Ubuntu :: 9.04 - Cannot Login To Encrypted System

Mar 22, 2010

I have Ubuntu 9.04 and I have encrypted swap, root partitions and two internal hard drives with this howto: [URL]. It's been working about a year now but after an routine fsck (when Ubuntu starts) I can't log in no more. After first passphrase (must be the root partition) the scrolling thingy stops and "Caps lock" and "Scroll lock" starts to blink and nothing happens. I have two 1 TB drives full of data which I can't get in to.

View 5 Replies


ADVERTISEMENT

Ubuntu Security :: Different PWD For Login And Mounting Encrypted /home

Nov 13, 2010

I've just reinstalled my box with an encrypted home (used the encrypt home option when installing). I have a query in this regard - suppose I lose the box. Won't it be possible for someone to drop into root, reset my passwd and then access my /home. Is there anyway of having a different passwd for accessing /home? My ~ is on a different partition from /.

View 3 Replies View Related

Ubuntu :: Auto Mount Encrypted Volume Using Login Passphrase?

May 3, 2010

I recently installed Ubunutu 10.04 Netbook Remix onto a Dell Vostro A90. During install I selected "Require my password to log in and to decrypt my home folder", and this is working great.

What I would like to figure out, is how to have a second encrypted volume that lives on my SD Card that is also decrypted automatically upon login.

I've tried a variety of things, but they all require me to re-enter my password at some point during the boot/login, once for user login and the other time to decrypt/mount the volume. I am trying to avoid this, and hopefully will only have to enter my password once. Maybe I can piggyback on the default Ubunutu home directory decryption and make it all appear seamless?

View 3 Replies View Related

Ubuntu :: Auto-Mount Encrypted Drive Upon Login Lucid

Jul 31, 2010

I am trying to have an encrypted drive auto-mounted once i log into Lucid.

I created the encrypted drive with the disk utility in administration menu

I also have the password remembered "forever" so when i am logged in i just click the icon for the drive on left panel and it mounts.

I am able to find the uuid and know what device is called sdd but i don`t know how to put it into fstab if that is possible?

View 1 Replies View Related

Ubuntu Security :: Justify Home Drive Is Encrypted And Decrypted During Login?

Aug 17, 2010

Lately i just reformatted my laptop again and created a encrypted home drive using the default.It prompt for my password and then i key it into the terminal.Then the terminal closed it.How to justify that the home drive is encrypted and decrypted during login?Beside that,if it is encrypted and what kinda extension is drive gonna?Apart from that,i used cryptkeeper to create a encrypted folder.How do i know if the folder is encrypted beside it prompt for me to enter my password?

View 7 Replies View Related

OpenSUSE Install :: Encrypted LVM LUKS And Login Screen

Apr 2, 2011

I recently installed OpenSUSE 11.4 64 bit with GNOME yesterday and everything is going fantastic. I like it much better than Ubuntu 10.10 64 bit Maverick Meerkat because it is much more stable, reliable, and dependable. I own a heavily modified ASUS N61JV-X2 notebook PC. I installed OpenSUSE using the LVM based method and LUKS encryption. When I turn on the power to my notebook PC, it asks me for my password to decrypt my Intel 2nd Generation 160.00 GB Solid State Drive. I expected this behavior. However, I never get to see the OpenSUSE login screen. After I type in my password to decrypt my SSD, it loads up the desktop immediately. How do I configure my OpenSUSE so that I can see the login screen so that I can select my standard user profile and enter the user password to login?

View 9 Replies View Related

General :: Error Establishing An Encrypted Connection To Login?

Apr 14, 2011

I am using Redhat 9 and get the message error establishing an encrypted connection to log in. Error code 8155. How can I correct this as I cant access sites to check my mail.

View 6 Replies View Related

OpenSUSE Install :: Pass Through Login Details To Mount Encrypted Volumes

Jul 17, 2010

I'm looking for a way of mounting an encrypted volume - home folder or a separate mount point, using only the standard login authentication (ie KDM or ssh). I thought the pam_mount module provided this, but I still get prompted for a password on the console at boot time. This is inconvenient as both my main desktops are headless HTPCs. I want the login credentials to be passed through, at log in time. I'm guessing this is possible, but to be honest, encryption is one thing in Linux that still completely confuses me.

