Hi there!

The last two PCs (A and B) I installed are fully encrypted. I used 
different methods. I used genkernel --luks --lvm --install all to create 
kernel and initramfs. I like to have everything as kernel modules, but the 
crypto stuff has to be directly in the kernel, unless I put these modules 
into the initramfs by hand.


A: LVM -> LUKS
Many partitions make two volume groups with many LVMs. Each LVM is LUKS-
encrypted. This gives me maximum flexibility, who knows what other OSes I 
might need to install on that drive. The boot partition is on a USB stick 
and also holds the key.

This did not work out of the box, I had to modify 
/lib/rcscripts/addons/dm-crypt-start.sh in order to open the other 
partitions than swap and root. I need to add something to close them when 
shutting down, but it seems to work fine without this for the moment. Do 
you know if there already is a solution for this?


B: LUKS -> LVM
A simpler approach. sda1 is a small boot partition, sda2 (the rest of the 
drive) is a LUKS-formatted LVM physical volume with volume group 'pvcrypt' 
on it. This does not work yet, the initramfs does not find the LVM.

I looked into the init script. I wants to do a cryptsetup luksOpen 
$LUKS_DEVICE $LUKS_NAME with $LUKS_NAME=root, which is not the name I use. 
But changing this does not help anyway. I get /dev/mapper/pvcrypt created, 
but pvscan does not find it. At this point I thought I'd ask here, do you 
have ideas what's wrong?

Using a live CD I can easily access my data:
cryptsetup luksOpen /dev/sda2 pvcrypt
pvscan
vgchange -a y
mount /dev/vgcrypt/root /gentoo

        Wonko

Reply via email to