Debian :: GEncrypted Partition Using LUKS On Debian ?

Mar 18, 2011

I had encrypted a partition in Debian6 KDE4 using LUKS. Using the partition as a backup storage so do NOT want to automount it, therefore I have not added the encrypted partition (/dev/sda5) into /etc/crypttab or /etc/fstab. However, when booted into Debian, the partition is not shown in dolphin. How can I mount it manually when I need to use it?

View 1 Replies


ADVERTISEMENT

Debian :: Resize LUKS Partition Without LVM

Aug 20, 2011

I need to resize (increase) LUKS partition. I have found a lot of manuals, but they are just for LVM volumes(I dont use LVM and I dont plan to use it). I have HDD splited to the 4 parts:

sda1(/)
sda2(LUKS)
unalocated
swap

I want to increase LUKS partition, by using the part of unalocated space.

BUT I dont want to do the following:
Backup data from LUKS partition
Delete LUKS partition
Create new bigger LUKS partition
Restore data to the LUKS partition

View 1 Replies View Related

Debian :: Mount Encrypted LUKS Partition (On Former System HDD)

Feb 1, 2016

I have two basically identical harddrives that are encrypted with LUKS containing a complete debian installation:

Code: Select allroot@x200s:/home/b# lsblk --fs
NAME                   FSTYPE      LABEL UUID                                   MOUNTPOINT
sda                                                                             
├─sda1                 ext2              0b851969-281e-4db2-8a5b-3798e801711b   /boot
├─sda2                                                                         
└─sda5                 crypto_LUKS       cfcf63ef-448a-4f72-9f58-8f7731cf3dfc   
  └─sda5_crypt         LVM2_member       21CS3f-SQeQ-XcMr-kyDs-OPtR-egmT-HkvJAu

[Code] ....

sda is what I currently run to write this text, sdb is my former harddrive, connected via USB.

I want to access the root partition on sdb.

The problem is:

Code: Select allcryptsetup luksOpen /dev/sdb5 oldhd
Enter passphrase for /dev/sdb5:
root@x200s:/home/b# ls /dev/mapper/
control  oldhd   sda5_crypt  x200s--vg-root  x200s--vg-swap_1
root@x200s:/home/b# mount /dev/mapper/oldhd /mnt/
[b]mount: unknown filesystem type 'LVM2_member'[/b]

[Code] ..

Before all this, both sda and sdb where in the same volume group. I renamed the volume group of sdb to "oldDisk"
using

Code: Select allvgrename <UUID> oldDisk

How I can access the data on the root filesystem of my sdb..

View 2 Replies View Related

Debian Configuration :: LUKS With Only One Passphrase?

Jun 20, 2011

Is there any way to only have one passphrase prompt when using multiple LUKS partitions? Well there must be, as that's how Fedora does it - it asks you once, and tries that passphrase on every LUKS volume (with a nice plymouth prompt), I just don't know how to do that on Wheezy. Don't say I have to nuke my install and use LVM instead of regular partitions or put a keyfile on a USB stick. My partition layout is:

/boot (plain)
swap (luks)
/ (luks)
/data (2nd drive, luks)

So I get asked 3 times during boot.

View 4 Replies View Related

Debian Installation :: LUKS On Root Killed By Apt-get Update

Sep 24, 2015

Root LUKS to be broken by apt-get update? This did happen to me on 3 different laptops, both on previous install (from Debian 8.0), and also on clean installs (Debian 8.1), repeatedly.

When I reboot, grub starts, but then it cannot find the root file system (I end up with the emergency console).

Code: Select allLoading Linux 3.16.0-4-amd64 ...
Loading initial ramdisk ...
Loading, please wait...
[many seconds waiting]
ALERT! /dev/mapper/sda2_crypt does not exists.
modprobe: modprobe ehci-orion not found in modules.dep

This is the most simple, clean, conservative install ever, no closed driver.

But LUKS on the root file system:

Code: Select allone ext4 partition on /boot
one ext4 partition on / (trough LUKS, all defaults)

There is no LVM.

All the 3 laptops killed at different time, when updating. Clean install is fine until the first update.

