Debian Configuration :: Creating LUKS Encrypted USB Disk

Jan 15, 2016

Is it better to install LUKS to raw disk (/dev/sdb) or disk partition (/dev/sdb1)? What are best LUKS options?

"cryptsetup benchmark" output
Code: Select allPBKDF2-sha1      1310720 iterations per second
PBKDF2-sha256     862315 iterations per second
PBKDF2-sha512     590414 iterations per second

[Code] ....

Is slow hash better or how to choose it? It is clear that aes-xts is best choise. Is 265 bit key good?

View 3 Replies


ADVERTISEMENT

Red Hat / Fedora :: Automount LUKS Encrypted NTFS USB Disk In RHEL 5.3

Dec 23, 2009

I have an external 300GB (Toshiba) disk which I encrypted (using cryptsetup luksFormat) and then installed an NTFS filesystem on (need to be able to use it in both Linux and Windows - using FreeOTFE). The disk mounts fine in windows and on my Fedora 10 system it automounts.

I can manually mount it on the RHEL5.3 system, and gnome-mount gets as far as recognising that it is encrypted and asking for the key, but it doesn't then mount it - I then have to manually mount the /dev/mapper/luks... device.

Does anyone know how to do this - if it works in Fedora 10 it ought to be possible to get it to work in EL5.3 I'd have thought.

View 4 Replies View Related

Slackware :: Automount LUKS Encrypted USB Disk As Regular User

Oct 29, 2009

How can I get a LUKS encrypted partition on an external USB device automounted with r/w access for non-privileged users?

Background:
I just reformatted an external USB device with ext4. The only partition is LUKS encrypted. Now, when I plug the device to my computer, KDE notifies me and asks me to enter the LUKS passphrase. Then it mounts the device. Little snag here: Non-privileged users have read-only access.

My user is a member of group plugdev, but not of group disk, as this was discouraged several times, e. g. by Robby Workman. With non-encrypted disks regular users have read/write access, or can change the filemodes accordingly, as far as I recall (currently I have no more non-encrypted disks left to verify it...)

View 11 Replies View Related

Debian :: Mount Encrypted LUKS Partition (On Former System HDD)

Feb 1, 2016

I have two basically identical harddrives that are encrypted with LUKS containing a complete debian installation:

Code: Select allroot@x200s:/home/b# lsblk --fs
NAME                   FSTYPE      LABEL UUID                                   MOUNTPOINT
sda                                                                             
├─sda1                 ext2              0b851969-281e-4db2-8a5b-3798e801711b   /boot
├─sda2                                                                         
└─sda5                 crypto_LUKS       cfcf63ef-448a-4f72-9f58-8f7731cf3dfc   
  └─sda5_crypt         LVM2_member       21CS3f-SQeQ-XcMr-kyDs-OPtR-egmT-HkvJAu

[Code] ....

sda is what I currently run to write this text, sdb is my former harddrive, connected via USB.

I want to access the root partition on sdb.

The problem is:

Code: Select allcryptsetup luksOpen /dev/sdb5 oldhd
Enter passphrase for /dev/sdb5:
root@x200s:/home/b# ls /dev/mapper/
control  oldhd   sda5_crypt  x200s--vg-root  x200s--vg-swap_1
root@x200s:/home/b# mount /dev/mapper/oldhd /mnt/
[b]mount: unknown filesystem type 'LVM2_member'[/b]

[Code] ..

Before all this, both sda and sdb where in the same volume group. I renamed the volume group of sdb to "oldDisk"
using

Code: Select allvgrename <UUID> oldDisk

How I can access the data on the root filesystem of my sdb..

View 2 Replies View Related

Debian Configuration :: LUKS With Only One Passphrase?

Jun 20, 2011

Is there any way to only have one passphrase prompt when using multiple LUKS partitions? Well there must be, as that's how Fedora does it - it asks you once, and tries that passphrase on every LUKS volume (with a nice plymouth prompt), I just don't know how to do that on Wheezy. Don't say I have to nuke my install and use LVM instead of regular partitions or put a keyfile on a USB stick. My partition layout is:

/boot (plain)
swap (luks)
/ (luks)
/data (2nd drive, luks)

So I get asked 3 times during boot.

View 4 Replies View Related

Debian Installation :: Full Disk Encryption (LUKS) LVM

Oct 21, 2015

I would like to configure my Debian Jessie system in this way.

