[gentoo-user] Bittorrent tracker available with gentoo miniinstall ISOs

2012-09-03 Thread Roland Häder
Hello, I have added (more may follow) both ISOs of the AMD64 and I386 mini-installer as torrents to my tracker: http://mxchange.org:23456/ AMD64: http://mxchange.org:23456/file?info_hash=%C5%C4%B2%88%92%F5%A9O%01udg%92%17gy%22%9A%ED%B7 I386:

[gentoo-user] Re: errors with mplayer and mp3 files

2012-09-03 Thread Nikos Chantziaras
On 02/09/12 18:39, cov...@ccs.covici.com wrote: Nikos Chantziaras rea...@gmail.com wrote: The solution is simple. Use mad -mp3 as USE flags for mplayer. I just did the same and mplayer now only uses libmad to play MP3s. [...] Thanks much -- it seems to be working now. I had never heard

Re: [gentoo-user] Bittorrent tracker available with gentoo miniinstall ISOs

2012-09-03 Thread Oli Schmidt
Good idea - remind me on getting the latest iso's. Thanks a lot Oli On 2012-09-03 17:53, Roland Häder wrote: Hello, I have added (more may follow) both ISOs of the AMD64 and I386 mini-installer as torrents to my tracker: http://mxchange.org:23456/ AMD64:

[gentoo-user] dm-crypt + ext4 = where will the journal go?

2012-09-03 Thread Roland Häder
Hi all, I'm currently testing dm-crypt to encrypt my whole hard drive. So far I followed this [1] guide and have to wait for the randomization part of the hard drive. In the wiki, ext4 is being used. Since ext3 a journal has been added. From my times with loop-aes I know that I have to store

Aw: [gentoo-user] dm-crypt + ext4 = where will the journal go?

2012-09-03 Thread Roland Häder
Opps, here is the missing link: http://wiki.gentoo.org/wiki/DM-Crypt (I don't think it is a good idea to store the keyFile somewhere plain, [2] tells that there is support for crypt-gnupg, but it doesn't show any help how to setup it. [2]: http://wiki.gentoo.org/wiki/Dracut

Re: [gentoo-user] dm-crypt + ext4 = where will the journal go?

2012-09-03 Thread Florian Philipp
Am 03.09.2012 22:20, schrieb Roland Häder: Hi all, I'm currently testing dm-crypt to encrypt my whole hard drive. So far I followed this [1] guide and have to wait for the randomization part of the hard drive. You forgot the link to [1]. In the wiki, ext4 is being used. Since ext3 a

Re: [gentoo-user] dm-crypt + ext4 = where will the journal go?

2012-09-03 Thread Steve Buzonas
The journal is generally located on the partition in question. If the partition is encrypted the journal should also be encrypted. You can use `tune2fs -l` to list the contents of the partition's superblock which will have details on the partition such as journal location, etc... On Mon, Sep 3,

Aw: Re: [gentoo-user] dm-crypt + ext4 = where will the journal go?

2012-09-03 Thread Roland Häder
You forgot the link to [1]. Already mailed but here again: http://wiki.gentoo.org/wiki/DM-Crypt Never used loop-aes myself. Sorry if I miss the reason for your confusion because of it. http://loop-aes.sourceforge.net There is the source code. It needs patched util-linux(-ng) package to get

Re: [gentoo-user] dm-crypt + ext4 = where will the journal go?

2012-09-03 Thread Florian Philipp
Am 03.09.2012 22:36, schrieb Roland Häder: Opps, here is the missing link: http://wiki.gentoo.org/wiki/DM-Crypt (I don't think it is a good idea to store the keyFile somewhere plain, [2] tells that there is support for crypt-gnupg, but it doesn't show any help how to setup it. [2]:

Aw: Re: [gentoo-user] dm-crypt + ext4 = where will the journal go?

2012-09-03 Thread Roland Häder
No comment on dracut as I have no experience with it. Okay, so I have to try it out myself. When I found something out, I expand the wiki with it. However, as I see it, you need no key file if you just use a pass phrase. In my opinion, a key file is only necessary for two improvements:

Aw: Re: [gentoo-user] dm-crypt + ext4 = where will the journal go?

2012-09-03 Thread Roland Häder
Okay, I have made a little progress. I have generated my private key using some random data + gpg: # head -c 3705 /dev/urandom | head -n 66 | tail -n 65 key.out # gpg --symmetric -a --s2k-count 8388608 key.out Enter your password twice # mv key.out.asc key.gpg # rm -f key.out Now I have to