View 1 Replies View Related

Security :: Change Login Passphrase (to Unlock Encrypted Home Directory)

Nov 21, 2010

I just installed the testing version of Debian with the option to setup encrypted home directories. I used a passphrase that I now want to change to something else. How do I do that?

View 4 Replies View Related

Ubuntu Installation :: Lost Grub MBR On Encrypted System

Mar 6, 2010

During a repair windows did overwrite my grub MBR for it's own bootloader. Now how do I get back to my encrypted ubuntu?

View 5 Replies View Related

Debian :: Making LiveDVD Of Encrypted System

Aug 23, 2015

I have a system which i installed on usb flash (doesn't matter why). The system has 3 partitions: "boot", "/" and "swap". "Swap" and "/" are encrypted by LUKS. "Swap" is encrypted by random key, "/" - by passphrase.

I created this system only to make a liveDVD from it (not liveUSB).

To achieve this goal i installed program called "Systemback" (fork of Remastersys).

Links:
[URL] ....
[URL] ....

So i pushed the button 'Create live system' (or Live system create, don't remember exactly) and configured it to automatically convert .*sblive to .*iso

Program made it's work and i burned image in DVD.

But when i launch it i have this:

The last picture - is when i trying to startliveDVD with installed LVM2. No difference except one message.

I went to freenode and ask some questions. Somebody told me that maybe the problem is in LVM. But LVM was already installed, so i installed LVM2. No result.

How can i make the system that is encrypted by LUKS work from DVD? And is it really possible? Maybe systemback doesn't support feature to make live-image of encrypted system?

The system is Debian 8.1.0

I did the same with nonencrypted system - result is succesfull, liveDVD works.

View 5 Replies View Related

SUSE :: Encrypted Root File System On LVM

Jul 12, 2010

I try to encrypt root file system on Opensuse 11.1 and I have found up to two possibilities.

1. [url]

2. [url]

In the first case, i have a Problem with entering password, for each partition on encrypted disk, i must enter my password.(For 3 partition 3 times)

And in the second version to get i nowhere.

Code:

View 5 Replies View Related

Ubuntu :: On Booting System I Get Login Menu But Unable To Login, It Says Some Critical Error Occurred?

Mar 15, 2010

System was fine with :Ubuntu 9.04 (had also installed kde )then....I wanted to try some change to gdm so i downloaded gdm while building it , it asked "PAM" libraries to be installed so i installed PAM ... but ignored the instruction to reinstall SHADOW (library i guess..),Now :on booting system i get login menu but i am not able to login , it says some critical error occured

1) install new copy of UBUNTU and remove old

ps :1) i can log into system through live cd

2) i can use recovery mode boot and log into terminal as root(startx is not working from this terminal..

View 9 Replies View Related

Debian :: Mount Encrypted LUKS Partition (On Former System HDD)

Feb 1, 2016

I have two basically identical harddrives that are encrypted with LUKS containing a complete debian installation:

Code: Select allroot@x200s:/home/b# lsblk --fs
NAME                   FSTYPE      LABEL UUID                                   MOUNTPOINT
sda                                                                             
├─sda1                 ext2              0b851969-281e-4db2-8a5b-3798e801711b   /boot
├─sda2                                                                         
└─sda5                 crypto_LUKS       cfcf63ef-448a-4f72-9f58-8f7731cf3dfc   
  └─sda5_crypt         LVM2_member       21CS3f-SQeQ-XcMr-kyDs-OPtR-egmT-HkvJAu

[Code] ....

sda is what I currently run to write this text, sdb is my former harddrive, connected via USB.

I want to access the root partition on sdb.

The problem is:

Code: Select allcryptsetup luksOpen /dev/sdb5 oldhd
Enter passphrase for /dev/sdb5:
root@x200s:/home/b# ls /dev/mapper/
control  oldhd   sda5_crypt  x200s--vg-root  x200s--vg-swap_1
root@x200s:/home/b# mount /dev/mapper/oldhd /mnt/
[b]mount: unknown filesystem type 'LVM2_member'[/b]

[Code] ..

Before all this, both sda and sdb where in the same volume group. I renamed the volume group of sdb to "oldDisk"
using

Code: Select allvgrename <UUID> oldDisk

How I can access the data on the root filesystem of my sdb..

