This specification looks fine to me, thanks!

On Thu, Oct 9, 2014 at 4:45 PM, Abhilash B <[email protected]> wrote:

> Cryptsetup
>
>
> Description:
>
>
> Cryptsetup is a utility used to setup cryptographic volumes for
> dm-crypt, a disk encryption subsystem in the linux kernel. It can be
> used to encrypt partitions, loop devices and even entire systems.
>
> Both plain dm-crypt volumes and LUKS volumes can be created using
> cryptsetup. LUKS uses a metadata header and provides more
> functionality than plain dm-crypt, but it is more vulnerable to
> damage.
>
>
>
> Dependent Binaries:
>
>
> /sbin/cryptsetup
>
> /usr/sbin/cryptsetup
>
>
>
> Approach:
>
>
> 1.Using LUKS volume:
>
>
> Check whether the package cryptsetup is installed.
>
>
> To store the encrypted data,create a non-sparse empty file which will
> act as the storage device.
>
>
> Create a LUKS partition within the file mentioned above.Set the
> password needed to decrypt the data when asked.
>
>
> Check the file to ensure that it is LUKS encrypted.
>
>
> Open the LUKS container and give it a mapping name.Now the LUKS
> container is opened as a regular device.
>
>
> Format and create a filesystem on the device and mount it.
>
>
> Create a file on this device and fill it with random data. Find the
> MD5 hash of this file and store the hash in a temporary file.
>
>
> Unmount the filesystem and close the LUKS container to lock it.
>
>
> Reopen the container and mount it. Find the MD5 hash of the file
> inside (if still present). Compare it with the hash value stored
> earlier to verify the correct working of cryptsetup.
>
>
> 2.Using Plain dm-crypt volume:
>
>
> Create a non-sparse empty file.
>
>
> Assign the file as a block device using losetup.
>
>
> Create a plain dm-crypt volume on this block device using cryptsetup.
> Set password.
>
>
> Create a file system on this device using mkfs and mount it.
>
>
> Create a file on the device with some random data. Save the MD5 hash
> of this file in a separate temporary file. Unmount and remove the
> device to lock it. Open and mount it again and verify the hash of the
> file with value stored earlier.
>
>
>
>
> 3.Clean Up:
>
>
> Unmount the plain and LUKS volumes.
>
>
> Remove the non-sparse files and temporary files created.
>
>
>
> Regards,
> Abhilash B
> B Tech CSE Student
> Government Engineering College, Thrissur
>
> _______________________________________________
> Autotest-kernel mailing list
> [email protected]
> https://www.redhat.com/mailman/listinfo/autotest-kernel
>



-- 
Lucas
_______________________________________________
Autotest-kernel mailing list
[email protected]
https://www.redhat.com/mailman/listinfo/autotest-kernel

Reply via email to