Hello All loop-aes Users,
Up to now, every time a new version of util-linux was out, we had to
wait for loop-aes patch in order to use it within loop-aes
environment.
The dependency between loop-aes and util-linux was hard to maintain
for both base-system, crypto and users.
Basically, all we
On Sun, 10 May 2009 05:35:32 +0200
meino.cra...@gmx.de wrote:
loop-aes and aespipe are part of the gentoo-portage.
Is ciphers, which is also offered via loop-aes.sourceforge.net
also part of portage? I dont find it...
Or any other way to choose different cipher-algorithms to
be used with
Mike Kazantsev mike_kazant...@fraggod.net [09-05-10 08:30]:
On Sun, 10 May 2009 05:35:32 +0200
meino.cra...@gmx.de wrote:
loop-aes and aespipe are part of the gentoo-portage.
Is ciphers, which is also offered via loop-aes.sourceforge.net
also part of portage? I dont find it...
Or any
Hi,
loop-aes and aespipe are part of the gentoo-portage.
Is ciphers, which is also offered via loop-aes.sourceforge.net
also part of portage? I dont find it...
Or any other way to choose different cipher-algorithms to
be used with loop-aes?
Thank you very much for any help in advance!
Have a
Am Mittwoch, 25. Juni 2008 schrieb ext Chris Walters:
Also, someone said that it was possible to encrypt using multiple
passphrases using dm-crypt.
That was me. To be correct: I wrote that with LUKS (which is based on
dm-crypt) it is possible to use multiple keys (a key may be a passphrase or
On Tue, 24 Jun 2008 22:20:20 -0400
Chris Walters [EMAIL PROTECTED] wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Thanks to all who replied to my previous question. This question is
related. Has anyone gotten the 'extra-ciphers' (you can get them from
the loop-aes site) to compile
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Daniel Iliev wrote:
| On Tue, 24 Jun 2008 22:20:20 -0400
| Chris Walters [EMAIL PROTECTED] wrote:
[snip]
| Perhaps they appear as kernel modules? I'm just guessing.
I think that is how they are supposed to appear, but I can't seem to get them
to
Am Mittwoch, 25. Juni 2008 schrieb Chris Walters:
| Rumor has it that the three-letter agencies (CIA, KGB, M.A.V.O. [2],
| etc) can break those algorithms relatively easy. On the other hand even
| weaker algorithms can protect your data against laptop thieves.
That's more than a rumor.
Am Montag, 23. Juni 2008 schrieb Chris Walters:
I might try LUKS. Does it have support for multi-key encryption? How
about random key encryption?
Hmm, didn't I mention this? Yes to both. See also http://luks.endorphin.org.
Bye...
Dirk
signature.asc
Description: This is a
Chris Walters [EMAIL PROTECTED] at Wednesday 25 June 2008, 17:14:20
| Rumor has it that the three-letter agencies (CIA, KGB, M.A.V.O. [2],
| etc) can break those algorithms relatively easy. On the other hand even
| weaker algorithms can protect your data against laptop thieves.
You had better
On Wednesday 25 June 2008, Dirk Heinrichs wrote:
If it is so easy for them to crack our ciphers (and the one they use
themselves, btw.), why doesn't Kasperky ask them to crack the key of
the GPCode virus which, according to Kaspersky's assumptions, would
keep 15 million modern PCs busy for a
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Sebastian Wiesner wrote:
| Chris Walters [EMAIL PROTECTED] at Wednesday 25 June 2008, 17:14:20
|
| | Rumor has it that the three-letter agencies (CIA, KGB, M.A.V.O. [2],
| | etc) can break those algorithms relatively easy. On the other hand even
|
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Dirk Heinrichs wrote:
| If it is so easy for them to crack our ciphers (and the one they use
| themselves, btw.), why doesn't Kasperky ask them to crack the key of the
| GPCode virus which, according to Kaspersky's assumptions, would keep 15
|
On Wednesday 25 June 2008, Chris Walters wrote:
Dirk Heinrichs wrote:
| If it is so easy for them to crack our ciphers (and the one they
| use themselves, btw.), why doesn't Kasperky ask them to crack the
| key of the GPCode virus which, according to Kaspersky's
| assumptions, would keep 15
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Alan McKinnon wrote:
| On Wednesday 25 June 2008, Chris Walters wrote:
| Dirk Heinrichs wrote:
| | If it is so easy for them to crack our ciphers (and the one they
| | use themselves, btw.), why doesn't Kasperky ask them to crack the
| | key of the
Chris Walters [EMAIL PROTECTED] at Wednesday 25 June 2008, 22:25:18
Are you a cryptology expert?
Are you then?
The only thing that cryptography attempts to do is reduce the
**probability** of cracking the key and gaining access to the data as low
as possible.
No news. That's, why
On Wednesday 25 June 2008, Chris Walters wrote:
| This is the point where I start to ask for a citation and stop
| listening to theoretical possibilities and things that might
| possibly could be. Unless of course the exact meaning of phrases
| like three hundred thousand million years has a
Alan McKinnon wrote:
Or
perhaps you doubt that they can crack any keys at all...
Don't get smart with me, jackass.
Fuck off, shitehead. Call me a jackass, when I simply state facts you admitted
to? You're a fucking idiot. Welcome to my ignore list.
--
gentoo-user@lists.gentoo.org
On Wed, Jun 25, 2008 at 9:24 PM, Sebastian Wiesner [EMAIL PROTECTED]
wrote:
Chris Walters [EMAIL PROTECTED] at Wednesday 25 June 2008, 22:25:18
Are you a cryptology expert?
Are you then?
I doubt that either of you are cryptology experts. I've known a few, and I
am a crypto-expert, who
On Wed, Jun 25, 2008 at 9:51 PM, Chris Walters [EMAIL PROTECTED] wrote:
Alan McKinnon wrote:
Or perhaps you doubt that they can crack any keys at all...
Don't get smart with me, jackass.
Fuck off, shitehead. Call me a jackass, when I simply state facts you
admitted to? You're a
Jason Rivard [EMAIL PROTECTED] at Wednesday 25 June 2008, 23:53:23
The only thing that cryptography attempts to do is reduce the
**probability** of cracking the key and gaining access to the data as
low as possible.
No news. That's, why cryptology defines security not as being
On Wednesday 25 June 2008, Jason Rivard wrote:
Wait for my private mail, Mr. Walters.
I wouldn't bother with a private mail Jason. Tomorrow Chris will calm
down, take a deep breath and probably contribute to the list again. It
pretty much always works that way.
Maybe he's quick to anger.
On Wed, 25 Jun 2008 18:40:08 -0400
Chris Walters [EMAIL PROTECTED] wrote:
My original question was: Does anyone know how to compile the
extra-ciphers package that you can find on the loop-aes SourceForge
site.
The following works here:
1) ebuild `equery w loop-aes` unpack
2) cd
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Daniel Iliev wrote:
| On Wed, 25 Jun 2008 18:40:08 -0400
| Chris Walters [EMAIL PROTECTED] wrote:
|
|
| My original question was: Does anyone know how to compile the
| extra-ciphers package that you can find on the loop-aes SourceForge
| site.
|
|
On Wed, 25 Jun 2008 22:30:25 -0400
Chris Walters [EMAIL PROTECTED] wrote:
| The following works here:
|
| 1) ebuild `equery w loop-aes` unpack
|
| 2) cd $PORTDIR/sys-fs/loop-aes-version/work/loop-AES-version/
|
| 3) make EXTRA_CIPHERS=y
|
| 4) cd ../../
|
| 5) touch .compiled
|
| 6)
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Thanks to all who replied to my previous question. This question is related.
Has anyone gotten the 'extra-ciphers' (you can get them from the loop-aes site)
to compile with the loop-aes kernel patch in place? If so, could you give me a
hint on
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Sorry if this subject has been hashed and rehashed again, but I was wondering
which Gentoo partition encryption scheme is considered the best, in terms of:
1. Security
2. Ease of setup and use
3. Number and type of ciphers available
This question
On (23/06/08 06:26) Chris Walters wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Sorry if this subject has been hashed and rehashed again, but I was
wondering
which Gentoo partition encryption scheme is considered the best, in terms
of:
1. Security
2. Ease of setup and use
3.
Am Montag, 23. Juni 2008 schrieb ext Chris Walters:
Sorry if this subject has been hashed and rehashed again, but I was
wondering which Gentoo partition encryption scheme is considered the
best, in terms of:
1. Security
Don't know, I'm not a crypto expert.
2. Ease of setup and use
Chris Walters [EMAIL PROTECTED] at Monday 23 June 2008, 17:46:23
Dirk Heinrichs wrote:
| Am Montag, 23. Juni 2008 schrieb ext Chris Walters:
[snip]
| 3. Number and type of ciphers available
|
| Maybe I'm wrong, but the name loop-aes tells this, right? With LUKS,
| one can use (nearly?)
30 matches
Mail list logo