Booting on the rescue system allows me to see everything.

Code: Select all$ update-grub
Generating grub configuration file ...
Found background image: /usr/share/images/desktop-base/desktop-grub.png
Found linux image: /boot/vmlinuz-3.16.0-4-amd64
Found initrd image: /boot/initrd.img-3.16.0-4-amd64
No volume groups found

How can I recover from this?

View 5 Replies View Related

Debian Installation :: Full Disk Encryption (LUKS) LVM

Oct 21, 2015

I would like to configure my Debian Jessie system in this way.

Two partitions:

1) /boot on /dev/sda1
2) everything else on /dev/sda2

I want to encrypt the second partition with LUKS. And then install over it a LVM volume. Inside the LVM volume i will create the / (root), /var, /opt and /home virtual partitions. In this way, i'll get asked only once for the password to decrypt all partitions. Because if i don't use LVM, then i'll get asked for the password for each encrypted partition.

I can follow and understand almost everything of this HOW-TO for Archlinux: [URL] ....

Only two passages are unclear to me:

1) Configuring mkinitcpio

I don't understand what i should do here in order to complete this. What should i do in Debian to configure "mkinitcpio"? what is the equivalent thing to do here?

I thought that the kernel would automatically recompile itself with all installed modules on the Debian system, once cryptosetup/LUKS or LVM2 get installed.

2) Configuring the boot loader

I don't understand what should i write in /etc/default/grub. Will GRUB automatically load the LUKS and LVM2 modules? Also, I don't think that i could boot the system in this way:

cryptdevice=/dev/sda2:LVM root=/dev/mapper/LVM-????

Actually the "root=" volume is the whole volume to mount as LVM. It isn't the final root partition.

View 5 Replies View Related

Debian Configuration :: Creating LUKS Encrypted USB Disk

Jan 15, 2016

Is it better to install LUKS to raw disk (/dev/sdb) or disk partition (/dev/sdb1)? What are best LUKS options?

"cryptsetup benchmark" output
Code: Select allPBKDF2-sha1      1310720 iterations per second
PBKDF2-sha256     862315 iterations per second
PBKDF2-sha512     590414 iterations per second

[Code] ....

Is slow hash better or how to choose it? It is clear that aes-xts is best choise. Is 265 bit key good?

View 3 Replies View Related

General :: Format Master LUKS Partition With/without Damaging Other Partition?

May 11, 2010

I need to change my LUKS partition to NTFS as I do not need the boot partition any longer, but I need to keep sdb3 (truecrypted ext3) intact. This is how the disk looks now:

Code:

Disk /dev/sdb: 1000.2 GB, 1000204886016 bytes
255 heads, 63 sectors/track, 121601 cylinders
Units = cylinders of 16065 * 512 = 8225280 bytes

[code]....

View 2 Replies View Related

Debian Configuration :: No Prompt For Passphrase For Decrypt Luks During Boot

Jan 25, 2016

I'dont get prompt for passphrase for decrypt luks during boot.Instead it says 'error: device name required, press any key to continue"

Grub.cfg: http://pastebin.com/GZsuXp1y
kernel: linux-image-4.3.0-1-amd64
video with issue: https://www.youtube.com/watch?v=13ruhtUcwRo&feature=youtu.be
VM disk has 2 partitions:
sda1 with /boot
sda2 - luks encrypted

View 1 Replies View Related

Debian Configuration :: Decrypt Luks Volume With A Keyfile On Boot From Grub

Jul 6, 2015

I have install a debian jessie in my laptop, i create a lvm volume with /, /home, etc and a /boot partition outside. the i move this partition to the lvm volume and boot from it, everything it´s okay and it works.

The problem is that wen boot it ask me the passphrase to load grub, and then, when grub loads the kernel, it ask me again the passphrase.

I read that i can pass a key file to the initramfs to solve this, but where i see it, he uses mkinitcpio, and i can´´t find this package in the debian repos, it an arch package, also i tried this option [URL] ...

But it asking me the passphrase 3 times, and the third fails, the sistem starts, but i read the fail in the log.

