LinuxQuestions.org
Latest LQ Deal: Latest LQ Deals
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Newbie
User Name
Password
Linux - Newbie This Linux forum is for members that are new to Linux.
Just starting out and have a question? If it is not in the man pages or the how-to's this is the place!

Notices


Reply
  Search this Thread
Old 08-30-2018, 10:55 PM   #1
tecjykidd
LQ Newbie
 
Registered: Aug 2018
Posts: 6

Rep: Reputation: Disabled
zero wipe a mapped device i.e /dev/mapper/name


Hello ya'll

I've seen some articles online on encrypting partitions with cryptsetup.

Zero wiping an encrypted mapped device is optional, but some will recommend it. Is there a reason or some benefit to doing this? Thanks for reading
 
Old 08-31-2018, 09:44 AM   #2
lougavulin
Member
 
Registered: Jul 2018
Distribution: Slackware,x86_64,current
Posts: 279

Rep: Reputation: 100Reputation: 100
It is the same reason to randomly wipe your partition before encrypting your device.

Once your device is encrypted and then you write stuff on it (for example install your system). If someone look at your device, the data you write encrypted looks random, with no means.

By wiping before randomly or after with zeros, the whole device seems to contains random data.
 
Old 08-31-2018, 10:50 PM   #3
tecjykidd
LQ Newbie
 
Registered: Aug 2018
Posts: 6

Original Poster
Rep: Reputation: Disabled
Still a little confuse. Even if I don't wipe with zeros, isn't the encrypted partition already gibberage if someone tries to look at it?
 
Old 08-31-2018, 11:08 PM   #4
syg00
LQ Veteran
 
Registered: Aug 2003
Location: Australia
Distribution: Lots ...
Posts: 21,133

Rep: Reputation: 4121Reputation: 4121Reputation: 4121Reputation: 4121Reputation: 4121Reputation: 4121Reputation: 4121Reputation: 4121Reputation: 4121Reputation: 4121Reputation: 4121
Yes. It probably depends who you are trying to defend your data against.
Previous structure might be discernable even from patterns in the encryption on top of old data. But only by someone like the NSA. Note I said "structure" (possible existence of partitions, filesystem ...), not the data itself.

For a normal person with normal data and fighting against normal criminals, encryption alone should be more than enough.
 
Old 08-31-2018, 11:16 PM   #5
tecjykidd
LQ Newbie
 
Registered: Aug 2018
Posts: 6

Original Poster
Rep: Reputation: Disabled
Thank you lougavulin & syg00 for the replies. I understand now.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
LUKS- /dev/mapper/"device" disappears after reboot makupl Linux - Newbie 2 10-25-2017 08:03 AM
vgcreate command is changing /dev/mapper as PV Name in pvdisplay to /dev/dm-xx path neeravsingh Linux - Enterprise 6 03-23-2010 03:05 AM
13 2.6.29.6 cryptsetup luks wrong device name in /dev/mapper/* TheSoftRock Slackware 1 03-04-2010 05:51 PM
Network device Memory mapped or Port mapped ?? Bignon Linux - Hardware 0 10-20-2009 08:36 AM
which device in /dev is mapped to an USB device malo_umoran Slackware 4 07-31-2005 01:12 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Newbie

All times are GMT -5. The time now is 01:35 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration