Aw: Re: [gentoo-user] dm-crypt + ext4 = where will the journal go?

2012-09-06 Thread Roland Häder
Try `emerge -pvT $foo`. With whatever package $foo you are trying to install. That is already solved (I had selected it somehow) by simply deselecting it. But is now a little OT. I now try to compile x11-libs/libxcb, and dev-python/elementtree is not installed on my system. Regards,

Aw: Re: [gentoo-user] dm-crypt + ext4 = where will the journal go?

2012-09-06 Thread Roland Häder
That is already solved (I had selected it somehow) by simply deselecting it. But is now a little OT. I now try to compile x11-libs/libxcb, and dev-python/elementtree is not installed on my system. There is hope for this matter, see my forum posting:

Aw: Re: [gentoo-user] dm-crypt + ext4 = where will the journal go?

2012-09-05 Thread Roland Häder
To add my 2:All you need is build initram and pass it as a argument to pre configured kernel (with needed encryption and hash algorithms built in) Initram scripts are on github here https://github.com/tokiclover/mkinitramfs-ll Can I also use dracut? Or wont it setup initrd? I I didnt setup LVM

Aw: Re: [gentoo-user] dm-crypt + ext4 = where will the journal go?

2012-09-04 Thread Roland Häder
I think I made a (tollerateable) mistake: My hard drive has two partitions: - sda1 - encrypted swap - sda2 - encrypted root How should it boot? One way could be by external media (e.g. stick), other is from hard drive. But that is encrypted. So I must leave a small area left for kernel,

Re: Aw: Re: [gentoo-user] dm-crypt + ext4 = where will the journal go?

2012-09-04 Thread Dale
Roland Häder wrote: - sda2 - encrypted swap (at least as double as your RAM) (crypt-swap) Regards, Roland [1]: http://wiki.gentoo.org/wiki/DM-Crypt I don't think this is true anymore. It was back when machines had small amounts of ram. Case in point, I have 16Gbs of ram. If I have a

Re: Aw: Re: [gentoo-user] dm-crypt + ext4 = where will the journal go?

2012-09-04 Thread Hinnerk van Bruinehsen
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 04.09.2012 15:48, Roland Häder wrote: I think I made a (tollerateable) mistake: My hard drive has two partitions: - sda1 - encrypted swap - sda2 - encrypted root How should it boot? One way could be by external media (e.g. stick), other is

Re: Aw: Re: [gentoo-user] dm-crypt + ext4 = where will the journal go?

2012-09-04 Thread Michael Hampicke
In theory grub2 is able to open a luks-encrypted volume though it seems to have some disadvantages: you'll need to enter the passphrase (or pass the keyfile) two times, because grub itself needs to decrypt the volume to get the later stages from the encrypted volume and afterwards the

Aw: Re: [gentoo-user] dm-crypt + ext4 = where will the journal go?

2012-09-04 Thread Roland Häder
1. Maybe it would be a good idea to use an ASCII-only random string, for example by piping it through `base64 -w 0`. That way you don't loose any entropy (the key just gets longer) but it is easier to type the keyfile manually, in case you ever need to. You also don't have to worry about odd

Aw: Re: [gentoo-user] dm-crypt + ext4 = where will the journal go?

2012-09-04 Thread Roland Häder
Okay, I have setup so far this: /dev/sda1 - /boot (unencrypted) /dev/sda2 - swap (not yet setup, will be encrypted) /dev/sda3 - / (encrypted) /dev/sda3 is the underlaying drive, where I used gpg: # gpg --decrypt key.gpg | cryptsetup --verbose luksFormat /dev/sda3 # gpg --decrypt key.gpg |

Re: Aw: Re: [gentoo-user] dm-crypt + ext4 = where will the journal go?

2012-09-04 Thread Hinnerk van Bruinehsen
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 04.09.2012 20:48, Michael Hampicke wrote: In theory grub2 is able to open a luks-encrypted volume though it seems to have some disadvantages: you'll need to enter the passphrase (or pass the keyfile) two times, because grub itself needs to

Re: Aw: Re: [gentoo-user] dm-crypt + ext4 = where will the journal go?

2012-09-04 Thread Hinnerk van Bruinehsen
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 On 04.09.2012 22:05, Roland Häder wrote: Okay, I have setup so far this: /dev/sda1 - /boot (unencrypted) /dev/sda2 - swap (not yet setup, will be encrypted) /dev/sda3 - / (encrypted) /dev/sda3 is the underlaying drive, where I used gpg: #

Aw: Re: [gentoo-user] dm-crypt + ext4 = where will the journal go?

2012-09-03 Thread Roland Häder
You forgot the link to [1]. Already mailed but here again: http://wiki.gentoo.org/wiki/DM-Crypt Never used loop-aes myself. Sorry if I miss the reason for your confusion because of it. http://loop-aes.sourceforge.net There is the source code. It needs patched util-linux(-ng) package to get

Aw: Re: [gentoo-user] dm-crypt + ext4 = where will the journal go?

2012-09-03 Thread Roland Häder
No comment on dracut as I have no experience with it. Okay, so I have to try it out myself. When I found something out, I expand the wiki with it. However, as I see it, you need no key file if you just use a pass phrase. In my opinion, a key file is only necessary for two improvements:

Aw: Re: [gentoo-user] dm-crypt + ext4 = where will the journal go?

2012-09-03 Thread Roland Häder
Okay, I have made a little progress. I have generated my private key using some random data + gpg: # head -c 3705 /dev/urandom | head -n 66 | tail -n 65 key.out # gpg --symmetric -a --s2k-count 8388608 key.out Enter your password twice # mv key.out.asc key.gpg # rm -f key.out Now I have to