View 1 Replies View Related

Debian Installation :: Install Jessie Alongside Win8 On Existing LUKS / LVM Disk

Sep 8, 2015

I'm trying to upgrade my Win8/Wheezy 64-bit machine to Jessie 8.1 by installing from the amd64-bit netinstall iso image on a USB flash drive. I had done the previous, Wheezy, install on a disk partition that was whole-partition LUKS/LVM drive, with separate logical partitions for swap, root, and home.

Before doing the upgrade, I booted to the BIOS to ensure that my UEFI system had the correct, CSM and Legacy modes enabled in it, so that installer would boot using the non-efi BIOS mode.

Step one of the upgrade was to boot the netinstall and enter the rescue mode so that I could manually do the cryptsetup/LVM business. When I returned to the installer, I mounted the now-recognized logical partitions normally, choosing to format only the swap and / partitions.

During the entire process, I had to go into rescue mode one more time to manually mount the unencrypted /boot partition, along with my /home partition. I copied a backup of my old /etc/crypttab from the latter, and after returning to the installer, finished the install. That finish included installing grub on my hard drive's main boot partition.

Everything seemed to finish with no problems. However, when I try to boot the debian bootloader, I get tossed to grub rescue with the message that '/grub/x86_64-efi/normal.mod' doesn't exist. At this point I returned to the installer, mounted the /boot partition, and saw that there grub-install didn't create that an x86_64-efi directory at all. Instead, it had created an i386 directory. The exact name escapes me at the moment.

I *think* that my install was clean other than the last bit that was related to installing the bootloader. How to reinstall the bootloader in such a way as to make all of this work.

View 2 Replies View Related

Debian :: Libgdu-WARNING : Partition /org/freedesktop/UDisks/devices/sdb7 Is A Logical Partition But No Extended Partition Exists

May 27, 2011

I installed Debian stable and I see these errors in the xsession error file

/etc/gdm3/Xsession: Beginning session setup...
GNOMEKEYRINGCONTROL=/tmp/keyring-j0E6Br
SSHAUTHSOCK=/tmp/keyring-j0E6Br/ssh
GNOMEKEYRINGCONTROL=/tmp/keyring-j0E6Br

[code]....

View 4 Replies View Related

Ubuntu Security :: LUKS On LVM And Resizing Partition

May 10, 2010

I have a LVM logical volume, that contains a LUKS encrypted volume, on which is an ext4 filesystem. I shrank the partition to the minimum size. Next step is to luksClose the device, and then to resize the LVM logical volume. I suspect that LUKS has overhead. So if the ext4 filesystem was resized from, say 1TB to 500G, I have the idea that resizing the LVM LV to 500G does not take LUKS overhead into account and this might corrupt data on the end of the FS. So, what's the smart move to take? How do I calculate the safe minimum LV size? Or should I just give the 500G disk a few gigabytes extra to be sure?

View 4 Replies View Related

Security :: Luks Root Partition On Laptop

May 9, 2011

if encrypt my root partition with Luksformat on my laptop and the battery suddenly goes out without a proper shutdown, I stand a big chance on corrupting the luks header or key slot?

View 1 Replies View Related

Software :: Corrupted LUKS-encrypted Partition ?

Jun 30, 2010

I have a really tricky and may be intresting problem with a encrypted disk partition (cryptsetup luks...) which was fine until it accidentally got re-formatted by an instance of Windows 7. Most of the data on that 1TB-disk will probably still exist, only the LUKS header at the very beginning of the partition is - of course - gone.

So when I try to open the container, it gives no verbose, just the return value 234.

I scanned the whole partition for other LUKS headers with hexedit, none there. But, luckyly I have another partition which is encrypted in the exact same way with the exact same passphrase (which I remember very well!), so I had an idea: I copied the LUKS header (592 bytes) from the other LUKS encrypted partition over to the damaged partition.
When I now issue

Code:

Code:
No key available with this passphrase

Here is the command how I created the container:

Code:

How do I get the existing passphrase accepted by LUKS?

View 9 Replies View Related

Debian Configuration :: Make Boot Partition Within LVM In Debian Usin Preseed?

