Bug#350922: [Pkg-cryptsetup-devel] Bug#350922: not existant

2006-02-02 Thread gebi
Quoting Jonas Meurer <[EMAIL PROTECTED]>: if you encrypt a luks parition with a key, postchecks can be useful. if you use a password, it is just like you said, it fails if the password is wrong. but if you use a key, it doesn't fail if the key is wrong, does it? otherwise keys like /dev/(u)rando

Bug#350922: [Pkg-cryptsetup-devel] Bug#350922: not existant

2006-02-02 Thread gebi
Quoting Jonas Meurer <[EMAIL PROTECTED]>: sure, there is. prechecks are run against the source device, _before_ cryptsetup is started. postchecks are run against the target device, _after_ cryptsetup is started. Yes, but what should the script look like? Imho there are 3 different branches (sw

Bug#350615: [Pkg-cryptsetup-devel] Bug#350615: Add support for encrypted ssl-keys

2006-02-02 Thread gebi
Quoting Jonas Meurer <[EMAIL PROTECTED]>: i believe that the patch is rather ugly. it depends on openssl, and therefore on a mounted /usr filesystem. what to do when /usr is an encrypted filesystem? Yes, not really integrateable for generic usage. gebi, what do you think about it?

Bug#350922: [Pkg-cryptsetup-devel] Bug#350922: not existant

2006-02-02 Thread gebi
Quoting Jonas Meurer <[EMAIL PROTECTED]>: there simply is no prechecks/swap script available. the cryptsetup sources provide a rough idea of one, but it's far from good. though, a postchecks/swap script exists. That broughts to the question, what's the difference between pre and postchecks?