CentOS 5 :: How To Deactivate Disk Encryption

Aug 2, 2009

i want to deactivate disk encryption. How can i do that?

View 1 Replies


ADVERTISEMENT

Server :: Disk Encryption Vs Performance?

Jan 29, 2010

how much of a performance impact full disk encryption (say, AES 256-bit) has on disk-related activities? On one particular project I'm involved in I am trying to weigh out security vs performance issues.

View 1 Replies View Related

Red Hat :: Best Whole Hard Disk Encryption In Rhel 4.6?

Oct 21, 2010

Which is the best whole hard disk encryption software for RHEL 4.6. Tried Truecrypt but was not success in making it work. First had issue with fuse version, then with glibc and etc.

View 5 Replies View Related

General :: Disk Encryption - Bitlocker Equivalent?

Jan 25, 2011

Bitlocker is a harddrive encryption data protection tool which comes with Windows Vista Ultimate and 7. Does anyone know an equivalent for Linux distros like Fedora and Ubuntu?

View 3 Replies View Related

General :: Implement Full Disk Encryption?

Jul 14, 2011

The only reason why I don't use Linux (even though I prefer Linux over Windows, and can do everything faster and more efficiently) is because each time I try to learn about dm-crypt I give up.

Can someone point me in the right direction for full OTFE on Linux (like TrueCrypt)?

View 1 Replies View Related

Red Hat / Fedora :: Disk Encryption Key: Can The Kernel Be Recompiled For A 2,048 Bit Key

Jan 10, 2011

1. Fedora 14 has a user friendly disk encryption setup.However, there doesn't seem to be an option to change the encryption parameters during setup. Since I can handle the overhead, I would like to change the encryption algorithm and the key length for the default install.

2. I have created an additional encrypted drive (the entire HD) which claims to have its own encryption functionality (Seagate Constellation 1TB). Does Fedora use the built-in encryption mechanism by default? Is there any way to tell?

3. I can't seem to find any utility to tell me what the actual key size is for different HD's I have encrypted. "cryptsetup --help" seems to print out only the information for the default encrypted O/S which is the default 256 bit.

My problem is whether the -s option work when set to a 2,048 bit key length? Or, does it fall back to a 256 bit key length if it fails to do so? Or, does it automatically use the built-in encryption of the hardware? If the -s option doesn't work with a 2,048 bit key setting, can the kernel be recompiled to do so?

View 8 Replies View Related

Security :: 5 Of The Best Free Disk Encryption Tools?

Apr 10, 2011

Quote: The importance of security should never be underestimated. The consequences of losing data can be disastrous for any organisation. For example, the loss of a single unencrypted laptop may have huge repercussions. This could include breaching data protection legislation with the risk of a significant fine, a loss in the confidence of an organisation, as well as the risk that sensitive data may fall into the hands of a competitor or third party with malicious intent.

View 1 Replies View Related

Security :: Can Full Disk Encryption Be Removed ?

Nov 14, 2010

I do know about cold boot attacks. But I ran across a couple of posts/websites that had me wonder if it is possible, without the passphrase, to just remove the encryption?

View 4 Replies View Related

Debian Installation :: Full Disk Encryption (LUKS) LVM

Oct 21, 2015

I would like to configure my Debian Jessie system in this way.

Two partitions:

1) /boot on /dev/sda1
2) everything else on /dev/sda2

I want to encrypt the second partition with LUKS. And then install over it a LVM volume. Inside the LVM volume i will create the / (root), /var, /opt and /home virtual partitions. In this way, i'll get asked only once for the password to decrypt all partitions. Because if i don't use LVM, then i'll get asked for the password for each encrypted partition.

I can follow and understand almost everything of this HOW-TO for Archlinux: [URL] ....

Only two passages are unclear to me:

1) Configuring mkinitcpio

I don't understand what i should do here in order to complete this. What should i do in Debian to configure "mkinitcpio"? what is the equivalent thing to do here?

I thought that the kernel would automatically recompile itself with all installed modules on the Debian system, once cryptosetup/LUKS or LVM2 get installed.

