Quoting Jonas Meurer <[EMAIL PROTECTED]>:
if you encrypt a luks parition with a key, postchecks can be useful. if
you use a password, it is just like you said, it fails if the password
is wrong. but if you use a key, it doesn't fail if the key is wrong,
does it? otherwise keys like /dev/(u)rando
Quoting Jonas Meurer <[EMAIL PROTECTED]>:
sure, there is.
prechecks are run against the source device, _before_ cryptsetup is started.
postchecks are run against the target device, _after_ cryptsetup is started.
Yes, but what should the script look like?
Imho there are 3 different branches (sw
Quoting Jonas Meurer <[EMAIL PROTECTED]>:
i believe that the patch is rather ugly. it depends on openssl, and
therefore on a mounted /usr filesystem. what to do when /usr is an
encrypted filesystem?
Yes, not really integrateable for generic usage.
gebi, what do you think about it?
Quoting Jonas Meurer <[EMAIL PROTECTED]>:
there simply is no prechecks/swap script available. the cryptsetup
sources provide a rough idea of one, but it's far from good.
though, a postchecks/swap script exists.
That broughts to the question, what's the difference between pre and
postchecks?
4 matches
Mail list logo