Two partitions:

1) /boot on /dev/sda1
2) everything else on /dev/sda2

I want to encrypt the second partition with LUKS. And then install over it a LVM volume. Inside the LVM volume i will create the / (root), /var, /opt and /home virtual partitions. In this way, i'll get asked only once for the password to decrypt all partitions. Because if i don't use LVM, then i'll get asked for the password for each encrypted partition.

I can follow and understand almost everything of this HOW-TO for Archlinux: [URL] ....

Only two passages are unclear to me:

1) Configuring mkinitcpio

I don't understand what i should do here in order to complete this. What should i do in Debian to configure "mkinitcpio"? what is the equivalent thing to do here?

I thought that the kernel would automatically recompile itself with all installed modules on the Debian system, once cryptosetup/LUKS or LVM2 get installed.

2) Configuring the boot loader

I don't understand what should i write in /etc/default/grub. Will GRUB automatically load the LUKS and LVM2 modules? Also, I don't think that i could boot the system in this way:

cryptdevice=/dev/sda2:LVM root=/dev/mapper/LVM-????

Actually the "root=" volume is the whole volume to mount as LVM. It isn't the final root partition.

View 5 Replies View Related

Debian Installation :: Install Jessie Alongside Win8 On Existing LUKS / LVM Disk

Sep 8, 2015

I'm trying to upgrade my Win8/Wheezy 64-bit machine to Jessie 8.1 by installing from the amd64-bit netinstall iso image on a USB flash drive. I had done the previous, Wheezy, install on a disk partition that was whole-partition LUKS/LVM drive, with separate logical partitions for swap, root, and home.

Before doing the upgrade, I booted to the BIOS to ensure that my UEFI system had the correct, CSM and Legacy modes enabled in it, so that installer would boot using the non-efi BIOS mode.

Step one of the upgrade was to boot the netinstall and enter the rescue mode so that I could manually do the cryptsetup/LVM business. When I returned to the installer, I mounted the now-recognized logical partitions normally, choosing to format only the swap and / partitions.

During the entire process, I had to go into rescue mode one more time to manually mount the unencrypted /boot partition, along with my /home partition. I copied a backup of my old /etc/crypttab from the latter, and after returning to the installer, finished the install. That finish included installing grub on my hard drive's main boot partition.

Everything seemed to finish with no problems. However, when I try to boot the debian bootloader, I get tossed to grub rescue with the message that '/grub/x86_64-efi/normal.mod' doesn't exist. At this point I returned to the installer, mounted the /boot partition, and saw that there grub-install didn't create that an x86_64-efi directory at all. Instead, it had created an i386 directory. The exact name escapes me at the moment.

I *think* that my install was clean other than the last bit that was related to installing the bootloader. How to reinstall the bootloader in such a way as to make all of this work.

View 2 Replies View Related

Debian Configuration :: No Prompt For Passphrase For Decrypt Luks During Boot

Jan 25, 2016

I'dont get prompt for passphrase for decrypt luks during boot.Instead it says 'error: device name required, press any key to continue"

Grub.cfg: http://pastebin.com/GZsuXp1y
kernel: linux-image-4.3.0-1-amd64
video with issue: https://www.youtube.com/watch?v=13ruhtUcwRo&feature=youtu.be
VM disk has 2 partitions:
sda1 with /boot
sda2 - luks encrypted

View 1 Replies View Related

Debian Configuration :: Decrypt Luks Volume With A Keyfile On Boot From Grub

Jul 6, 2015

I have install a debian jessie in my laptop, i create a lvm volume with /, /home, etc and a /boot partition outside. the i move this partition to the lvm volume and boot from it, everything it´s okay and it works.

The problem is that wen boot it ask me the passphrase to load grub, and then, when grub loads the kernel, it ask me again the passphrase.

I read that i can pass a key file to the initramfs to solve this, but where i see it, he uses mkinitcpio, and i can´´t find this package in the debian repos, it an arch package, also i tried this option [URL] ...

But it asking me the passphrase 3 times, and the third fails, the sistem starts, but i read the fail in the log.

View 1 Replies View Related

OpenSUSE :: Keyfile For Encrypted Drive (luks)?

Oct 18, 2010

I can't seem to get an encrypted partition to recognize a keyfile. It is a backup partition that I would like to keep unmounted until a cron-script runs once a week to backup my sensitive data. In order for the script to run without my assistance, I thought I'd use a keyfile to authorize the mount.