View 2 Replies View Related

Debian Configuration :: Moving Encrypted System To New Drive

Dec 30, 2015

I want to move my old system to a new drive. Currently I have Debian installed with following configuration:

I have an encrypted system where everything is encrypted except /boot. Currently I've /boot and / installed on a 16 GB mSata SSD and /home on a regulard HDD. I've got a 500GB SSD for Christmas and want to move the whole system to the new SSD.

I just wanted to ask if I've got the process required to to this down:

1. backup root-directory (/) without and /boot /home using tar keeping file-permissions and owners to ext. hard drive
2. backup /boot and /home separately using the same method
2. replace HDD with SSD remove mSATA SDD.
3. boot via live-usb
4. create appropriate volume groups, partitions, setup encryption etc.
5. extract backups to appropriate partitions
6. chroot to old /.
7. edit fstab
8. reinstall grub
9. create new init ram img.

I'm pretty sure I've got steps 1.-6. down but I'm very shaky on what to do next.

View 0 Replies View Related

Fedora :: Kernel Compile With Encrypted File System?

Dec 9, 2009

I am trying to replace just the kernel (no modules) for my default kernel on FC 11. I use the default .config file and just change a few things and then run the make command. After I replace the kernel and reboot the system the password comes up for the encrypted filesystem and it does not take my password for some reason. what I need to do to get this working?

View 1 Replies View Related

Fedora :: Can't Enter Password For Encrypted File System

Jul 27, 2011

I just upgraded from F14 to F15 and have a problem with entering the password for the encrypted FS: when booting with the latest entry in the bootloader:

Quote:

kernel /vmlinuz-2.6.38.6-26.rc1.fc15.i686.PAE ro root=/dev/mapper/vg_anonymous-lv_root rd_LUKS_UUID=luks-3ef72221-1165-46a6-ab69-3932e22e9d4f rd_LVM_LV=vg_anonymous/lv_root rd_LVM_LV=vg_anonymous/lv_swap rd_NO_MD rd_NO_DM LANG=en_US.UTF-8 SYSFONT=latarcyrheb-sun16 KEYBOARDTYPE=pc KEYTABLE=de
initrd /initramfs-2.6.38.6-26.rc1.fc15.i686.PAE.img

[Code]....

View 1 Replies View Related

Debian :: Make System Ask Password For Encrypted Partitions Only Once Not For Each Of Them?

May 29, 2011

I have installed debian 6 on two of my laptops. During installation I chose to encrypt my partitions (swap, root and home). Now I find it annoying that during boot up I'm asked for password, for each of these partions seperately. I have given same password for all three of them. How can I make the system ask for the password only once. I know it can be done because on fedora it was like that before.

View 5 Replies View Related

General :: Upgrading Encrypted System From Lenny To Squeeze

Apr 8, 2011

I'm looking to upgrade from Lenny to Squeeze and would like to check if there's anything special I need to do. Software-wise there's nothing out of the ordinary on the system but, while looking into upgrading, I've read some horror stories regarding encrypted systems. I've only previously installed from fresh.

Here is how my current partitions/filesystems are set out:
. sda1/sdb1 > raid > ext2: boot
. sda2/sdb2 > raid > luks > lvm > ext3: root
. sda2/sdb2 > raid > luks > lvm > ext3: swap
. sda2/sdb2 > raid > luks > lvm > xfs: data
. sdc1/sdd1 > raid > luks > lvm > freespace: vms

Would this just be a standard upgrade, as per these? [URL]. I will be backing up important data before I attempt to upgrade.

View 2 Replies View Related

Ubuntu Security :: Main Encrypted LVM Not Accessible After Deleting A Different Encrypted LVM On USB HD

Mar 7, 2011

I installed Ubuntu 10.10 64 on my laptop with the entire 500gb setup as encrypted LVM. This has worked well for several months with no problems. During this time i have been backing up the data to an external usb drive (1tb) on a regular basis. The usb drive was not encrypted. So, I thought it would be a good idea to encrypt the backup drive too. I wiped out the backup drive and set it up as one large encrypted lvm and mbr. This seemed to work fine but immediately afterwards I decided to erase that and set it up as encrypted lvm guid instead of mbr. I couldn't delete it while logged into my desktop so i decided to do it from a bootable gparted usb stick. In gparted i erased the 1TB backup drive once again and planned on setting it up the way I wanted once I was logged back into my ubuntu desktop. Now I cant boot into my desktop with the following errors:

cryptsetup: evms_activate is not available b0d) does not begin with /dev/mapper/

Then after waiting for a few minutes I get an error followed by (initramfs)

When booting from a live version of ubuntu the 250MB boot patition is recognized and 500 partion is there but it is labeled as empty/unused.

