Re: Discussion about backup passwords for LUKS encrypted filesystems before revising wiki

2020-12-24 Thread David Christensen
On 2020-12-24 10:06, rhkra...@gmail.com wrote: On Tuesday, December 22, 2020 07:20:39 PM David Christensen wrote: Thank you for offering to improve Debian documentation. :-) You're welcome, but I wasn't making a general offer to improve documentation, just to fix something that I thought was

Re: Discussion about backup passwords for LUKS encrypted filesystems before revising wiki

2020-12-24 Thread rhkramer
Note: Initially sent to David off list, he asked me to reply to the list. David, Thanks for your response! I'm replying privately intentionally for various reasons -- I may summarize some of this on list at some point. On Tuesday, December 22, 2020 07:20:39 PM David Christensen wrote: > Thank

Re: Discussion about backup passwords for LUKS encrypted filesystems before revising wiki

2020-12-23 Thread Andrei POPESCU
On Ma, 22 dec 20, 12:11:19, rhkra...@gmail.com wrote: > >* or if: "you simply forget your password" -- it seems unlikely that > you'll > forget the "normal" password (the one you most often use) but remember a > backup password (although maybe you'd use something really easy to remember >

Re: Discussion about backup passwords for LUKS encrypted filesystems before revising wiki

2020-12-22 Thread David Christensen
On 2020-12-22 09:11, rhkra...@gmail.com wrote: See the quoted paragraph, below, quoted from the [[https://wiki.debian.org/LVM#Encrypted_LVM][LVM#Encrypted_LVM]] wiki. It seems to me that the idea of creating and saving backup passwords is something of a red herring (to borrow a "Briticism"). Th

Re: Discussion about backup passwords for LUKS encrypted filesystems before revising wiki

2020-12-22 Thread rhkramer
Roberto, Thanks for the reply! Good points, both of them. I might (or might not) add your use case (the multiple user case) to the wiki as it sounds like a more plausible need. On Tuesday, December 22, 2020 12:34:12 PM Roberto C. Sánchez wrote: > On Tue, Dec 22, 2020 at 12:11:19PM -0500, rhkra

Re: Discussion about backup passwords for LUKS encrypted filesystems before revising wiki

2020-12-22 Thread Roberto C . Sánchez
On Tue, Dec 22, 2020 at 12:11:19PM -0500, rhkra...@gmail.com wrote: > > My point is this: I think creating and saving backup passwords is of minimal > value. Maybe to you as a single user. However, I have worked in places where resources are protected by multiple passwords. For instance ther

Discussion about backup passwords for LUKS encrypted filesystems before revising wiki

2020-12-22 Thread rhkramer
See the quoted paragraph, below, quoted from the [[https://wiki.debian.org/LVM#Encrypted_LVM][LVM#Encrypted_LVM]] wiki. It seems to me that the idea of creating and saving backup passwords is something of a red herring (to borrow a "Briticism"). The way I see it: * if, in the future: "som

Problem: suspend-to-disk + encrypted filesystems

2017-02-05 Thread Hans
, then directly showed the window manager again. So, I guess, something essentiell has happened to the suspend code. I read, that there are problems with encrypted filesystems. And all solutions I found, were by using an encrypted swap partition. Please allow me some questions for the understanding

How to set up services depending on encrypted filesystems with systemd (was Re: How to do this ?)

2014-10-15 Thread Jonathan de Boyne Pollard
Jonathan Dowland: > Next step, adjust the daemon to depend on this. In my example, > transmission-daemon supplies a .service file in the package. Copy this to > /etc/systemd/system, and add a line (the line prefixed +): > > > [Unit] > > Description=Transmission BitTorrent Daemon > > After=networ

How to set up services depending on encrypted filesystems with systemd (was Re: How to do this ?)

2014-10-13 Thread Jonathan Dowland
Hi Erwan, Firstly I've changed the subject for this thread because the original was not terribly descriptive. On Mon, Oct 13, 2014 at 07:57:00AM +0100, Jonathan Dowland wrote: > On Sun, Oct 12, 2014 at 09:40:44PM +0200, Erwan David wrote: > > And how to do this is a big problem. There are many ma

Re: pmount-hal not using labels on encrypted filesystems

2012-12-14 Thread Aidan Gauland
Michael Biebl writes: > udisks-daemon does handle luks/cryptsetup encrypted partitions but it > seems the udisks command line tool is too limited. > > Try "gvfs-mount -d /dev/foo". This should prompt you for the passphrase, > unlock and mount the file system under /media/FS_LABEL > > Can be unmoun

