-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

The Tuesday 2007-01-16 at 13:15 -0500, Dennis E. Slice wrote:

...

> For unencrypted drives, an entry with something like /dev/sda1 is
> entered into the fstab. For encrypted ones, a similar entry is made in
> /etc/cryptotab.

As I mentioned previously, you can also use fstab for encrypted 
partitions. For instance, one of mine:


/device_or_file   /mnt/crypto   xfs  
noauto,loop=/dev/loop4,encryption=twofish256    0 0


I doubt labels could be used here, but I assume dev-ids would - I never 
thought of that till reading this thread ;-)

> These encrypted drives don't automatically mount AFAIK, so I have a
> little script I run as su when I (re)boot the computer. Something like:

They would mount if available at boot time, if the service is enabled:

  nimrodel:~ # chkconfig boot.crypto
  boot.crypto  on

and the device is available at that time. It prompts for a password during 
boot up.

> script: usbmount...
> 
> umount /dev/sda1
> umount /dev/sdb1
> umount /dev/sdc1
> /etc/init.d/boot.crypto start
> mount /media/wd120


If you define them in fstab instead, a simple "mount /mnt/crypto" works. 
Easier typing ;-)


> One thing to note. My system had USB1.1, so I bought a cheap USB 2.0 PCI
> card. For unencrypted drives, that improved performance 20X, but only
> around 10X for encrypted volumes. That is, there is about a 50%
> performance hit due to running encryption, but it is not really
> noticable to me in use.

sync/nosunc?

- -- 
Cheers,
       Carlos E. R.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)
Comment: Made with pgp4pine 1.76

iD8DBQFFroDptTMYHG2NR9URAkA3AKCVl5CccVEXgyoBLbCC+MADXbNZKQCfZICI
TxKplK/JaPRkCQ2cuS972MU=
=MOwI
-----END PGP SIGNATURE-----

-- 
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to