Will cloning one hdd (not ssd) to another encrypted hdd work on a cloning device?
Linux - NewbieThis Linux forum is for members that are new to Linux.
Just starting out and have a question?
If it is not in the man pages or the how-to's this is the place!
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
Assuming the two disks have the same size and the cloning device makes a bit-by-bit copy, it doesn't matter whether the destination disk is encrypted. After cloning, you have two disks with identical data.
Assuming the two disks have the same size and the cloning device makes a bit-by-bit copy, it doesn't matter whether the destination disk is encrypted. After cloning, you have two disks with identical data.
Thanks. How can I tell if the device is 'bit-by-bit'? It doesn't say on the box; I can call the manufacturer.
Thanks. How can I tell if the device is 'bit-by-bit'? It doesn't say on the box; I can call the manufacturer.
Since I don't know your cloning device, I don't know what it does. Chances are it just copies each bit from the source to the destination disk without worrying about any structures that might already exist on the destination.
If so, the two disks will be identical after the cloning operation, and as Firerat says, your encryption will go away. I hope that this is your expectation.
Last edited by berndbausch; 09-03-2019 at 05:18 AM.
if the unencryted and the encrypted devices were both mounted, and the files were simply copied. then the files in the destination would be encrypted.
if unencrypted is a root fs, then more work would need to be done to allow booting
if we are talking about home, again more work required but not as much
if it is just data, less work ( but obviously you need to know how to access the encrypted data )
hddfsck, please provide detail of what you want to achieve
if the unencryted and the encrypted devices were both mounted, and the files were simply copied. then the files in the destination would be encrypted.
if unencrypted is a root fs, then more work would need to be done to allow booting
if we are talking about home, again more work required but not as much
if it is just data, less work ( but obviously you need to know how to access the encrypted data )
hddfsck, please provide detail of what you want to achieve
If the destination drive is encrypted, will the cloning still take place? Goal: move all files TO encrypted device. Thanks.
If the destination drive is encrypted, will the cloning still take place? Goal: move all files TO encrypted device. Thanks.
So, cloning a device and moving all files are two completely different things.
What tool(s) do you plan to use will define if the process will be successful or not.
But, first, you need to determine what exactly do you want:
- "clone a device" (aka, copy OS, config files, applications, your data)
- "move all files" (aka, your data but not OS or applications)
So, cloning a device and moving all files are two completely different things.
Indeed. If you clone an unencrypted device to an encrypted one, you will finish up with two copies of the original. That's what cloning does - whether it's dolly the sheep or your data.
If the destination drive is encrypted, will the cloning still take place? Goal: move all files TO encrypted device. Thanks.
Encrypted devices (or encrypting devices) might exist, but I am certain they are rare, only used in very special situations and expensive. A usual hard disk is not encrypted.
You can encrypt the data on a hard disk using encryption software. If encryption software is used, when you write "Linux", what is actually written is "&#fh346%".
Cloning means making an identical copy. When you clone disk A to disk B, any encrypted data that might be on disk B is overwritten. You end up with two identical disks. After cloning, if the data on disk A is encrypted, so is the data on disk B. If the data on disk A is clear, so is the data on disk B.
There might be cloning devices that honour the encryption format on disk B. Most probably, your device doesn't.
Encrypted devices (or encrypting devices) might exist, but I am certain they are rare, only used in very special situations and expensive. A usual hard disk is not encrypted.
You can encrypt the data on a hard disk using encryption software. If encryption software is used, when you write "Linux", what is actually written is "&#fh346%".
Cloning means making an identical copy. When you clone disk A to disk B, any encrypted data that might be on disk B is overwritten. You end up with two identical disks. After cloning, if the data on disk A is encrypted, so is the data on disk B. If the data on disk A is clear, so is the data on disk B.
There might be cloning devices that honour the encryption format on disk B. Most probably, your device doesn't.
You are correct. Cloning from a non-encrypted device to an encrypted device, erased the encryption on the destination device, unfortunately. Also, the size of the destination device is half of its max potential since the host device was half.
In order to be able to access/ use the other half of the destination device, would I have to start over and delete the cloned contents, and then copy and paste instead of clone (to the destination device)? Thanks.
if you clone the drive yes, but it will not be encrypted.
if you mount the encrypted filesystem and copy files to it they will be encrypted.
when I said provide detail
I should have said provide full details
I can give you correct answers to your poor questions, but the answers will be poor even if they are correct.
garbage in garbage out.
The original files:
are they just documents?
or are they files which an operating system requires to operate?
what do you want/need to do with the files after they are encrypted?
Just documents, no os on hdd; storage hdd after encrypted and transferred; read files afterwards.
In order to be able to access/ use the other half of the destination device, would I have to start over and delete the cloned contents, and then copy and paste instead of clone (to the destination device)?
Thanks.
So, cloning a device and moving all files are two completely different things.
What tool(s) do you plan to use will define if the process will be successful or not.
But, first, you need to determine what exactly do you want:
- "clone a device" (aka, copy OS, config files, applications, your data)
- "move all files" (aka, your data but not OS or applications)
Just moving all files.
In order to be able to access/ use the other half of the destination device, would I have to start over and delete the cloned contents, and then copy and paste instead of clone (to the destination device)?
In order to be able to access/ use the other half of the destination device, would I have to start over and delete the cloned contents, and then copy and paste instead of clone (to the destination device)?
So your source disk was half the size of your destination?
Depending on how the disk is structured, there are several options. Tools like gparted allow you to create new partitions or extend existing partitions. You probably need to know, however, how the disk is partitioned, whether it contains a volume manager and what filesystem types are used.
I would start by attaching the disk to a running Linux system that has gparted, and use that tool to analyze the disk structure. Since you still have the source disk, you can even take risks and explore the tool's features and capabilities.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.