Fedora :: Disable Plymouth Mounting Of Encrypted Partitions?
Jan 23, 2010
I just updated a system to Fedora 12. It has the same partition setup as the previous Fedora 11, but now when booting it pauses with a padlock icon next to a text entry box.I'm assuming it's trying to get my password to mount the encrypted partitions I have on the drive.
However, most of the time when I'm using that computer, I don't want those partitions mounted, and I would prefer to do a luksOpen/mount manually during those times I need the data thereon. Is there a way to get plymouth to ignore those encrypted partitions while it's booting, so that bootup doesn't pause for user input? I have an empty /etc/crypttab and the partitions in question are not in /etc/fstab.
For anyone who's looking at this, pass "rd_NO_LUKS" on the command line to disable the initrd from looking for encrypted partitions to try to mount.
I've created some encrypted partitions using Disk Utility, and would like them to be automatically mounted when Ubuntu starts up. Is there a guide to this anywhere?
I've gathered that it involves /etc/crypttab and possibly /etc/init.d/cryptdisks, but haven't had much success so far.
Ideally, some of the partitions would mount early in the boot process, while some of them can mount after I've logged in.
I have an encrypted partition which shows up in Dolphin file browser.But as a non-root user, I cannot unlock and mount it. A message in Dolphin comes up saying that a policy prohibits this. As root, this unlocking of the encrypted partition goes normally. I cannot find the setting to change in KDE perhaps;
there is a way to mount, encrypted partitions as a normal user and not as root so that i may copy files into it using the file manager itself? even in the case of normal partitions other than /home, i can't seem add any data in them. the mount points i used are seperate directories within the /home partition?? also, is there a way to create partitions in such a way that it can be accessed, just as how windows partitions are accessed in linux?
I am looking for a guide for Fedora 13 that tells me how to:
1. Create an encrypted partition on an an external USB hard drive
2. Tells me how to setup Fedora to ask me for the passphrase when I plug in the drive
3. Automounts the hard drive to a set location
The guide should deal with the situation that the computer can mount without declaring the external hard drive is not there.At present my attempt at mounting my Samsung Story USB2 hard drives does not meet criteria 2 and 3.
Does grub2 support booting off of encrypted partitions? I'd like to have an encrypted linux system, but only have space for one partition or logical group in my mbr. Or can I include that one /boot partition in the lvm group.
and I'm dumped into recovery mode. However, if I remove these mounts from /etc/fstab via comments, I can wait for the system to boot (which it does very quickly) then mount the mapper devices myself. So what is going on? Has something changed wrt logical volumes, or is this just systemd? I can live with manual mounting, but any advice on resolving the automatic mounting situation would be great.
I've got a Desktop System that Automounted Two NTFS partitions in F10 so I could declare them SAMBA Shares and have my other XP and Vista Machine Access them whether my dual boot machine ran XP or F10. Now I've switched to F11 and cannot get the NTFS Partitions to Automount at boot. If I browse with COMPUTER and let the system mount the NTFS partitions once it is running the mount command returns the following output:
[code]....
I believe I need to modify /etc/fstab but cannot get the syntax correct to save my life.
When i use the "Places" menu to try to access the other partitions on the same hard-drive i get a pop-up box asking me for the Root user password. Is there any way to mount it without? The normal user is now in the sudoers group but really i don't think i should be asked for authentication at all?
I boot several Redhat based distributions, Fedora 15, Fedora 14, CentOS, Scientific Linux, Redhat and occasionally something non-Redhat based like Ubuntu and Debian. Out of habit and preference I frequently set up partitions to be auto mounted at boot through fstab. Somewhere in time something went seriously wrong with the CentOS install. There are a ton of permission denied errors while booting CentOS (text style boot) mostly regarding shared libraries. The system will boot to the desktop and everything looks OK but some things don't work. I can't update the system because I have no network connection. I obviously can't get to the Internet or get e-mail. I can open a VT but can't log in as regular user or root.
Permission denied in both instances. I didn't make any drastic changes to the CentOS system, just minor tweaks. The culprit in my opinion is a combination of the fact that one of the other Linux systems did an SELinux relabel while booting and the CentOS partition was already mounted. Since the CentOS partition was mounted it too was relabeled. I can't prove this. If there's a way to prove it then I just don't have the skills or knowledge to do so. It's basically a theory based on what I know I've done with the several installed distributions. This is not a rant nor is it a request for help. Just a comment. An assumption, hopefully a correct assumption. The CentOS install was working flawlessly until something happened and I think that something was the SELinux relabel.
I'm using fedora core 9 and I am a linux beginner. In my computer, I can see the icons representing windows partitions but cannot be opened. I right click on it and then opt for "mount the volume" . But there is no use. What can I do?
