Linux - NewbieThis Linux forum is for members that are new to Linux.
Just starting out and have a question?
If it is not in the man pages or the how-to's this is the place!
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
hello everybody...iam new to linux programming....i hv to do the encrypted booting in linux......by the way what does encrypted booting means?
can anybody plzz help me regarding this topic...
encrypted booting means the boot process will ask for a password. Without this password you will not be able to find anything on the hard disk (no files, no dirs, no os, no partitions, it will look like just a huge amount of random data)
I think there are several possibilities. In our company we use Check Point EndPoint Security (but it is not free). It does not take care about the OS, this software encrypts the I/O access to the hard disk.
hi everybdy, i got one more problem..
i am trying to encrypt a whole partition through truecrypt and now i want to automount tht partition during reboot. During reboot it should ask for the key and automount that partition. i hv tried by changing the fstab file in /etc but its stil showing some error during reboot. i am not able to automount it during reboot......can anybody help me in this case????
Well if you tell us the error we might be able to but that's pretty vague.
If you are trying to do full disk encryption (ie including the root partition) you can't using Truecrypt in Linux. You'll need to use LUKS or dm-crypt.
thanx nyteowl.......i was able to encrypt the full hard disk using luks and dm-crypt....thanx a lot
now i am having an another problem...after encrypting i made a distribution of it...in the end i made its iso image and wrote it on a CD and tried to install in another system....aftr installation, its just starting like a normal operating system(its not asking for any passphrase or password in the beginning in the way i encrypted it initially).....how can it b done?
how can a system be fully encrypted while the OS is being installed( ubuntu 11.10)...it should be like how an ubuntu 11.10 alternate installer works...how can the system hard disk can be encrypted while the OS is being installed?
It sounds like you had your encrypted filesystem decrypted and mounted, and created an image of the decrypted (/dev/dm-*) device(s) instead of the encrypted (/dev/sd*) device(s). Look in /dev/mapper/. There are symbolic links such as /dev/mapper/cr_sda2 -> /dev/dm-1. Here /dev/sda2 is encrypted. The kernel maps a decrypted device to /dev/dm-2, and this is the device that is mounted, and used during an installation.
I use LUKS at home. A previous post said that you needed LUKS to encrypt the entire partition, instead of TrueCrypt. This is backwards. You need an unencrypted /boot partition to be able to load the kernel including the parts which can decrypt the rest of the drive. Truecrypt uses it's own unstandard boot loader to enable full drive encrypting. I use LUKS because it allows me to decrypt a partition using cryptsetup without depending on a third party program.
The /boot partition is small, and you could easily create an image backup and save it on read-only media such as a CDROM or DVD-ROM. The /boot partition is also needed outside an LVM image and all RAID versions other than mirroring (RAID-1).
i was able to encrypt my system with LUKS by entering into an unencrypted partition...bt the prblem tht is occuring rite now is tht i am not able to customize this into a boot CD(the linux OS shud encrypt the entire hard disk while being installed into the system)...i have used REMASTERSYS bt its nt working....plzz suggest how shud i go abt it....thanku
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.