So far I've created a keyfile and have added it to the partition using "luksKeyAdd". It didn't really say it was successful, but when I do a luksdump, it shows that another key slot has been enabled, so I believe it worked. After that I created a /etc/crypttab file with the following:

Code:
backup_sdd1 /dev/sdd1 /root/backup luks
/dev/sdd1 being the backup partition, and /root/backup being the keyfile

After rebooting, I am still prompted for a password when trying to mount the encrypted partition (sdd1), and there is no device "/dev/mapper/backup_sdd1" created like I believe there should be. I haven't added any entries to fstab, as I don't want this partition to mount at boot.

View 5 Replies View Related

Software :: Corrupted LUKS-encrypted Partition ?

Jun 30, 2010

I have a really tricky and may be intresting problem with a encrypted disk partition (cryptsetup luks...) which was fine until it accidentally got re-formatted by an instance of Windows 7. Most of the data on that 1TB-disk will probably still exist, only the LUKS header at the very beginning of the partition is - of course - gone.

So when I try to open the container, it gives no verbose, just the return value 234.

I scanned the whole partition for other LUKS headers with hexedit, none there. But, luckyly I have another partition which is encrypted in the exact same way with the exact same passphrase (which I remember very well!), so I had an idea: I copied the LUKS header (592 bytes) from the other LUKS encrypted partition over to the damaged partition.
When I now issue

Code:

Code:
No key available with this passphrase

Here is the command how I created the container:

Code:

How do I get the existing passphrase accepted by LUKS?

View 9 Replies View Related

Slackware :: 12.2 - RAID-1 - LVM - LUKS Encrypted Root

Dec 17, 2008

I am trying to get Slackware 12.2 running on a system with two identical harddiscs using RAID-1, LVM and LUKS.

Here is what I get:

Code:

The system is still the same, however, the results of upgrading or installing 12.2 are different. The system refuses to boot. The screen messages during boot seem to suggest, that the RAID system is "seen" by the system, but the encrypted filesystem is not.

I can boot with the installation DVD, however, and

Code:

View 14 Replies View Related

Fedora :: Access /etc/modprobe.d On An Encrypted LVM LUKS Partition?

Nov 8, 2009

I need to access /etc/modprobe.d on an encrypted LVM LUKS partition. I m not sure how to go about it though. Mount usually handles my mounting needs, do I need to decrypt the physical volume first? LIst of commands need would make my day.

View 1 Replies View Related

Fedora Security :: LUKS Encrypted Partion And Start Up

Aug 18, 2010

I run fedora 13 on my laptop (dual boot with Windows 7) and I just created a new partion to hold sensible data, encrypted with LUKS. I followed this tutorial for creating it.Now, everything went well and the new partition works well. But I needed something a little different from what the tutorial suggested, because I don't want the partition to be mounted on the system each time it boots, but I would (unlock and) mount it manually when I need it.

To do so I just didn't follow the Tutorial steps from 7 to 13, thinking that without the changes to crypttab and fstab the partition wouldn't be even touched by the start up process. And that's partially true: the partition isn't mapped nor mounted in the system when I boot, but the problem is that it however keeps asking for the passphrase to unlock it even if it doesn't get mounted or mapped.It just asks for it before the system loads all it's parts (udev, filesystems, etc) and I can't understand why, what it uses it for if it doesn't unlock it.So my question is: why does it ask for the passphrase to unlock luks if I haven't set crypttab and fstab to mount the partition on start up?

View 2 Replies View Related

Fedora :: 13 - Disable LUKS-encrypted Partition From Automount?

Aug 30, 2010

I have encrypted a partition while installing Fedora 13, and I need to disable its automount - I will mount those manually.

But even though I commented out the corresponding line in /etc/fstab, I am still asked for the passphrase for the partition at startup.

How to completely disable this behaviour - and how to mount the partition manually afterwards?

View 5 Replies View Related

OpenSUSE Install :: Encrypted LVM LUKS And Login Screen

Apr 2, 2011

I recently installed OpenSUSE 11.4 64 bit with GNOME yesterday and everything is going fantastic. I like it much better than Ubuntu 10.10 64 bit Maverick Meerkat because it is much more stable, reliable, and dependable. I own a heavily modified ASUS N61JV-X2 notebook PC. I installed OpenSUSE using the LVM based method and LUKS encryption. When I turn on the power to my notebook PC, it asks me for my password to decrypt my Intel 2nd Generation 160.00 GB Solid State Drive. I expected this behavior. However, I never get to see the OpenSUSE login screen. After I type in my password to decrypt my SSD, it loads up the desktop immediately. How do I configure my OpenSUSE so that I can see the login screen so that I can select my standard user profile and enter the user password to login?

