Encrpted Partitions: cryptsetup

Discussion in 'Linux, BSD and Other OS's' started by Impotence, Jan 21, 2007.

  1. Impotence

    Impotence May the source be with u!

    Likes Received:
    6
    Trophy Points:
    38
    Hey all,

    I'm trying to create a completely encrypted setup (swap, home, / .... everything except /boot).

    I'm basing everything on these guides (under "Encrypted Filesystems") and the cryptsetup man page (man cryptsetup!)

    has anyone here ever attempted anything similar? I'm bound to run into a few problems (which i will post up :p) but i was wondering if anyone has any pointers :)

    [OT]
    Encrypted swap is going to be fun :D as you don't need to be able to read the contents of swap every time you reboot, you can generate a new key to use every time (so when you reboot the old key is lost, and thus the contents of the swap partition as well!)

    One thought though, when you hibernate where does the contents of RAM get saved? I would hope its not your swap partition... as this would mean I'm going to have to change it! (the contents of my swap partition will be lost as shutdown)
    [/OT]
     
  2. Impotence

    Impotence May the source be with u!

    Likes Received:
    6
    Trophy Points:
    38
    Ok, first problem!

    I formatted the partition with the command
    Code:
    cryptsetup luksFormat -d /mnt/usbstick/keyfile1 -c aes-cbc-essiv:sha256 /dev/sda3
    
    since i have used a keyfile, how do i make the entry in crypttab? i tried using
    Code:
    crypt-home    /dev/sda3             /mnt/usbstick/keyfile1    luks
    
    which returns the error: (it never asked me for a passphrase, but i did have to supply one to format the partition)
    Code:
     * Starting remaining crypto disks...                                           -e
     - INSECURE MODE FOR /mnt/usbstick/keyfile1
    Command failed: No key available with this passphrase.
    
    I also tried using: (i guess this tries to read the entire directory, not search through the keyfiles as i hoped :p)
    Code:
    crypt-home    /dev/sda3             /mnt/usbstick/    luks
    
    which returns the error
    Code:
     * Starting remaining crypto disks...                                           -e
     - INSECURE MODE FOR /mnt/usbstick/
    test: 44: root: unexpected operator
    Warning: exhausting read requested, but key file is not a regular file, function might never return.
    Command failed: No key available with this passphrase.
    
    whats going on here?
     

Share This Page