Re: pmount-hal not using labels on encrypted filesystems

2012-12-14 Thread Michael Biebl
On 14.12.2012 17:12, Michael Biebl wrote: > Try "gvfs-mount -d /dev/foo". This should prompt you for the passphrase, > unlock and mount the file system under /media/FS_LABEL Just in case: If you run that command from a session which has no running dbus session bus, change that command to: "dbus-l

Re: pmount-hal not using labels on encrypted filesystems

2012-12-14 Thread Michael Biebl
On 14.12.2012 10:00, Aidan Gauland wrote: > Michael Biebl writes: >> On 14.12.2012 05:06, Aidan Gauland wrote: >>> How can I fix this? Given that HAL is deprecated, I suspect there is >>> some other tool that serves the same purpose as pmount-hal that I should >>> be using instead. >> >> yeah, ha

Re: pmount-hal not using labels on encrypted filesystems

2012-12-14 Thread Aidan Gauland
Michael Biebl writes: > On 14.12.2012 05:06, Aidan Gauland wrote: >> How can I fix this? Given that HAL is deprecated, I suspect there is >> some other tool that serves the same purpose as pmount-hal that I should >> be using instead. > > yeah, hal is dead. > You might try "udisks --mount" instea

Re: pmount-hal not using labels on encrypted filesystems

2012-12-13 Thread Michael Biebl
On 14.12.2012 05:06, Aidan Gauland wrote: > How can I fix this? Given that HAL is deprecated, I suspect there is > some other tool that serves the same purpose as pmount-hal that I should > be using instead. yeah, hal is dead. You might try "udisks --mount" instead. -- Why is it that all of t

pmount-hal not using labels on encrypted filesystems

2012-12-13 Thread Aidan Gauland
When I mount a filesystem on an encrypted partition with pmount-hal, it just mounts it on /media/usbdisk instead of using the filesystem's label to name the mount point, as it does with unencrypted filesystems. For example, $ pmount-hal /dev/sdb1 Enter passphrase for /dev/sdb1: /dev/mapper/_dev_

Re: Trouble with encrypted filesystems

2007-02-07 Thread Florian Kulzer
On Wed, Feb 07, 2007 at 11:22:48 +0100, Dan H. wrote: > Florian Kulzer wrote: > > > The main advantage of pmount is that it allows all members of the > > "plugdev" group to mount pluggable devices. This eliminates the need to > > add entries for pluggable devices to /etc/fstab. Since I use pmount

Grrr! (was: Trouble with encrypted filesystems)

2007-02-07 Thread Dan H.
Sorry for posting the same message over and over again. Thunderbird alias Icedove keeps complaining about not being able to send to the SMTP server, and I keep changing things trying to help, and of course keep re-sending the message after making those changes. Apparently icedove keeps some secret

Re: Trouble with encrypted filesystems

2007-02-07 Thread Dan H.
Florian Kulzer wrote: > The main advantage of pmount is that it allows all members of the > "plugdev" group to mount pluggable devices. This eliminates the need to > add entries for pluggable devices to /etc/fstab. Since I use pmount > anyway I like the fact that it automatically recognizes LUKS p

Re: Trouble with encrypted filesystems

2007-02-07 Thread Dan H.
Florian Kulzer wrote: > The main advantage of pmount is that it allows all members of the > "plugdev" group to mount pluggable devices. This eliminates the need to > add entries for pluggable devices to /etc/fstab. Since I use pmount > anyway I like the fact that it automatically recognizes LUKS p

Re: Trouble with encrypted filesystems

2007-02-07 Thread Dan H.
Florian Kulzer wrote: > The main advantage of pmount is that it allows all members of the > "plugdev" group to mount pluggable devices. This eliminates the need to > add entries for pluggable devices to /etc/fstab. Since I use pmount > anyway I like the fact that it automatically recognizes LUKS p

Re: Trouble with encrypted filesystems

2007-02-07 Thread Dan H.
Florian Kulzer wrote: > The main advantage of pmount is that it allows all members of the > "plugdev" group to mount pluggable devices. This eliminates the need to > add entries for pluggable devices to /etc/fstab. Since I use pmount > anyway I like the fact that it automatically recognizes LUKS p

Re: Trouble with encrypted filesystems

2007-02-07 Thread Dan H.
Florian Kulzer wrote: > The main advantage of pmount is that it allows all members of the > "plugdev" group to mount pluggable devices. This eliminates the need to > add entries for pluggable devices to /etc/fstab. Since I use pmount > anyway I like the fact that it automatically recognizes LUKS p

Re: Trouble with encrypted filesystems

2007-02-06 Thread Florian Kulzer
On Tue, Feb 06, 2007 at 09:23:57 +0100, Dan H. wrote: > Florian Kulzer wrote: > > > With your kernel version and udev, hal, dbus + pmount it should be > > possible to just plug in the drive, wait a few seconds until udev > > creates the device node and mount it normally with pmount (it will ask >