View 9 Replies View Related

General :: Moving A LVM/LUKS Encrypted Partition To The End Of A Harddrive?

May 16, 2011

I need to move a LUKS encrypted partition to the end of a harddrive to expand another partition. Does anyone know how to do this?

Is it possible to do this with other partition editing programs?

Gparted doesnt support LUKS/LVM

View 1 Replies View Related

Ubuntu Security :: Aes-xts - Aes-lrw - Aes-cbc - Set Up Encrypted Volumes With Dm_crypt And LUKS?

Jan 3, 2010

I'm just wondering - what is the best way to set up your encrypted volumes with dm_crypt and LUKS?

My understanding was that aes-lrw ws better than aes-cbc - and then I stumble upon [url] which says that LRW has some problems, and XTS is better? I dont know enough about encryption theory to be able to say anything, so i'm hoping some folks more enlightened will be able to say something here.

I was previously using aes-lrw-benbi to set up a volume. If xts is truly better - should i be using '-c aes-xts-benbi' then?

View 4 Replies View Related

Software :: Cannot Write To LUKS Encrypted Hard Drive

Apr 3, 2011

I am running Fedora 14 with the Gnome desktop and I have a 1 TB external hard drive that is msdos with approximately 200 gbs of data on it. I can unlock it and even read and copy files to my internal hard drive but I cannot add files to it, I use to be able to. I didn;t think i changed permissions.

View 3 Replies View Related

SUSE / Novell :: Encrypted Root With LUKS On LVM And RAID-1 ?

Apr 15, 2009

OpenSuSE 11.1 is by far the best SuSE version in a long time. It's generally up to competition or ahead of it. It's admirable, how thoughtful this system is set up, and how clean and fast it is compared to its predecessors. It ssems, that SuSE is fighting its way back to where they came from before the Novell "merger."

Having said that, it is even harder to understand, IMHO, why the installer doesn't support encrypted root partitions. Of course, there is a manual solution:

http://en.opensuse.org/Encrypted_Roo...ith_SUSE_HOWTO

However, this HOW-TO doesn't explain how to combine LUKS encryption with LVM on a RAID-1 system, as described for Slackware 12.2 here:

[url]
[url]

Is there a similar guide anywhere available for OpenSuSE 11.1?

If not: Would it be possible to do all the low-level setup work, like partitioning, setting up the logical volumes and encrypting everything, with Slackware, following the document above, and then install OpenSuSE 11.1 on that system? Would that work?

View 5 Replies View Related

Fedora Security :: Unlock A LUKS Encrypted Root Partition Via Ssh?

May 20, 2010

Anyone had any experience with unlocking a LUKS encrypted root partition via ssh? It is ok to leave /boot unencrypted.

There are a few pages from google with the debians variants, archived by putting dropbear into initrd.

I like to do that with my fedora/centos remote servers, but struggle to find any resources specific to it. Anyone has any suggestions and thoughts as to what might be a suitable way forward?

View 2 Replies View Related

OpenSUSE Install :: Can't Longer Access LUKS Encrypted Volumes?

Aug 26, 2011

I've had everything but /boot on LVM LUKS encryption since I installed 11.4 on my netbook. Suddenly it won't accept my password and boot. Nothing had been updated since the last successful boot. The only possibly different thing that occurred was that I had plugged in my Android phone to charge before it booted up. Anyway, the specific error it gives when I enter the password (and I'm absolutely sure it's the correct password):

Code:
No key available with this passphrase.
Here is everything else on the screen:
Code:
doing fast boot
Creating device nodes with udev
[number (not sure if relevant/unique)] fb:conflicting fb hw usage inteldrmfb vs VESA VGA - removing gen
Volume group "system" not found

[Code]...

View 9 Replies View Related

Ubuntu Security :: LUKS - Dm-crypt And Encrypted Partition At Boot

Feb 22, 2010

I'm trying to have a LUKS encrypted partition mounted at startup and to have GDM ask for my key so it will decrypt. Now I followed [URL] to the letter. Except for now, I have it just mounted into /mnt/cryptohome so I'm not messing with my system. My problem is the one everyone mentions in the comments, ubuntu isn't asking for the LUKS key in the X display, it's asking in the first terminal (Ctrl-Alt-F1). This will not do. I need it to ask to mount my drive before I'm even asked to login, so eventually I can encrypt my /home.

