On 2020-12-24 10:06, rhkra...@gmail.com wrote:
On Tuesday, December 22, 2020 07:20:39 PM David Christensen wrote:
Thank you for offering to improve Debian documentation. :-)
You're welcome, but I wasn't making a general offer to improve documentation,
just to fix something that I thought was
Note: Initially sent to David off list, he asked me to reply to the list.
David,
Thanks for your response!
I'm replying privately intentionally for various reasons -- I may summarize
some of this on list at some point.
On Tuesday, December 22, 2020 07:20:39 PM David Christensen wrote:
> Thank
On Ma, 22 dec 20, 12:11:19, rhkra...@gmail.com wrote:
>
>* or if: "you simply forget your password" -- it seems unlikely that
> you'll
> forget the "normal" password (the one you most often use) but remember a
> backup password (although maybe you'd use something really easy to remember
>
On 2020-12-22 09:11, rhkra...@gmail.com wrote:
See the quoted paragraph, below, quoted from the
[[https://wiki.debian.org/LVM#Encrypted_LVM][LVM#Encrypted_LVM]] wiki.
It seems to me that the idea of creating and saving backup passwords is
something of a red herring (to borrow a "Briticism").
Th
Roberto,
Thanks for the reply!
Good points, both of them. I might (or might not) add your use case (the
multiple user case) to the wiki as it sounds like a more plausible need.
On Tuesday, December 22, 2020 12:34:12 PM Roberto C. Sánchez wrote:
> On Tue, Dec 22, 2020 at 12:11:19PM -0500, rhkra
On Tue, Dec 22, 2020 at 12:11:19PM -0500, rhkra...@gmail.com wrote:
>
> My point is this: I think creating and saving backup passwords is of minimal
> value.
Maybe to you as a single user. However, I have worked in places where
resources are protected by multiple passwords. For instance ther
See the quoted paragraph, below, quoted from the
[[https://wiki.debian.org/LVM#Encrypted_LVM][LVM#Encrypted_LVM]] wiki.
It seems to me that the idea of creating and saving backup passwords is
something of a red herring (to borrow a "Briticism").
The way I see it:
* if, in the future: "som
, then directly showed the window manager again.
So, I guess, something essentiell has happened to the suspend code. I read,
that there are problems with encrypted filesystems. And all solutions I found,
were by using an encrypted swap partition.
Please allow me some questions for the understanding
Jonathan Dowland:
> Next step, adjust the daemon to depend on this. In my example,
> transmission-daemon supplies a .service file in the package. Copy this to
> /etc/systemd/system, and add a line (the line prefixed +):
>
> > [Unit]
> > Description=Transmission BitTorrent Daemon
> > After=networ
Hi Erwan,
Firstly I've changed the subject for this thread because the original was not
terribly descriptive.
On Mon, Oct 13, 2014 at 07:57:00AM +0100, Jonathan Dowland wrote:
> On Sun, Oct 12, 2014 at 09:40:44PM +0200, Erwan David wrote:
> > And how to do this is a big problem. There are many ma
Michael Biebl writes:
> udisks-daemon does handle luks/cryptsetup encrypted partitions but it
> seems the udisks command line tool is too limited.
>
> Try "gvfs-mount -d /dev/foo". This should prompt you for the passphrase,
> unlock and mount the file system under /media/FS_LABEL
>
> Can be unmoun
On 14.12.2012 17:12, Michael Biebl wrote:
> Try "gvfs-mount -d /dev/foo". This should prompt you for the passphrase,
> unlock and mount the file system under /media/FS_LABEL
Just in case: If you run that command from a session which has no
running dbus session bus, change that command to:
"dbus-l
On 14.12.2012 10:00, Aidan Gauland wrote:
> Michael Biebl writes:
>> On 14.12.2012 05:06, Aidan Gauland wrote:
>>> How can I fix this? Given that HAL is deprecated, I suspect there is
>>> some other tool that serves the same purpose as pmount-hal that I should
>>> be using instead.
>>
>> yeah, ha
Michael Biebl writes:
> On 14.12.2012 05:06, Aidan Gauland wrote:
>> How can I fix this? Given that HAL is deprecated, I suspect there is
>> some other tool that serves the same purpose as pmount-hal that I should
>> be using instead.
>
> yeah, hal is dead.
> You might try "udisks --mount" instea
On 14.12.2012 05:06, Aidan Gauland wrote:
> How can I fix this? Given that HAL is deprecated, I suspect there is
> some other tool that serves the same purpose as pmount-hal that I should
> be using instead.
yeah, hal is dead.
You might try "udisks --mount" instead.
--
Why is it that all of t
When I mount a filesystem on an encrypted partition with pmount-hal, it
just mounts it on /media/usbdisk instead of using the filesystem's label
to name the mount point, as it does with unencrypted filesystems.
