Slackware-13.1-Hacks-TrueCrypt
Posted 02-09-2011 at 10:23 PM by arniekat
You need to compile and install in the following order from SlackBuilds:
cryptoki-2.20
wxGTK-2.8.11
truecrypt-7.0a
After installing, create the truecrypt group.
# groupadd truecrypt
Now, edit the sudoers file.
# visudo
Add the following lines to the file:
# This will allow all users to run the truecrypt binary
%truecrypt ALL=(root) NOPASSWD:/usr/bin/truecrypt
Save the file and exit.
Now add your user(s) to the truecrypt group.
# gpasswd -a user1 truecrypt
# gpasswd -a user2 truecrypt
Now, you create your encrypted container (file or partition based).
The following is for a file-based container:
At the TrueCrypt dialog box, select "Create Volume".
Select "Create an encrypted file container" and click Next.
Select "Standard TrueCrypt Volume" and click Next.
At the Volume Location dialog box, click Select File.
Navigate to any directory you wish and type a name in the File Name section of the dialog box and click Open.
You will now see the complete filename and path. If it is OK, click Next.
The default Encryption algorithm is AES 256-Bit with a default Hash algorithm of RIPEMD-160, which you can change. If it is OK, click Next.
At the Volume Size dialog box, enter the size of the encrypted file container. Then click Next.
At the Volume Password dialog box, enter the password for the encrypted volume twice and click Next.
The recommended length of container passwords is 20 characters, so you will get a warning if it is shorter.
At the Format Options dialog box, you can select a File System Type. The available choices are: FAT, ext2, ext3, ext4.
At the Volume Format dialog box, there is a message to move your mouse as randomly as possible within the window and when ready to format, click Format.
After the Volume is created, you will get a confirmation message.
At the main TrueCrypt dialog box, click the Select File button and find the container you just created. Select Mount.
Enter the container password.
The truecrypt file containers mount on /media/truecryptX
Where X is the slot number you chose from the truecrypt dialog box.
cryptoki-2.20
wxGTK-2.8.11
truecrypt-7.0a
After installing, create the truecrypt group.
# groupadd truecrypt
Now, edit the sudoers file.
# visudo
Add the following lines to the file:
# This will allow all users to run the truecrypt binary
%truecrypt ALL=(root) NOPASSWD:/usr/bin/truecrypt
Save the file and exit.
Now add your user(s) to the truecrypt group.
# gpasswd -a user1 truecrypt
# gpasswd -a user2 truecrypt
Now, you create your encrypted container (file or partition based).
The following is for a file-based container:
At the TrueCrypt dialog box, select "Create Volume".
Select "Create an encrypted file container" and click Next.
Select "Standard TrueCrypt Volume" and click Next.
At the Volume Location dialog box, click Select File.
Navigate to any directory you wish and type a name in the File Name section of the dialog box and click Open.
You will now see the complete filename and path. If it is OK, click Next.
The default Encryption algorithm is AES 256-Bit with a default Hash algorithm of RIPEMD-160, which you can change. If it is OK, click Next.
At the Volume Size dialog box, enter the size of the encrypted file container. Then click Next.
At the Volume Password dialog box, enter the password for the encrypted volume twice and click Next.
The recommended length of container passwords is 20 characters, so you will get a warning if it is shorter.
At the Format Options dialog box, you can select a File System Type. The available choices are: FAT, ext2, ext3, ext4.
At the Volume Format dialog box, there is a message to move your mouse as randomly as possible within the window and when ready to format, click Format.
After the Volume is created, you will get a confirmation message.
At the main TrueCrypt dialog box, click the Select File button and find the container you just created. Select Mount.
Enter the container password.
The truecrypt file containers mount on /media/truecryptX
Where X is the slot number you chose from the truecrypt dialog box.
Total Comments 1
Comments
-
thank you for the tutorial. It would also be interesting to see a tutorial on setting up a hidden OS partition. But the effectiveness of plausible deniability seems lacking if you know its a possibility of the set up. Just beat him twice as hard for all 3 passwords.
Posted 02-09-2011 at 11:43 PM by lumak