I know nothing about linux. But my friend says linux is good. So, I kept a copy of fedora core 10 i386. My fiend has a lot of movies about 100 in his ipod. So, I took it. It contains lot of viruses and I opened the ipod in windows but my windows has malfunctioned due to the virus. So, I have installed the fedora core 10 i386. I have some important information in the windows ntfs partitions. How do i mount those ntfs partitions.
I am trying to install Fedora 12 x64 on my 27" iMac 10,1. I have tried both the installation dvd and the gnome live cd (both x64 i did not try the x86). On the installation dvd I get as far as the menu giving me the boot/install options - I have tried to install both with a basic video driver and the regular install/upgrade option - both times it begins loading components for the installer program (/sbin/loader) etc. After it loads sbin/loader and mounts the partitions it freezes with half the screen being the terminal txt beforehand and the other half being just a standard fedora logo w/blue background. It is not much different when I try the live-cd the only different is it does the exact same thing when the timer for automatic login is done. Any possible command line arguments that I could use to stop the graphical corruption?
I haven't used encryption previously but through that for better security, I would enable it on one of my disks. I went though the process and when done, copied data to the device etc. My house had a powercut the other day and I noticed that the device did not mount automatically upon restart. Unfortunately, I have forgotten the de-cryption password and have lost access to my data. Is there a way of either recovering my password or getting the partition to mount without the password so I can access the data, copy/back up and then re-create the partition without encryption?
Installed new drive in notebook, connected old one with SATA/USB cable, both are encrypted disks. It detected the old drive and prompted for password in Gnome, after entering correct decrypt password, this error appeared:
I have a RAID array that contains an encrypted volume that I setup using Disk Utility. What I want to do is mount this volume from the terminal and therefore be able to mount at login (as the pass phrase is saved). At the moment I have to manually click on the volume in Nautilus first before using. I've been trying to use the following command to no avail:
Code:
gvfs-mount -mount /dev/md1
which simply returns "Error mounting location: volume doesn't implement mount"
I recently had one of my computers motherboard die and so I moved the hard drive to another linux machine so I could access the data. The hard drive is installed correctly and I've mounted several logical volumes on the drive ok, but I'm having trouble with the two volumes which were encrypted. The LVM Gui in Fedora is ignorant to any encrypted LVMs so I looked around to see if others have solved this problem and found the following command: # cryptsetup luksOpen /dev/vg_delldesk/lv_home luks-fedora
My Logical volume container is vg_delldesk and the encrypted volume is lv_home - when I execute this command I get the following error: Device /dev/vg_delldesk/lv_home is not a valid LUKS device. I have access to the root partition from the old box so the config files are there to reference the old setup if needed. My current box is Fedora 14 x_64, I have dm_crypt mod installed in the kernel as well.
I just installed CentOS 5.4 (x86_64) and I encrypted my /home /var /tmp and /mnt/Storage partitions, along with my swap partition. My only complaint is that when I boot, I have to enter my password 4 times, and I did not pick a short password. The password is the same for all 4 partitions. Is there anyway I can set things up so I can just type my password once? Once I get everything set up, I won't be booting that often, but right now it is a PIA.
I have a external HDD with eSATA and USB connectors available. I want to use this HDD to store my backups. The HDD should be encrypted (my main system is as well).
So here is what I did so far: 1) I used the following code to create the encrypted LUKS partition with EXT3 Filesystem: Code: cryptsetup -c aes-xts-plain -s 512 luksFormat /dev/sdb1 cryptsetup luksOpen /dev/sdb1 luks mkfs.ext3 /dev/mapper/luks The system always hang when I executed the "mkfs.ext3..." command, so I switched the HDD from eSATA to USB and then it worked fine.
2) When I switched on the ext. HDD the first time, the drive was recognized automatically and Nautilus asked for the password. I typed it in as checked the checkbox to remember the password in the future. For the backup I use a nice script that I found in another forum, where I can define a mountpoint and then the script will check for previous backups and only make a incremental backup based of the latest version. The script also mounts the drive automatically. In order to always have the same mountpoint, I want to make an entry in the /etc/fstab using the UUID of the ext. HDD.