2) Configuring the boot loader

I don't understand what should i write in /etc/default/grub. Will GRUB automatically load the LUKS and LVM2 modules? Also, I don't think that i could boot the system in this way:

cryptdevice=/dev/sda2:LVM root=/dev/mapper/LVM-????

Actually the "root=" volume is the whole volume to mount as LVM. It isn't the final root partition.

View 5 Replies View Related

Debian :: Full Disk Encryption For Linux As Compared To OS X

Mar 20, 2016

With all the talk about disk encryption for Apple devices, I wanted to ask about how full disk encryption compares between debian linux and mac OS X. Is the code for debian linux fully available for people to inspect for flaws or backdoors? Apparently although part of the encryption code is available for OS X the full code for Filevault 2 is not public. What are the advantages and disadvantages of each method of encryption for each operating system?

View 8 Replies View Related

Fedora Security :: Remove Encryption From An Hard Disk?

Feb 24, 2009

I was trying to install Fedora 9 on my new laptop that came with Win XP. I have selected the option to wipe out all partition and create a default layout with the Encryption option selected. But that installation got stopped on the middle, therefore I have started the installation again. This time it asked for the encryption password as expected but don't know why, its not accepting my password. I am 100% sure that the password is correct but it is not allowing me to enter into the hard disk partition section.

My question is, how do I remove encryption from my hard disk? I don't need to preserve the data, I just need to use my hard disk again. Is there any boot CD that allow us to format encrypted disks without prompting for a password?

View 3 Replies View Related

Fedora Security :: Disk Encryption With Remote Passphrase?

Jul 28, 2009

I have currently a file server that runs on Fedora 9, and all other PCs (mostly running Windows XP) access the file server via SAMBA. Everything works perfectly! However, lately a home invasion in my neighborhood got me thinking. If they take my file server, my data is not protected. So, I would like to implement the LUKS partition encryption (/home) which sits on a separate disk. However, I don't quite like the decryption process at boot time. In other words, I would like to wake up the file server (WOL) remotely, and when it's done booting, I would like to log-in using the other PCs and enter the passphrase remotely to decrypt /home. Is this possible using LUKS encryption (i.e., cryptsetup)? If not, what would be another alternative to what I am trying to do using a secure encryption (so that the data is safe from thieves)?

View 4 Replies View Related

Ubuntu Security :: Remove The Whole Disk Encryption Without Reinstalling?

Jul 31, 2010

Is there any way to remove the whole disk encryption without reinstalling? I'm running Ubuntu 10.04.

View 2 Replies View Related

Ubuntu Security :: Change The Password For The Whole Disk Encryption?

Aug 8, 2010

Is there a way to change the password for the whole disk encryption?

View 2 Replies View Related

Ubuntu Security :: Algorithm Is Used With Full-Disk Encryption?

Oct 20, 2010

For some reason I can't find any documentation re: the algorithm(s) used by Ubuntu to encrypt the filesystem... Anyone know what it is?? AES?

View 2 Replies View Related

Ubuntu :: Recovery From Harddrive With Full Disk Encryption ?

Jan 10, 2011

I have a bunch of pictures that I thought I had backed up but as it turns out I didn't, the problem is I formatted the drive they were on.

It is a 1TB hard drive, and it was running Ubuntu 10.10 using full disk encryption from the alternate install CD. After formatting, I installed Ubuntu Server 10.10, also using full disk encryption.

I know the encryption key for both installs (and the keys in fact are the same).

I have turned off the machine, and have stopped writing to the disk. I am hoping because it is a 1TB drive, and I have only written over it with 2GB of data, that there is a chance I can recover the data.

View 2 Replies View Related

Ubuntu Installation :: Full-disk Encryption On Netbook?

Jan 29, 2011

I managed to get a cheap refurbed netbook recently (Samsung N150) and I'm wanting to put Ubuntu on it. As it's also likely to be used when travelling and have things like chat logs, photos, and other such things I'd like to do full disk encryption. Also I've been pointed towards 10.4 as apparently the 10.10 netbook desktop isn't to everyone's taste.

