Hello All loop-aes Users,
Up to now, every time a new version of util-linux was out, we had to
wait for loop-aes patch in order to use it within loop-aes
environment.
The dependency between loop-aes and util-linux was hard to maintain
for both base-system, crypto and users.
Basically, all we nee
Mike Kazantsev [09-05-10 08:30]:
> On Sun, 10 May 2009 05:35:32 +0200
> meino.cra...@gmx.de wrote:
>
> > loop-aes and aespipe are part of the gentoo-portage.
> > Is "ciphers", which is also offered via loop-aes.sourceforge.net
> > also part of portage? I dont find it...
> > Or any other way to ch
On Sun, 10 May 2009 05:35:32 +0200
meino.cra...@gmx.de wrote:
> loop-aes and aespipe are part of the gentoo-portage.
> Is "ciphers", which is also offered via loop-aes.sourceforge.net
> also part of portage? I dont find it...
> Or any other way to choose different cipher-algorithms to
> be used wi
Hi,
loop-aes and aespipe are part of the gentoo-portage.
Is "ciphers", which is also offered via loop-aes.sourceforge.net
also part of portage? I dont find it...
Or any other way to choose different cipher-algorithms to
be used with loop-aes?
Thank you very much for any help in advance!
Have a n
On Wed, 25 Jun 2008 22:30:25 -0400
Chris Walters <[EMAIL PROTECTED]> wrote:
> | The following works here:
> |
> | 1) ebuild `equery w loop-aes` unpack
> |
> | 2) cd $PORTDIR/sys-fs/loop-aes-/work/loop-AES-/
> |
> | 3) make EXTRA_CIPHERS=y
> |
> | 4) cd ../../
> |
> | 5) touch .compiled
> |
> | 6)
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Daniel Iliev wrote:
| On Wed, 25 Jun 2008 18:40:08 -0400
| Chris Walters <[EMAIL PROTECTED]> wrote:
|
|
|> My original question was: Does anyone know how to compile the
|> "extra-ciphers" package that you can find on the loop-aes SourceForge
|> sit
On Wed, 25 Jun 2008 18:40:08 -0400
Chris Walters <[EMAIL PROTECTED]> wrote:
> My original question was: Does anyone know how to compile the
> "extra-ciphers" package that you can find on the loop-aes SourceForge
> site.
The following works here:
1) ebuild `equery w loop-aes` unpack
2) cd $PO
On Wednesday 25 June 2008, Jason Rivard wrote:
> Wait for my private mail, Mr. Walters.
I wouldn't bother with a private mail Jason. Tomorrow Chris will calm
down, take a deep breath and probably contribute to the list again. It
pretty much always works that way.
Maybe he's quick to anger. Wel
"Jason Rivard" <[EMAIL PROTECTED]> at Wednesday 25 June 2008, 23:53:23
> > > The only thing that cryptography attempts to do is reduce the
> > > **probability** of cracking the key and gaining access to the data as
> > > low as possible.
> >
> > No news. That's, why cryptology defines "security" n
On Wed, Jun 25, 2008 at 9:51 PM, Chris Walters <[EMAIL PROTECTED]> wrote:
> Alan McKinnon wrote:
>
>> Or perhaps you doubt that they can crack any keys at all...
>>>
>>
>> Don't get smart with me, jackass.
>>
>
> Fuck off, shitehead. Call me a jackass, when I simply state facts you
> admitted to?
On Wed, Jun 25, 2008 at 9:24 PM, Sebastian Wiesner <[EMAIL PROTECTED]>
wrote:
> Chris Walters <[EMAIL PROTECTED]> at Wednesday 25 June 2008, 22:25:18
> > Are you a cryptology expert?
>
> Are you then?
I doubt that either of you are cryptology experts. I've known a few, and I
am a crypto-expert
Alan McKinnon wrote:
Or
perhaps you doubt that they can crack any keys at all...
Don't get smart with me, jackass.
Fuck off, shitehead. Call me a jackass, when I simply state facts you admitted
to? You're a fucking idiot. Welcome to my ignore list.
--
gentoo-user@lists.gentoo.org mailin
On Wednesday 25 June 2008, Chris Walters wrote:
> | This is the point where I start to ask for a citation and stop
> | listening to theoretical possibilities and things that might
> | possibly could be. Unless of course the exact meaning of phrases
> | like "three hundred thousand million years" ha
Chris Walters <[EMAIL PROTECTED]> at Wednesday 25 June 2008, 22:25:18
> Are you a cryptology expert?
Are you then?
> The only thing that cryptography attempts to do is reduce the
> **probability** of cracking the key and gaining access to the data as low
> as possible.
