UPDATE: I have suffered some sort of corruption with this approach. As a result I do not recommend the instructions below. I encourage you to look into more solid loopback encryption techniques.

Also please see 01211.


This fallible approach is also known as encryption over LVM.

I created the logical volume from the volume group 'x61'.

sudo lvcreate -n crypt -L 12.27GB x61

This will prompt you for a password. Don't forget it!

sudo cryptsetup create crypt /dev/x61/crypt

x61:~% sudo cryptsetup status crypt
/dev/mapper/crypt is active:
  cipher:  aes-cbc-plain
  keysize: 256 bits
  device:  /dev/dm-4
  offset:  0 sectors
  size:    25739264 sectors
  mode:    read/write

Create the ext3 filesystem:

sudo mke2fs -j -O dir_index,filetype,sparse_super /dev/mapper/crypt

Setup the crypttab to tell the system how to unlock the disk

x61:~% cat /etc/crypttab

# <target name> <source device>         <key file>      <options>

crypt /dev/x61/crypt none checkargs=ext2,noauto

An fstab line to mount it

x61:~% grep crypt /etc/fstab

/dev/mapper/crypt /home/hendry/crypt ext3    defaults,noauto,user        0       0

SO to start using my special encrypted folder, I now have to run:

sudo cryptdisks_start crypt

mount /home/hendry/crypt

So here is what I have my disk & LVM finally setup as:

x61:~% sudo lvscan
  ACTIVE            '/dev/x61/root' [16.68 GB] inherit
  ACTIVE            '/dev/x61/swap_1' [2.59 GB] inherit
  ACTIVE            '/dev/x61/home' [80.00 GB] inherit
  ACTIVE            '/dev/x61/crypt' [12.27 GB] inherit

x61:~% sudo pvscan
  PV /dev/sda5   VG x61   lvm2 [111.55 GB / 4.00 MB free]
  Total: 1 [111.55 GB] / in use: 1 [111.55 GB] / in no VG: 0 [0   ]

Furthermore, encrypting a swap partition.

Feedback

Powered by Vanilla PHP feedback form