On Thu, 2002-12-26 at 04:26, Jack O'Quin wrote:
> 
> I managed to install cryptoapi-core-source from testing and build
> a 2.4.19 kernel with those modules (plus ALSA).  
> 
> But losetup still fails:
> 
>   sudo losetup -e blowfish /dev/loop0 ~/.crypto
>   Available keysizes (bits): 128 160 192 256 
>   Keysize: 256
>   Password :xxxxxxxxxxxxx
>   
>   Password :xxxxxxxxxxxxx
>   
>   The cipher does not exist, or a cipher module needs to be loaded into the kernel
>   ioctl: LOOP_SET_STATUS: Invalid argument
> 
> I tried installing cryptoloop-source from testing.  But it only
> contains the following patches:
> 
>   /usr/src/kernel-patches/all/loop-jari/loop-jari-2.2.20.gz
>   /usr/src/kernel-patches/all/loop-jari/loop-jari-2.4.18.gz
>   /usr/src/kernel-patches/all/loop-jari/loop-jari-2.4.16.gz
> 
> Is this package still needed?  The /usr/share/doc files seem to
> indicate that it is.  So, how do I build a patch for 2.4.19?
> 
> What am I missing, here?

Hi Jack,
to use filesystem encryption via the loopback-device, you need the
cryptoapi and the patch for the loopback device (eg. loop-jari).

You get 'ioctl: LOOP_SET_STATUS: Invalid argument' because the loop
device loaded in the kernel is not patched, build the loop device as
module, the 'right' one is called 'cryptoloop'.

The relevant modules from my lsmod output:
cipher-aes             21172   2 
cryptoloop              1708   2 
loop                   10032   4  [cryptoloop]
cryptoapi               3660   5  [cipher-aes cryptoloop]

You might want to try the 'magic installer' from 
http://www.kerneli.org/
I haven't tried it, but it looks promising. This is also the site, where
you can find further information.

If you want to patch it by yourself, the accordant patches are called:
'patch-int-2.4.xx'
'loop-jari-2.4.xx.patch'

These can be retrieved from
http://www.kernel.org/pub/linux/kernel/people/hvr/testing/

You might also want to look at pam_mount at:
http://freshmeat.net/releases/102327/
To mount the container-file transparently at login. I had to recompile
util-linux, because the debian 'mount' binary won't mount loopback
devices with encryption without prior initialisation via losetup.

I haven't tried to patch the kernel-sources distributed with debian, but
a plain kernel from http://www.kernel.org

> -- 
>   Jack O'Quin
>   Austin, Texas, USA
> 
> 
> -- 
> To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
> with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
> 
> 
-- 

"boredom is not a burden anyone should bear"


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to