Also, I did choose to use the exact same passphrase as what is used on the main bootable drive when I set up the encrypted partition on the external 1TB drive.

View 9 Replies View Related

Ubuntu Security :: Right Click - Automatically Get The Encrypt Process To Delete The Un-encrypted File When It Makes The New Encrypted Copy?

Jan 5, 2010

I've just started using ubuntu one. However, some of the files I store on there are sensitive so I encrypt them using seahorse. Right click, encrypt etc etc. My question is, is there a way to automatically get the encrypt process to delete the un-encrypted file when it makes the new encrypted copy?

View 6 Replies View Related

Debian Installation :: Live System Working With Encrypted Persistence

Oct 28, 2014

I tried a while getting a live system working with encrypted persistence. The command

Code: Select alllive-persistence activate /dev/sdx2

works perfect, but boot time persistence works only for unencrypted storage. 'Cause I can not append the boot-log as file the most important part here:

Code: Select all+ tailpid=123
+ tail -f boot.log
+ cat /proc/cmdline
+ LIVE_BOOT_CMDLINE=BOOT_IMAGE=/live/vmlinuz boot=live noeject keyboard-layouts=de components persistence persistence-encryption=luks,none initrd=/live/initrd.img debug=true
+ Cmdline_old
+ PERSISTENCE=true
+ export PERSISTENCE

[Code] ....

The most confusing line is "Warning: cryptsetup is unavailable" - I took a look into the scripts, it checks if cryptsetup and askpass is executable if not this message. But:

I mounted the hdd-img file local and took a look: all binaries there.

So I tried a lot getting it working on boot time. I tried it with live-tools from testing, from wheezy and last but not least installed and pinned live-tools to unstable. Always the same. askpass isn't executable on boot time before mounting the persistence.

Config is
Code: Select alllb config noauto
    --apt apt
    --bootstrap debootstrap
    --binary-images iso-hybrid
    --distribution testing
    --mirror-bootstrap http://ftp.debian.de/debian/

[Code] .....

(tried with binary-images=hdd, too)

and yes, cryptsetup is inside package-list (otherwise live-persistence from within running machine with crypted partitions would not work). Live tools I used for last run is 4.0.3-1 from unstable, before tried with 4.0.2-1 from testing.

Whats going wrong in boot system?

View 12 Replies View Related

OpenSUSE Install :: System Encrypted But Have To Supply Password Again For MD Raid?

Mar 21, 2011

I followed this tutorial to encrypt my entire installation: SDB:Encrypted root file system - openSUSE

It worked splendidly and whoever wrote it should get a lifetime supply of beer. After I got the install encrypted I made a RAID 1 array of 2 1GB disks and encrypted that as well. They are used for a data repository.

[Code]...

View 9 Replies View Related

General :: Running A Web Server With An Encrypted File System (all Or Part Of It)?

May 5, 2010

I need a webserver (LAMP) running inside a virtual machine (#1) running as a service (#2) in headless mode (#3) with part or the whole file system encrypted (#4).The virtual machine will be started with no user intervention and provide access to a web application for users in the host machine. Points #1,#2 and #3 are checked and proved to be working fine with Sun VirtualBox, so my question is for #4:Can I encrypt all of the file system and still access the webserver (using a browser) or will GRUB ask me for a password?If encrypting all of the file system is not an option, can I encrypt only /home and /var/www? Will Apache/PHP be able to use files in /home or /var/www without asking for a password or mounting these partitions manually?

View 2 Replies View Related

General :: System-auth Configuration \ Can't Login And/or Can't Login In The GUI Interface And A Terminal?

Apr 20, 2010

I'm hoping someone can help me out.I made configurations changes to/etc/pam.d/system-auth and /etc/pam.d/login. When these files are configured the way they are, I can't login and/or I can't login in the GUI interface and a terminal. Contents of /etc/pam.d/login

Code:
#%PAM-1.0
#line added per security guide

[code]....

View 2 Replies View Related

Debian Installation :: Encrypted LVM Install - No Root File System Detected

Jun 1, 2013

I'm a long time user of Debian, but I'm having trouble with my partitioning process. Here is where I currently stand:

I am installing the latest Wheezy build. I am trying to install debian with an encrypted LVM that spans two hard disks.

