1 (one) Epson Stylus 480 colour inkjet printer. About 5 years old, but extremely rarely used (hence getting rid of it in a spree of clearing out junk). Didn't work that well under Linux when I bought it, but I believe it's supported ok these days. Parallel port interface. Boxed. I even seem to have a manual. Free To Good Home. Must collect from Norwich (off Drayton Road). J. -- "Why 'maybe' for everything?" "I'm using fluffy logic." [ Black Cat Networks ] [ 0845 PAYG dialup ] [ ADSL from £20+VAT/month ] [ http://www.blackcatnetworks.co.uk/ ]
I am looking for something similar in functionality to PGPdisk (Windows) or crypt (Mac) Basically I need an encrypted filesystem that I can easily mount and unmount at will with a passphrase, Preferably this filesystem will exist in its encrypted form as a single file. I am not so bothered about security of contents whilst the filesystem is in the mounted state. I was thinking of doing something funky with a loopback mounted iso of an encrypted filesystem with some scripts to mount/unmount it. But then when looking for a suitable filesystem to format the loopback disk I noticed that the LDP has archived this HOWTO http://www.tldp.org/HOWTO/Loopback-Encrypted-Filesystem-HOWTO.html as being no longer relevant. So does that mean that there is a nice pre-packaged and GUI driven way of doing this now ?
Hi Wayne On Wednesday 07 September 2005 23:39, Wayne Stallwood wrote:
Basically I need an encrypted filesystem that I can easily mount and unmount at will with a passphrase, Preferably this filesystem will exist in its encrypted form as a single file. I am not so bothered about security of contents whilst the filesystem is in the mounted state.
I was thinking of doing something funky with a loopback mounted iso of an encrypted filesystem with some scripts to mount/unmount it.
Sounds like you want something like loop-aes - This provides an encrypted file system on a loopback device.. Here's a short link to get you going. http://www.debian-administration.org/articles/81 Regards, Paul. -- From the Klingon book of C: Klingon function calls do not have 'parameters' - they have 'arguments' - and they ALWAYS WIN THEM.
On Wed, Sep 07, 2005 at 11:39:31PM +0100, Wayne Stallwood wrote:
But then when looking for a suitable filesystem to format the loopback disk I noticed that the LDP has archived this HOWTO http://www.tldp.org/HOWTO/Loopback-Encrypted-Filesystem-HOWTO.html as being no longer relevant.
So does that mean that there is a nice pre-packaged and GUI driven way of doing this now ?
I was taking a look at this the other day, and it appears that dm-crypt is the tool for the job. I got as far as looking at the first couple of hits out of google for dm-crypt see http://www.saout.de/misc/dm-crypt/ and http://deb.riseup.net/storage/encryption/dmcrypt/ for more, and please let me know how you get on as I want to do some similar stuff for private files on my laptop. Thanks Adam -- jabberid = quinophex@jabber.earth.li AFFS || http://www.affs.org.uk/ || Not a filesystem
On Wed, 2005-09-07 at 23:56 +0100, Adam Bower wrote:
On Wed, Sep 07, 2005 at 11:39:31PM +0100, Wayne Stallwood wrote:
I was taking a look at this the other day, and it appears that dm-crypt is the tool for the job. I got as far as looking at the first couple of hits out of google for dm-crypt see http://www.saout.de/misc/dm-crypt/ and http://deb.riseup.net/storage/encryption/dmcrypt/ for more, and please let me know how you get on as I want to do some similar stuff for private files on my laptop.
I've been using dm-crypt with Gentoo for quite a while now, and it works really well. I have exactly the same situation as Wayne. In this case $2 is the name of the file, $3 is size of the file. To create a file losetup -d /dev/loop6 dd if=/dev/random of=/export/crypt/$2 bs=1024 count=$3 losetup /dev/loop6 /export/crypt/$2 cryptsetup create $2 /dev/loop6 -c serpent -y -s 128 -b `blockdev --getsize /dev/loop6` -h ripemd160 mke2fs $2 tune2fs -j $2 dmsetup remove $2 To mount losetup -d /dev/loop6 # ensure the loop device is available dmsetup remove $2 # remove existing definition of the device-map re-run the cryptsetup line mount /dev/mapper/$2 The decision process for using the serpent algorithm was down to other algorithms didn't work on the machine at work. Adam
On Wed, 2005-09-07 at 23:56 +0100, Adam Bower wrote:
I was taking a look at this the other day, and it appears that dm-crypt is the tool for the job. I got as far as looking at the first couple of hits out of google for dm-crypt see http://www.saout.de/misc/dm-crypt/ and http://deb.riseup.net/storage/encryption/dmcrypt/ for more, and please let me know how you get on as I want to do some similar stuff for private files on my laptop.
Cheers for that Adam, the second link was concise enough (bar a few obvious typos) to get me up and running with this in minutes. Using the information on that page I was able to coble together a few scripts to mount and unmount the encrypted volume just before Adam Allen posted almost exactly the same thing :-) Cheers for your alternative suggestion Paul, however at first glance this way looked easier to get going and I can't see any obvious benefits of using loop-aes
participants (5)
-
Adam Bower -
Jonathan McDowell -
Mr. Adam Allen. -
Paul -
Wayne Stallwood