Mar 16, 2011

I know that boot partition is possible to create within debian distribution that has grub 2.0, as I have done before with ubuntu. I have been trying many different options with my preseed file but it keeps taking the boot partition out of LVM and creating and extended partition too and then creates the LVM primary partition.

### Partitioning.
# you can specify a disk to partition. The device name can be given in either
# devfs or traditional non-devfs format. For example, to use the first disk

[code]....

View 1 Replies View Related

Fedora :: Access /etc/modprobe.d On An Encrypted LVM LUKS Partition?

Nov 8, 2009

I need to access /etc/modprobe.d on an encrypted LVM LUKS partition. I m not sure how to go about it though. Mount usually handles my mounting needs, do I need to decrypt the physical volume first? LIst of commands need would make my day.

View 1 Replies View Related

Fedora Security :: LUKS Encryption At Partition Level Or LVM?

Jul 19, 2010

I'm planning a fresh F13 install, with separate partitions for /boot, /home, /tmp, /, and swap. All but /boot will be logical volumes, and I'd like to encrypt all but boot. If I encrypt the underlying partitions, is there any reason to also encrypt the logical volumes themselves?

my system will be:
HP dv6-3040us Pavillion laptop
AMD Phenon II
4GB DDR3

View 3 Replies View Related

Fedora :: 13 - Disable LUKS-encrypted Partition From Automount?

Aug 30, 2010

I have encrypted a partition while installing Fedora 13, and I need to disable its automount - I will mount those manually.

But even though I commented out the corresponding line in /etc/fstab, I am still asked for the passphrase for the partition at startup.

How to completely disable this behaviour - and how to mount the partition manually afterwards?

View 5 Replies View Related

General :: Moving A LVM/LUKS Encrypted Partition To The End Of A Harddrive?

May 16, 2011

I need to move a LUKS encrypted partition to the end of a harddrive to expand another partition. Does anyone know how to do this?

Is it possible to do this with other partition editing programs?

Gparted doesnt support LUKS/LVM

View 1 Replies View Related

Slackware :: Pondering About Encrypting The Keycard For A LUKS/LVM Partition?

Aug 15, 2010

So I was wondering about the dilemma of how to encrypt the password file on a key card to unlock your harddrive without having to enter any password. I came to the conclusion that that the scripts could do this without storing any passwords in plane text them self. Have a few extra steps to the scripts that would:

1. Read the UUID of any disks coming in.

2. Attempt to use that ID to decrypt a password file stored in the initrd.

3. Use the decrypted password file to unlock the the keycard partition.

4. THEN use the password files on the keycard to decrypt the main partition and boot the system.

However, if somebody stole your key card and didn't know what the unencrypted information was, then it's harmless for them to have it anyway. And if they did know, you wouldn't be any better off with it being encrypted because they probably can gain access to your computer anyway; leaving them to just pop the key card in and automatically decrypt the drive.

I suppose encrypting the keycard would give you extra assurance that the information would be much harder to recover if you destroyed the key card in a hurry. So would this extra security step even be worth it?

I guess the most secure thing would be to only have a password and type it in every time... unless you are concerned about the aliens/government stealing that from your brain which would probably mean they wouldn't need your password anyway.

View 3 Replies View Related

Debian :: How To Make Boot Partition Within LVM In Debian Using Preseed

Mar 16, 2011

I know that boot partition is possible to create within debian distribution that has grub 2.0, as I have done before with ubuntu. I have been trying many different options with my preseed file but it keeps taking the boot partition out of LVM and creating and extended partition too and then creates the LVM primary partition. My preseed file is below:

code:

View 1 Replies View Related

Debian :: Make Boot Partition Within Debian Using Preseed ?

Mar 16, 2011

I know that boot partition is possible to create within debian distribution that has grub 2.0, as I have done before with ubuntu. I have been trying many different options with my preseed file but it keeps taking the boot partition out of LVM and creating and extended partition too and then creates the LVM primary partition. My preseed file is below:

code:

View 1 Replies View Related

Fedora Security :: Unlock A LUKS Encrypted Root Partition Via Ssh?

May 20, 2010

Anyone had any experience with unlocking a LUKS encrypted root partition via ssh? It is ok to leave /boot unencrypted.