My partitioning layout is as:

1. /home
2. /root
3. swap
4. /boot

I then added partitions 1, 2 and 3 to a physical volume group. I then took that physical volume group and added it to a logical volume. Then I encrypted the logical volume, leaving the /boot partition untouched. I was under the assumption that the only partition the system needed free to reach the loading of the LVM is the /boot partition, as it holds the files necessary for booting. But when I attempt to finalize the disk, it gives an error stating, "No root file system detected". That would be an issue as it is currently sitting inside the encrypted LV. Am I wrong in including the root partition in the encrypted LV?

What is the best way of having as little of my file system non-encrypted as possible while still allowing a proper boot?

View 9 Replies View Related

CentOS 5 Server :: Unattended Reboot With An Encrypted Root File System?

Mar 31, 2009

Centos 5.3 includes Ext4 and improved support for encrypted file systems but it appears to be aimed at laptop/desktop systems, in that a password must be entered at boot time.

Is it possible to have a server with an encrypted root file system boot up without entering a password?

Mandos will do it...
http://wiki.fukt.bsnet.se/wiki/Mandos
...by serving up the password from another server...
http://packages.debian.org/squeeze/mandos
...to a client loaded into the initial RAM disk environment...
http://packages.debian.org/squeeze/mandos-client
...but it's not available on CentOS, and is only in Debian unstable.

Is there a similar (or any) solution for CentOS?

In particular, I'm envisaging encrypted virtual machines being served passwords from their virtual host.

Alternatively, the data that *really* needs to be protected could be encrypted while the system core remains unencrypted. But then the keys to decrypt the file system must be stored in the unencrypted portion, so this is not an effective method.

View 3 Replies View Related

Ubuntu :: Can't Login In Visual Login System

Jul 31, 2010

I was a user from China. I login Ubuntu 10.04 used gdm and kdm can't login. The login system just fash some times and go back to login sytem.

I can only use startx to login system.

And I see system Log, I find those log:

ul 22 23:02:04 owen-desktop gdm-session-worker[4623]: pam_unix(gdm:auth): conversation failed
Jul 22 23:02:04 owen-desktop gdm-session-worker[4623]: pam_unix(gdm:auth): auth could not identify password for [zou]

[Code].....

I didn't use Ubuntu for a long time for this issue.

View 2 Replies View Related

OpenSUSE Install :: Full Encrypted System (expected /boot)with The Best Possible Algorithm And Key Length?

Aug 18, 2010

but I wantto set up a new system with openSUSE 11.3 The system should be fully encrypted. I want to use the best possible encryption.1 I am not sure, AES 256 xts-plain is the most secure single algorithm, isn't it?2 Is it possible to use a cipher? 3 Which algorithm does the yast-installer use when I encrypt the whole system with a logical volume group?I have read this two articles:a) Encrypted Root File System - openSUSEb) openSUSE Lizards encrypted root file system on LVMBut I have to say that these routines are a little bit complicated in my eyes.Isnt there a easier way to encrypt the whole OS?I know there is a 64bit live cd available. 4 So the first description (a) is obsolete?5 How can I set up a (fully encrypted) system without using LVM?The hard disk layout should be done in this way:

/boot sda1
/enhanced partition sda2
/swap sda5

[code]....

View 8 Replies View Related

Fedora Security :: Image An Entire Luks System Encrypted Volume And The Rest Of The Used HDD, The MBR And /boot Partition?

Jan 21, 2009

I need a FREE solution that can image an entire Luks system encrypted volume and the rest of the used HDD, the MBR and /boot partition. Note: MBR and /boot are not encrypted. Note 2: I want to be able to restore entire drive from image with only a couple of steps. Note 3: Destination HDD space is a factor. Image file must be compressed and the image file must be around 40 to 50 GB or less. The smaller the image the better.

I have used clonezilla live cd before but not for encrypted volumes. I know you can install it in Linux. But, I don't know how to configure it after installation. I would be very happy if someone could tell me how to configure clonezilla in Fedora. How to guides are also welcome. I have one more question. If I image the encrypted volumes and all the stuff I mentioned above while logged in to Fedora, and I restore the drive from the image, will the recovered drive still be encrypted?

View 8 Replies View Related







Copyrights 2005-15 www.BigResource.com, All rights reserved