Whatever I tried, it doesn't work. What am I doing wrong? Here is my current /etc/fstab Code: # <file system> <mount point> <type> <options> <dump> <pass> proc /proc proc defaults 0 0 # / was on /dev/mapper/ubuntu-root during installation UUID=2ea47421-73ce-4c66-9606-8a1db81ae640 / ext3 relatime,errors=remount-ro 0 1 # /boot was on /dev/sda1 during installation UUID=dbdeb793-1d4e-43ea-8986-7b37fdbc9674 /boot ext3 relatime 0 2 # /home was on /dev/mapper/ubuntu-home during installation UUID=42702091-83e6-43eb-aad1-108f43eedf9d /home ext3 relatime 0 2 # swap was on /dev/mapper/ubuntu-swap during installation UUID=e225bcf9-908b-4226-a963-6b02ee658df1 none swap sw 0 0 /dev/scd0 /media/cdrom0 udf,iso9660 user,noauto,exec,utf8 0 0 # Eintrag wegen iPhone none /proc/bus/usb usbfs devgid=125,devmode=666,nodev,nosuid,noexec 0 0 # external HDD UUID=913977f7-8fa6-416f-af79-b5f913b68f53 /media/backup-hdd ext3 noauto,users 0 0 I made the "none /proc/bus/usb..." entry because it was recommended to ensure correct behaviour of the iPhone. Not sure if I need it though.
I created the mountpoint with this command: Code: sudo mkdir /media/backup-hdd Now it seems the mountpoints owner is not root - strange right? Code: 2 4 drwxr-xr-x 3 michael michael 4096 2010-01-15 02:45 backup-hdd How should I mount this drive correctly? It will be automounted as every USB device, but that should not be the case. I want the script to mount and unmount the drive.
I've just reinstalled my box with an encrypted home (used the encrypt home option when installing). I have a query in this regard - suppose I lose the box. Won't it be possible for someone to drop into root, reset my passwd and then access my /home. Is there anyway of having a different passwd for accessing /home? My ~ is on a different partition from /.
We have a Windows server at work that has several shared directories. For whatever reason the lab administrator has required clear-text passwords for it. There is a registry tweak for Windows boxes. Nautilus can't mount shares because it is trying to use an ecrypted password. Ironically enough the Windows VM I have running in Virtual Box can mount the shares.... smbclient can see the server and shares if I specify a clear-text password option.
I have installed debian 6 on two of my laptops. During installation I chose to encrypt my partitions (swap, root and home). Now I find it annoying that during boot up I'm asked for password, for each of these partions seperately. I have given same password for all three of them. How can I make the system ask for the password only once. I know it can be done because on fedora it was like that before.
I need to disable my encrypted home directory because it prevents me from logging in with my fingerprint scanner when I first boot up. I'm running kubuntu 9.10.How do I do this?Also, how would I revert back to it being encrypted if I decide to not use the fingerprint scanner for initial log in anymore?
Alternate CD on USB - Natty not mounting Encrypted Volume I get initramfs prompt. I have a Dell Inspiron Duo. I've tried to install Natty i386 and AMD64. I set my / (root) and swap under LVM under an encrypted volume. Used manual partitioning. But after reboot, I successfully enter the passphrase, swap and root are not mounted.
Now, I've had this working with 10.10. System seemed a little quirky after the upgrading it to Natty. So, I wanted a fresh install. Used Unetbootin to run ISO from USB and also from one of my other partitions. I've tried installing at least 10 times, some repeat, some variations.
I can see from /var/log/messages error messages and weird crashes that the disk in my laptop is on the way out. I plan to replace it but to do this I'd rather not have to install everything again.My laptop has these partitions:Windows Recovery (10GB)Windows 7 (NTFS 96.6GB)Linux /boot (ext4 100MB)Linux LVM (encrypted, 143GB)I need software that will allow me to create an image (or images) of all these partitions, save the image(s) to a USB hard drive and restore from those images once I've put the new, blank, hard drive into the laptop. Does anyone know of software (either open source or commercial pay-ware) or a technique to do this?
I'm running Debian Squeeze AMD64 with full disk encryption and LVM. After reinstalling Windows 7 I lost GRUB from the MBR. I managed to install GRUB after following this guide and using an Ubuntu 10.04 graphical installation disc, but I only get to a GRUB CLI when booting, so I can't actually choose an OS there.
I tried following this guide but I'm stuck after "# Mount the partitions to /mnt/root" and don't know what to do.
Does anyone know how I can fix GRUB so I get to choose between Debian and Windows 7 there?
I have implemented a web application on Linux that I want to deploy and sell to customers. I want to sell ready systems including the hardware. The application is written in PHP/MySQL. What I am searching to achieve is :
1) Find a way so that filesystem and partitions to be encrypted but without the need to insert some code when rebooting. So that if someone gets out the hard disks and attach to another system, cannot have any access to my files or settings. And of course when rebooting (e.g. after a power failure) encryption to be applied automatically.
2) I know that there are ways to bypass root password on a Linux system. Can all these ways be unassigned ? I want the only way to have access to system, to be by using the root password and nothing else.
I have thought of using a virtual server instead of a physical one (like deploying a virtualbox server) but still would like this to be the most secure possible including not only remote but also local access to system.