Setting up encrypted partition (AES-loopback)

Lennart Sorensen lsorense-1wCw9BSqJbv44Nm34jS7GywD8/FfD2ys at public.gmane.org
Tue Nov 21 20:21:44 UTC 2006


On Tue, Nov 21, 2006 at 12:14:24PM -0800, Mike Oliver wrote:
> Hey guys, sorry for the duplicate message, but the first time
> my message didn't get sent for a couple of days and then came
> out in the middle of a big dump of messages, which I think may
> be why no one responded to it, so I'm giving it another try.
> 
> I'm using Debian Sarge.  I've installed the loop-aes-utils,
> loop-aes-source, and loop-aes-ciphers-source commands, but they don't
> seem to come with any serious documentation (I can't even figure out
> what commands, if any, these packages are supposed to provide --
> shouldn't apt-cache be able to tell you that?  I can't figure out how.)
> 
> What documentation there is talks about building the kernel from
> source.  Why should I have to do that, given that loop-aes-utils is
> supposed to include a kernel module?
> 
> I'd also really like an explanation, in general terms, of what happens
> when you have an encrypted partition.  Do you provide the passphrase at
> mount time, or what?  What if your /bin and /usr/bin are on the
> encrypted partition?  Presumably you need to supply the passphrase at
> boot time, but does GRUB ask you for it, or what?

/usr/share/doc/loop-aes-source/README.* seems to cover how to build the
driver using module-assistant, and how to use it for various setups, and
things not to do with it.

--
Len Sorensen
--
The Toronto Linux Users Group.      Meetings: http://gtalug.org/
TLUG requests: Linux topics, No HTML, wrap text below 80 columns
How to UNSUBSCRIBE: http://gtalug.org/wiki/Mailing_lists





More information about the Legacy mailing list