Re: Trouble with encrypted filesystems

2007-02-06 Thread Douglas Allan Tutty
On Mon, Feb 05, 2007 at 10:31:19AM +0100, Dan H. wrote: > Moreover I noticed that just having an encrypted partition mounted > --local or via USB-- will kill the system after a few minutes. > > Sheesh, this is starting to get on my nerves. This machine, by the way, > has been running sarge for a

Re: Trouble with encrypted filesystems

2007-02-06 Thread Dan H.
Florian Kulzer wrote: > With your kernel version and udev, hal, dbus + pmount it should be > possible to just plug in the drive, wait a few seconds until udev > creates the device node and mount it normally with pmount (it will ask > for the passphrase). This requires that you use LUKS and device

Re: Trouble with encrypted filesystems

2007-02-05 Thread Florian Kulzer
On Mon, Feb 05, 2007 at 10:31:19 +0100, Dan H. wrote: > Hello, it's me again: > > After "solving" my troubles with transferring data between different > storage devices (see the recent thread "System freeze when copying > files" on this list, archived at > http://lists.debian.org/debian-user/2007/

Trouble with encrypted filesystems

2007-02-05 Thread Dan H.
Hello, it's me again: After "solving" my troubles with transferring data between different storage devices (see the recent thread "System freeze when copying files" on this list, archived at http://lists.debian.org/debian-user/2007/02/msg00129.html) by using the linux-image-2.6.18-486 kernel inste

Re: encrypted filesystems with debian packages?

2002-12-24 Thread Matthias Hentges
Am Die, 2002-12-24 um 11.42 schrieb Jörg Johannes: > Hello everybody > > I just started to read the Linux Encryption HOWTO on > http://www.linuxsecurity.com/docs/HOWTO/Encryption-HOWTO/Encryption-HOWTO.html > and I wonder if I can use encryped filesystems with my sid installation. > However, I di

encrypted filesystems with debian packages?

2002-12-24 Thread Jörg Johannes
Hello everybody I just started to read the Linux Encryption HOWTO on http://www.linuxsecurity.com/docs/HOWTO/Encryption-HOWTO/Encryption-HOWTO.html and I wonder if I can use encryped filesystems with my sid installation. However, I did not find the crypto-patched mount program on the debian pack

Re: Encrypted Filesystems

2001-08-23 Thread Iain Smith
On Wed, Aug 22, 2001 at 12:37:50PM -0400, Mike McGuire wrote: > Yeah, that's it, I guess. Maybe they got it right the first time. :) > One minor problem (too minor to bother fixing, apparently) is that > the kernel makefile changed slightly somewhere between 2.4.3 and now. > So the patch fails on

Re: Encrypted Filesystems

2001-08-22 Thread Mike McGuire
On Wed, Aug 22, 2001 at 10:13:02AM +, Iain Smith wrote: > > Anyone happen to know the current state of the crypto patches? I haven't seen > a new patch for 2.4 since april... for 2.4.3! Yeah, that's it, I guess. Maybe they got it right the first time. :) One minor problem (too minor to bother

Re: Encrypted Filesystems

2001-08-22 Thread Iain Smith
On Wed, Aug 22, 2001 at 01:39:41AM -0400, Mike McGuire wrote: > > I remember seeing a project recently which was a kernel module which > > allowed you to have encrypted loopback devices with patching the kernel > > of using the international kernel patch. > > Not sure if this is it, but I've been

Re: Encrypted Filesystems

2001-08-22 Thread Mike McGuire
On Wed, Aug 22, 2001 at 02:05:41PM +1000, Damon Muller wrote: > Quoth Rog?rio Brito, > > I'm also interested in encrypted filesystems and I think that > > the only way to go (reasonable one, that is) is to use the > > international kernel patch

Re: Encrypted Filesystems

2001-08-21 Thread Damon Muller
Quoth Rog?rio Brito, > I'm also interested in encrypted filesystems and I think that > the only way to go (reasonable one, that is) is to use the > international kernel patch available at > http://www.kerneli.org/. I remember seeing a project recently w

Re: Encrypted Filesystems

2001-08-21 Thread Rogério Brito
interested in encrypted filesystems and I think that the only way to go (reasonable one, that is) is to use the international kernel patch available at http://www.kerneli.org/. I'm so interested in those things that I'm considering myself maki

Encrypted Filesystems

2001-08-21 Thread Stephen J . Thompson
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hello all, Does anyone know of any GOOD encrypted file systems for debian? I need something that creates a virtual drive that can be mounted under a loopback (possibly?) that has a GOOD algorithm behind it. Thanks. Stephen. -BEGIN PGP SIGNATUR