For example,
$ pmount-hal /dev/sdb1
Enter passphrase for /dev/sdb1:
/dev/mapper/_dev_
On Wed, Feb 07, 2007 at 11:22:48 +0100, Dan H. wrote:
> Florian Kulzer wrote:
>
> > The main advantage of pmount is that it allows all members of the
> > "plugdev" group to mount pluggable devices. This eliminates the need to
> > add entries for pluggable devices to /etc/fstab. Since I use pmount
Sorry for posting the same message over and over again. Thunderbird
alias Icedove keeps complaining about not being able to send to the SMTP
server, and I keep changing things trying to help, and of course keep
re-sending the message after making those changes. Apparently icedove
keeps some secret
Florian Kulzer wrote:
> The main advantage of pmount is that it allows all members of the
> "plugdev" group to mount pluggable devices. This eliminates the need to
> add entries for pluggable devices to /etc/fstab. Since I use pmount
> anyway I like the fact that it automatically recognizes LUKS p
Florian Kulzer wrote:
> The main advantage of pmount is that it allows all members of the
> "plugdev" group to mount pluggable devices. This eliminates the need to
> add entries for pluggable devices to /etc/fstab. Since I use pmount
> anyway I like the fact that it automatically recognizes LUKS p
Florian Kulzer wrote:
> The main advantage of pmount is that it allows all members of the
> "plugdev" group to mount pluggable devices. This eliminates the need to
> add entries for pluggable devices to /etc/fstab. Since I use pmount
> anyway I like the fact that it automatically recognizes LUKS p
Florian Kulzer wrote:
> The main advantage of pmount is that it allows all members of the
> "plugdev" group to mount pluggable devices. This eliminates the need to
> add entries for pluggable devices to /etc/fstab. Since I use pmount
> anyway I like the fact that it automatically recognizes LUKS p
Florian Kulzer wrote:
> The main advantage of pmount is that it allows all members of the
> "plugdev" group to mount pluggable devices. This eliminates the need to
> add entries for pluggable devices to /etc/fstab. Since I use pmount
> anyway I like the fact that it automatically recognizes LUKS p
On Tue, Feb 06, 2007 at 09:23:57 +0100, Dan H. wrote:
> Florian Kulzer wrote:
>
> > With your kernel version and udev, hal, dbus + pmount it should be
> > possible to just plug in the drive, wait a few seconds until udev
> > creates the device node and mount it normally with pmount (it will ask
>
On Mon, Feb 05, 2007 at 10:31:19AM +0100, Dan H. wrote:
> Moreover I noticed that just having an encrypted partition mounted
> --local or via USB-- will kill the system after a few minutes.
>
> Sheesh, this is starting to get on my nerves. This machine, by the way,
> has been running sarge for a
Florian Kulzer wrote:
> With your kernel version and udev, hal, dbus + pmount it should be
> possible to just plug in the drive, wait a few seconds until udev
> creates the device node and mount it normally with pmount (it will ask
> for the passphrase). This requires that you use LUKS and device
On Mon, Feb 05, 2007 at 10:31:19 +0100, Dan H. wrote:
> Hello, it's me again:
>
> After "solving" my troubles with transferring data between different
> storage devices (see the recent thread "System freeze when copying
> files" on this list, archived at
> http://lists.debian.org/debian-user/2007/
Hello, it's me again:
After "solving" my troubles with transferring data between different
storage devices (see the recent thread "System freeze when copying
files" on this list, archived at
http://lists.debian.org/debian-user/2007/02/msg00129.html) by using the
linux-image-2.6.18-486 kernel inste
Am Die, 2002-12-24 um 11.42 schrieb Jörg Johannes:
> Hello everybody
>
> I just started to read the Linux Encryption HOWTO on
> http://www.linuxsecurity.com/docs/HOWTO/Encryption-HOWTO/Encryption-HOWTO.html
> and I wonder if I can use encryped filesystems with my sid installation.
> However, I di
Hello everybody
I just started to read the Linux Encryption HOWTO on
http://www.linuxsecurity.com/docs/HOWTO/Encryption-HOWTO/Encryption-HOWTO.html
and I wonder if I can use encryped filesystems with my sid installation.
However, I did not find the crypto-patched mount program on the debian
pack
On Wed, Aug 22, 2001 at 12:37:50PM -0400, Mike McGuire wrote:
> Yeah, that's it, I guess. Maybe they got it right the first time. :)
> One minor problem (too minor to bother fixing, apparently) is that
> the kernel makefile changed slightly somewhere between 2.4.3 and now.
> So the patch fails on
On Wed, Aug 22, 2001 at 10:13:02AM +, Iain Smith wrote:
>
> Anyone happen to know the current state of the crypto patches? I haven't seen
> a new patch for 2.4 since april... for 2.4.3!
Yeah, that's it, I guess. Maybe they got it right the first time. :)
One minor problem (too minor to bother
On Wed, Aug 22, 2001 at 01:39:41AM -0400, Mike McGuire wrote:
> > I remember seeing a project recently which was a kernel module which
> > allowed you to have encrypted loopback devices with patching the kernel
> > of using the international kernel patch.
>
> Not sure if this is it, but I've been
On Wed, Aug 22, 2001 at 02:05:41PM +1000, Damon Muller wrote:
> Quoth Rog?rio Brito,
> > I'm also interested in encrypted filesystems and I think that
> > the only way to go (reasonable one, that is) is to use the
> > international kernel patch
Quoth Rog?rio Brito,
> I'm also interested in encrypted filesystems and I think that
> the only way to go (reasonable one, that is) is to use the
> international kernel patch available at
> http://www.kerneli.org/.
I remember seeing a project recently w
interested in encrypted filesystems and I think that
the only way to go (reasonable one, that is) is to use the
international kernel patch available at
http://www.kerneli.org/.
I'm so interested in those things that I'm considering myself
maki
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hello all,
Does anyone know of any GOOD encrypted file systems for debian? I need
something that creates a virtual drive that can be mounted under a loopback
(possibly?) that has a GOOD algorithm behind it.
Thanks.
Stephen.
-BEGIN PGP SIGNATUR
37 matches
Mail list logo