There are a few pages from google with the debians variants, archived by putting dropbear into initrd.

I like to do that with my fedora/centos remote servers, but struggle to find any resources specific to it. Anyone has any suggestions and thoughts as to what might be a suitable way forward?

View 2 Replies View Related

Ubuntu Security :: LUKS - Dm-crypt And Encrypted Partition At Boot

Feb 22, 2010

I'm trying to have a LUKS encrypted partition mounted at startup and to have GDM ask for my key so it will decrypt. Now I followed [URL] to the letter. Except for now, I have it just mounted into /mnt/cryptohome so I'm not messing with my system. My problem is the one everyone mentions in the comments, ubuntu isn't asking for the LUKS key in the X display, it's asking in the first terminal (Ctrl-Alt-F1). This will not do. I need it to ask to mount my drive before I'm even asked to login, so eventually I can encrypt my /home.

View 9 Replies View Related

Ubuntu :: Auto-mount Luks Encrypted Partition At Boot?

May 27, 2010

I'm having a problem auto-mounting a new luks partition. I have crypttab and fstab entries. I already have my primary encrypted partition (root) mounting at boot (from the install), but after creating this one manually, it does not open on boot. It auto-mounts when I run the following command manually after boot: sudo luksOpen /dev/disk/by-uuid/<uuid> mycrypt

/etc/crypttab entry:
personalcrypt /dev/disk/by-uuid/a1af5b7b-db58-4690-b586-b74407795e2c none luks
/etc/fstab entry:

[code]...

View 1 Replies View Related

Ubuntu :: Update-grub Fail When Converting To LVM On Luks Partition?

Oct 26, 2010

I'm trying to migrate my LVs over to a Luks volume (prompt on password at boot). Unfortunately, as soon as I add my luks-encrypted physical volume to my volume group, I'm no longer able to update my grub configuration. I've detailed my steps below:

I've created and unlocked my encrypted partition with the following:

Code:
sudo cryptsetup -c aes-cbc-essiv:sha256 -y -s 256 luksFormat /dev/sdb1
sudo cryptsetup luksOpen /dev/sdb1 crypto_agilityssd
My /etc/crypttab looks like this:

[Code].....

View 2 Replies View Related

General :: How To Write As A Normal User To A Mounted Dm-crypt/LUKS Partition

Jul 17, 2011

I managed to setup an encrypted partition that's mounted on boot using dm-crypt/LUKS.

The relevant entry from my /etc/fstab:

/dev/mapper/st_crypt /media/st ext4 defaults 0 2

The partition is mounted at boot, and I can write to it as root just fine, but I have no idea how to make it writable by a normal user (i.e the users group).

View 1 Replies View Related

Fedora Security :: Image An Entire Luks System Encrypted Volume And The Rest Of The Used HDD, The MBR And /boot Partition?

Jan 21, 2009

I need a FREE solution that can image an entire Luks system encrypted volume and the rest of the used HDD, the MBR and /boot partition. Note: MBR and /boot are not encrypted. Note 2: I want to be able to restore entire drive from image with only a couple of steps. Note 3: Destination HDD space is a factor. Image file must be compressed and the image file must be around 40 to 50 GB or less. The smaller the image the better.

I have used clonezilla live cd before but not for encrypted volumes. I know you can install it in Linux. But, I don't know how to configure it after installation. I would be very happy if someone could tell me how to configure clonezilla in Fedora. How to guides are also welcome. I have one more question. If I image the encrypted volumes and all the stuff I mentioned above while logged in to Fedora, and I restore the drive from the image, will the recovered drive still be encrypted?

View 8 Replies View Related

Ubuntu Security :: Grub With Luks Support - Encrypting The Boot Partition To Prevent The Kernel From Being Modified?

Mar 9, 2011

Has anyone tried encrypting the boot partition to prevent the kernel from being modified. Iv tried following this but I'm running into issues when building. [URL] Im using the source from bzr checkout [URL] Last time I tried I screwed grub and it wouldnt boot.

View 9 Replies View Related







Copyrights 2005-15 www.BigResource.com, All rights reserved