So I tried using unetbootin to make a bootable 10.4.1 i386 Alternate usb stick, which hit the problem of no cd drive. I found an item to add to the boot (cdrom-detect/try-usb=true) which got it a little further, but at a copying stage it threw an error saying it couldn't copy off the disc.

Finally I tried making a unetbootin of the mini iso (does mini even support full disk encryption?) but that seems to hang after selecting a mirror.

EDIT: Well it seems I was just impatient on the mini ISO and after a few minutes it's gone onto time-zone, though of course this could get rather tiresome without a local mirror, especially given this may go through more than one iteration.

View 1 Replies View Related

Ubuntu Security :: Install 10.04 Or 10.10 With Full Disk Encryption?

Apr 13, 2011

Is there a way to install ubuntu 10.04 or 10.10 with full disk encryption? I read how to do it in the 8.0 version, was wondering if it is still possible?

View 4 Replies View Related

OpenSUSE Install :: Incompatibility For Disk Encryption Among Distros / Versions

Feb 8, 2010

any incompatibility for an encrypted disk (i.e. impossibility of reading the file system) among different versions of the same distro or among different Linux distros.

View 1 Replies View Related

Ubuntu Security :: Cannot Get To Grub Menu After Full Disk Encryption?

Jan 13, 2010

this isn't really a security question, per se, so feel free to move. It is related to full disk LVM encryption though. Full disk didn't work for me with grub2 after running dd to a remote server, so I downgraded to grub1. No biggie. However, I have neither grub or grub2 as selected in Synaptic.Let's say I forget which I have installed. How would I determine what version of grub is installed at the moment. I'm assuming it's somehow installed on in the mbr but not on the OS. I didn't mean to do anything funky. Is that the normal setup? I'm deploying these systems to users and want to be able to troubleshoot issues in the future (hopefully that will not be needed!) grub --version does not work because it is not installed.

View 2 Replies View Related

Ubuntu Security :: Secure Is Encryption Via Disk Utility (palimpsest)?

Jan 18, 2010

I encrypted a harddisk via Disk Utiluty. What alogythm is it encrypted by now? Is it safe? What should I be aware about?

View 7 Replies View Related

Red Hat / Fedora :: Full Disk Encryption DD - How To Access Data In DD File

Feb 12, 2010

I am investigating full disk encryption and have made a DD copy of the hard drive which has been encrypted, this DD file is stored on my computer for analysis.

First question is - Anyone know how i can access data in this DD file even though its been encrypted?

Second question - Is there a DD command where i can image the systems memory? I ask this because when a system is turned on, to get past the pre-boot authentication stage you need a password. From what i understand, this password will be passed in to ram when power is applied to the system. Making a copy of the memory will also copy the password?

View 5 Replies View Related

Ubuntu Installation :: Dual Boot Full Disk Encryption - Windows 7 And 9.10

Feb 13, 2010

I've been wanting to do this for a while and after upgrading some of my pc components I decided I would finally try to dual boot with full disk encryption on both windows 7 and Ubuntu 9.10. I managed to encrypt the windows drive with truecrypt and that worked. I installed Ubuntu 9.10 using the alternate cd and everything but /boot is in an encrypted LVM. Each OS is on a separate SATA drive the windows is on sda1 and ubuntu /boot is sdb1.

To setup the dual boot I started out following the tutorial [url] but its for XP and versions of ubuntu that use grub not grub 2. I ran dd as posted and saved the files it produced from truecrypt. I then ran into some problems with grub reinstallation so I simply reinstalled Ubuntu 9.10 from scratch again. This put grub 2 on the computer. I've managed to get it to add a Windows 7 option.

However, when the option is selected truecrypt comes up and says that the bootloader is corrupted and that I need to use the repair CD I burned before I encrypted the drive. My question is does anyone have any experience dual booting using Truecrypt on Windows 7 and LUKS/dm-crypt on Ubuntu 9.10 with grub 2? And how would I get the boot menu to work? I'd rather not reinstall but if I have to I have images from right before I encrypted so it wouldn't be the end of the world.

View 4 Replies View Related

Ubuntu Servers :: Auto Input The Password For The Encryption Disk During Boot Up?