View 9 Replies View Related

Ubuntu :: Auto-mount Luks Encrypted Partition At Boot?

May 27, 2010

I'm having a problem auto-mounting a new luks partition. I have crypttab and fstab entries. I already have my primary encrypted partition (root) mounting at boot (from the install), but after creating this one manually, it does not open on boot. It auto-mounts when I run the following command manually after boot: sudo luksOpen /dev/disk/by-uuid/<uuid> mycrypt

/etc/crypttab entry:
personalcrypt /dev/disk/by-uuid/a1af5b7b-db58-4690-b586-b74407795e2c none luks
/etc/fstab entry:

[code]...

View 1 Replies View Related

Slackware :: Shrink A LUKS-encrypted Physical Volume - LVM2

Dec 28, 2009

I have a 160GB harddrive with 2 partitions:

1. /dev/sda1 ext2 100MB (this is my /boot partition)

2. /dev/sda2 LVM2 Remaining space (this is my physical volume and is LUKS-encrypted)

There is 1 volume group, slackvg, and 3 logical volumes:

1. swap 2GB

2. root jfs 10GB

3. home jfs 50GB

I would like to shrink /dev/sda2 to make room for another regular partition, is this possible?

View 1 Replies View Related

Fedora Installation :: 15 - LUKS Encrypted Logical Volumes Not Mounting On Boot

May 26, 2011

I have a setup that looks like this

[Code]....

and I'm dumped into recovery mode. However, if I remove these mounts from /etc/fstab via comments, I can wait for the system to boot (which it does very quickly) then mount the mapper devices myself. So what is going on? Has something changed wrt logical volumes, or is this just systemd? I can live with manual mounting, but any advice on resolving the automatic mounting situation would be great.

[Code]....

View 2 Replies View Related

Ubuntu :: Change Splash Screen On An Encrypted Drive (cryptpo LUKS)?

Jan 22, 2011

I am trying to change the splash screen (Lucid 10.4) on an encrypted drive (cryptpo LUKS)

I've used to gimp to modify the png files in /lib/plymouth/themes/ubuntu-logo (both ubuntu_logo.png and ubuntu_logo16.pgn).

These changes show up when the machine is shutting down, but not when it boots (I get the same Ubuntu splash screen that allows me to enter the encryption password). I'm guessing because I'm using an encrypted drive that the plymouth theme and images are stored in an encrypted partition ....maybe /dev/sda1?

Could someone confirm this, or suggest how to change the splash screen for 10.4 if using drive encryption?

View 1 Replies View Related

Debian :: How To Open Encrypted Mac OS Extended Disk Image

Apr 11, 2016

I tried to access files from my old hard drive that used to be in a Mac (which unfortunately isn't working anymore). I connected it to my computer which I am running debian gnome on. So my question is how do i access a mac os extended disk image. The disk is encrypted and when i try to open it it says that i don't have permission. I think its encrypted in AES 128 bit.

View 4 Replies View Related

Fedora Security :: Image An Entire Luks System Encrypted Volume And The Rest Of The Used HDD, The MBR And /boot Partition?

Jan 21, 2009

I need a FREE solution that can image an entire Luks system encrypted volume and the rest of the used HDD, the MBR and /boot partition. Note: MBR and /boot are not encrypted. Note 2: I want to be able to restore entire drive from image with only a couple of steps. Note 3: Destination HDD space is a factor. Image file must be compressed and the image file must be around 40 to 50 GB or less. The smaller the image the better.

I have used clonezilla live cd before but not for encrypted volumes. I know you can install it in Linux. But, I don't know how to configure it after installation. I would be very happy if someone could tell me how to configure clonezilla in Fedora. How to guides are also welcome. I have one more question. If I image the encrypted volumes and all the stuff I mentioned above while logged in to Fedora, and I restore the drive from the image, will the recovered drive still be encrypted?

View 8 Replies View Related

Debian Configuration :: Encrypted LVM Disappears In UEFI

Sep 6, 2015

Debian encrypted LVM disappears every time on sda when I install any other also encrypted Linux distro on sdb.

How can I set up Debian that way that it wouldn't disappear or how can I recover it form UEFI?

View 1 Replies View Related







Copyrights 2005-15 www.BigResource.com, All rights reserved