LUKS password prompt.
The second encrypted volume is set up in the same way as the root
2015 Mar 06
0
LVM encryption and new volume group
On Thu, Mar 5, 2015 at 2:09 PM, Tim <lists at kiuni.de> wrote:
> Hello list,
>
> I bought a Thinkpad T420 and installed CentOS 7 recently.
>
> I choosed to use lvm encryption for the entire volume group. It works so far.
>
> But now I am planning to install a second hard disk. My thought is to create a new volume group on this additional disk.
>
> But how can I
2020 Jun 16
1
LUKS layer / best practice
Also, if you want to use deduplication (via VDO) then you must
remember to "dedupe then encrypt"
Storage > LUKS > VDO > LVM
old but good reference to: https://access.redhat.com/articles/2106521
On Tue, Jun 16, 2020 at 3:00 PM Jason Edgecombe <jwedgeco at uncc.edu> wrote:
>
> I recommend having LUKS be "under" LVM. the layers would be:
> /dev/sda ->
2016 Nov 02
3
tool for a comprehensive list of the storage structure
I would like to have a smart cli tool, that shows a
comprehensive list about the local storage structure:
An output like:
/srv
/dev/mapper/luks-f85b7a2c-...: UUID="ca924fad-..." TYPE="ext4"
/dev/mapper/vg_internal_e-lv_internal_srv: UUID="f85b7a2c-..." TYPE="crypto_LUKS"
vg_internal_e
/dev/md3: UUID="1Fi2Ex-..."
2015 Apr 16
2
Centos 5 & tls v1.2, v1.1
Am 16.04.2015 um 11:46 schrieb Leon Fauster <leonfauster at googlemail.com>:
> Am 16.04.2015 um 11:43 schrieb Eero Volotinen <eero.volotinen at iki.fi>:
>> Is there any nice way to get tlsv1.2 support to centos 5?
>> upgrading os to 6 is not option available.
>
>
> Unfortunately not.
https://bugzilla.redhat.com/show_bug.cgi?id=1066914
--
LF