Apr 26, 2010

I would like to known whether I can configure the server to input the password for the encryption disk automatically during boot up.Is it possible

View 3 Replies View Related

Ubuntu Installation :: Partitioning - Triple Boot With Full Disk Encryption ?

Mar 28, 2011

To structure the layout of my partitions. I'm installing Windows 7, Backtrack 4 R2 and Ubuntu 10.10 Desktop on my laptop. I've got a 500 GB HDD named sda.

I've already installed Windows 7. It's my opinion that it's easiest to begin with Windows.

The partitions look like this right now:

The Windows installation is unencrypted and I want it to stay that way. It's only there in case my laptop gets stolen, I've installed various nasty things there.

The Backtrack 4 installation will also be given 100 GB space, I want it to be encrypted. The Ubuntu installation should get the rest of all the remaining space and preferably be encrypted but it's not 100% necessary.

How I should partition this? There's a limit on 4 primary partitions? How do I circumvent this? There should be one dedicated GRUB partition which will point to each of the installations own boot loaders?

View 8 Replies View Related

CentOS 5 Networking :: Set Up WEP Encryption?

Mar 9, 2010

I recently installed Centos in my dell laptop and trying to set up the WEP encryption.

set up the WEP?(BTW the card works , I could scan the networks etc..)

View 8 Replies View Related

Ubuntu :: Losetup Disk Encryption - Ioctl: LOOP_SET_STATUS: Invalid Argument, Requested Cipher Or Key Length (128 Bits) Not Supported By Kernel

Dec 14, 2010

In 10.04 I was using the following commands to mount an encrypted disk image:

Code: sudo losetup -f Which tells what loop back device block is available Then I'd type:

Code: sudo losetup -e aes /dev/loop0 /home/user/crypt.img and then enter the device's password

Code: sudo mount -t ext4 /dev/loop0 /media/crypt I've tried this in 10.10 and it hasn't been working (I can't remember if I did anything in 10.04 to make it work). I've installed the loop-aes-utils package and restarted my machine. Every time I try the 2nd step, after entering the password I get: Code: ioctl: LOOP_SET_STATUS: Invalid argument, requested cipher or key length (128 bits) not supported by kernel

View 1 Replies View Related

CentOS 5 :: Command Line Formatting And Encryption?

Sep 8, 2010

As I recent convert from Ubuntu to Centos, I have a lot to learn. In Ubuntu, I can plug in a memory stick, run the menu option: System/Adminstration/Partition Manager, highlight the memory stick and choose "Format: Encrypt"

In Centos, my memory stick is /dev/sdc1, how do I, using command line: format it as /ext3, encrypt it using cryptsetup, and set a password?

View 3 Replies View Related

CentOS 5 Networking :: Connecting To A Wireless Network Using Encryption?

Apr 5, 2009

I recently downloaded and installed CentOS 5.3 DVD media.The media check passed. I proceed to install the operating system sucessfully. After installation, all my hardware is recognized, when compared to CentOS 5.2. Anyway, when I attempt to connect to my wireless network that uses either WEP/WPA/WPA2-- I get an error message that I cannot recall (it basically only came up when I entered the key) However, I can connect to my wireless network when it is unencrypted and no open/shared key is needed.I would like to be able to connect to my wireless network when

FYI: I am using a RealTek RTL8185 Wireless Driver.Also, I use CentOS as a workstation.

View 4 Replies View Related

CentOS 5 :: Shadow Passwords - Changing Encryption Method From MD5 To SHA?

Nov 4, 2009

I'm looking to find out exactly how to go about changing the encryption method of shadow passwords from MD5 to something a bit stronger, like SHA. I've been looking around for a bit now and haven't found out how to do it. I've gathered that I'll most likely need to change the /etc/pam.d/system-auth file. Right now, there is a line that looks like this:

password sufficient pam_unix.so md5 shadow nullok try_first_pass use_authtok.I'm guessing the md5 should be changed to something else, like sha256. What else? I know I'll need to reset all passwords once the change is made, but I thought there was someplace else that controls how the passwd command encrypts passwords.

View 1 Replies View Related







Copyrights 2005-15 www.BigResource.com, All rights reserved