Try `emerge -pvT $foo`. With whatever package $foo you are trying to
install.
That is already solved (I had selected it somehow) by simply deselecting it.
But is now a little OT. I now try to compile x11-libs/libxcb, and
dev-python/elementtree is not installed on my system.
Regards,
That is already solved (I had selected it somehow) by simply deselecting it.
But is now a little OT. I now try to compile x11-libs/libxcb, and
dev-python/elementtree is not installed on my system.
There is hope for this matter, see my forum posting:
To add my 2:All you need is build initram and pass it as a argument to pre configured kernel (with needed encryption and hash algorithms built in)
Initram scripts are on github here https://github.com/tokiclover/mkinitramfs-ll Can I also use dracut? Or wont it setup initrd? I I didnt setup LVM
I think I made a (tollerateable) mistake:
My hard drive has two partitions:
- sda1 - encrypted swap
- sda2 - encrypted root
How should it boot? One way could be by external media (e.g. stick), other is
from hard drive. But that is encrypted. So I must leave a small area left for
kernel,
Roland Häder wrote:
- sda2 - encrypted swap (at least as double as your RAM) (crypt-swap)
Regards,
Roland
[1]: http://wiki.gentoo.org/wiki/DM-Crypt
I don't think this is true anymore. It was back when machines had small
amounts of ram. Case in point, I have 16Gbs of ram. If I have a
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 04.09.2012 15:48, Roland Häder wrote:
I think I made a (tollerateable) mistake:
My hard drive has two partitions: - sda1 - encrypted swap - sda2 -
encrypted root
How should it boot? One way could be by external media (e.g.
stick), other is
In theory grub2 is able to open a luks-encrypted volume though it
seems to have some disadvantages: you'll need to enter the passphrase
(or pass the keyfile) two times, because grub itself needs to decrypt
the volume to get the later stages from the encrypted volume and
afterwards the
1. Maybe it would be a good idea to use an ASCII-only random string, for
example by piping it through `base64 -w 0`. That way you don't loose any
entropy (the key just gets longer) but it is easier to type the keyfile
manually, in case you ever need to. You also don't have to worry about
odd
Okay, I have setup so far this:
/dev/sda1 - /boot (unencrypted)
/dev/sda2 - swap (not yet setup, will be encrypted)
/dev/sda3 - / (encrypted)
/dev/sda3 is the underlaying drive, where I used gpg:
# gpg --decrypt key.gpg | cryptsetup --verbose luksFormat /dev/sda3
# gpg --decrypt key.gpg |
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 04.09.2012 20:48, Michael Hampicke wrote:
In theory grub2 is able to open a luks-encrypted volume though
it seems to have some disadvantages: you'll need to enter the
passphrase (or pass the keyfile) two times, because grub itself
needs to
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On 04.09.2012 22:05, Roland Häder wrote:
Okay, I have setup so far this:
/dev/sda1 - /boot (unencrypted) /dev/sda2 - swap (not yet setup,
will be encrypted) /dev/sda3 - / (encrypted)
/dev/sda3 is the underlaying drive, where I used gpg:
#
You forgot the link to [1].
Already mailed but here again:
http://wiki.gentoo.org/wiki/DM-Crypt
Never used loop-aes myself. Sorry if I miss the reason for your
confusion because of it.
http://loop-aes.sourceforge.net
There is the source code. It needs patched util-linux(-ng) package to get
No comment on dracut as I have no experience with it.
Okay, so I have to try it out myself. When I found something out, I expand the
wiki with it.
However, as I see it, you need no key file if you just use a pass
phrase. In my opinion, a key file is only necessary for two improvements:
Okay, I have made a little progress. I have generated my private key using some
random data + gpg:
# head -c 3705 /dev/urandom | head -n 66 | tail -n 65 key.out
# gpg --symmetric -a --s2k-count 8388608 key.out
Enter your password twice
# mv key.out.asc key.gpg
# rm -f key.out
Now I have to
14 matches
Mail list logo