No news. That's, why
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Alan McKinnon wrote:
| On Wednesday 25 June 2008, Chris Walters wrote:
|> Dirk Heinrichs wrote:
|> | If it is so easy for them to crack our ciphers (and the one they
|> | use themselves, btw.), why doesn't Kasperky ask them to crack the
|> | key of
On Wednesday 25 June 2008, Chris Walters wrote:
> Dirk Heinrichs wrote:
> | If it is so easy for them to crack our ciphers (and the one they
> | use themselves, btw.), why doesn't Kasperky ask them to crack the
> | key of the GPCode virus which, according to Kaspersky's
> | assumptions, would keep
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Dirk Heinrichs wrote:
| If it is so easy for them to crack our ciphers (and the one they use
| themselves, btw.), why doesn't Kasperky ask them to crack the key of the
| GPCode virus which, according to Kaspersky's assumptions, would keep 15
| milli
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Sebastian Wiesner wrote:
| Chris Walters <[EMAIL PROTECTED]> at Wednesday 25 June 2008, 17:14:20
|
|> | Rumor has it that the three-letter agencies (CIA, KGB, M.A.V.O. [2],
|> | etc) can break those algorithms relatively easy. On the other hand even
On Wednesday 25 June 2008, Dirk Heinrichs wrote:
> If it is so easy for them to crack our ciphers (and the one they use
> themselves, btw.), why doesn't Kasperky ask them to crack the key of
> the GPCode virus which, according to Kaspersky's assumptions, would
> keep 15 million modern PCs busy for
Chris Walters <[EMAIL PROTECTED]> at Wednesday 25 June 2008, 17:14:20
> | Rumor has it that the three-letter agencies (CIA, KGB, M.A.V.O. [2],
> | etc) can break those algorithms relatively easy. On the other hand even
> | weaker algorithms can protect your data against laptop thieves.
You had be
Am Montag, 23. Juni 2008 schrieb Chris Walters:
> I might try LUKS. Does it have support for multi-key encryption? How
> about random key encryption?
Hmm, didn't I mention this? Yes to both. See also http://luks.endorphin.org.
Bye...
Dirk
signature.asc
Description: This is a digital
Am Mittwoch, 25. Juni 2008 schrieb Chris Walters:
> | Rumor has it that the three-letter agencies (CIA, KGB, M.A.V.O. [2],
> | etc) can break those algorithms relatively easy. On the other hand even
> | weaker algorithms can protect your data against laptop thieves.
>
> That's more than a rumor.
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Daniel Iliev wrote:
| On Tue, 24 Jun 2008 22:20:20 -0400
| Chris Walters <[EMAIL PROTECTED]> wrote:
[snip]
| Perhaps they appear as kernel modules? I'm just guessing.
I think that is how they are supposed to appear, but I can't seem to get them
to
On Tue, 24 Jun 2008 22:20:20 -0400
Chris Walters <[EMAIL PROTECTED]> wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> Thanks to all who replied to my previous question. This question is
> related. Has anyone gotten the 'extra-ciphers' (you can get them from
> the loop-aes site) to
Am Mittwoch, 25. Juni 2008 schrieb ext Chris Walters:
> Also, someone said that it was possible to encrypt using multiple
> passphrases using dm-crypt.
That was me. To be correct: I wrote that with LUKS (which is based on
dm-crypt) it is possible to use multiple keys (a key may be a passphrase o
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Thanks to all who replied to my previous question. This question is related.
Has anyone gotten the 'extra-ciphers' (you can get them from the loop-aes site)
to compile with the loop-aes kernel patch in place? If so, could you give me a
hint on how
Chris Walters <[EMAIL PROTECTED]> at Monday 23 June 2008, 17:46:23
> Dirk Heinrichs wrote:
> | Am Montag, 23. Juni 2008 schrieb ext Chris Walters:
>
> [snip]
>
> |> 3. Number and type of ciphers available
> |
> | Maybe I'm wrong, but the name loop-aes tells this, right? With LUKS,
> | one can use (
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Dirk Heinrichs wrote:
| Am Montag, 23. Juni 2008 schrieb ext Chris Walters:
[snip]
|> 3. Number and type of ciphers available
|
| Maybe I'm wrong, but the name loop-aes tells this, right? With LUKS, one can
| use (nearly?) any cipher/hash supported
Am Montag, 23. Juni 2008 schrieb ext Chris Walters:
> Sorry if this subject has been hashed and rehashed again, but I was
> wondering which Gentoo partition encryption scheme is considered the
> best, in terms of:
>
> 1. Security
Don't know, I'm not a crypto expert.
> 2. Ease of setup and use
dm
On (23/06/08 06:26) Chris Walters wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA512
>
> Sorry if this subject has been hashed and rehashed again, but I was
> wondering
> which Gentoo partition encryption scheme is considered the best, in terms
> of:
>
> 1. Security
> 2. Ease of setup and
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Sorry if this subject has been hashed and rehashed again, but I was wondering
which Gentoo partition encryption scheme is considered the best, in terms of:
1. Security
2. Ease of setup and use
3. Number and type of ciphers available
This question
31 matches
Mail list logo