<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<atom:link href="http://dev1galaxy.org/extern.php?action=feed&amp;tid=2748&amp;type=rss" rel="self" type="application/rss+xml" />
		<title><![CDATA[Dev1 Galaxy Forum / HOWTO: Devuan with full disk encryption]]></title>
		<link>http://dev1galaxy.org/viewtopic.php?id=2748</link>
		<description><![CDATA[The most recent posts in HOWTO: Devuan with full disk encryption.]]></description>
		<lastBuildDate>Tue, 23 Apr 2019 08:09:29 +0000</lastBuildDate>
		<generator>FluxBB</generator>
		<item>
			<title><![CDATA[Re: HOWTO: Devuan with full disk encryption]]></title>
			<link>http://dev1galaxy.org/viewtopic.php?pid=15678#p15678</link>
			<description><![CDATA[<p>About <a href="https://bugs.devuan.org//cgi/bugreport.cgi?bug=237" rel="nofollow">patch</a>: <br />(I tested Beowulf because I thought &quot;this time will be different&quot; )<br />In Beowulf file name for patching is &quot;cryptdisks<span style="color: #FF0000">-</span>functions&quot;<br /><strong>I am not using LVM.</strong><br />Everything else I already noticed <a href="https://dev1galaxy.org/viewtopic.php?id=674" rel="nofollow">https://dev1galaxy.org/viewtopic.php?id=674</a>&#160; #12 :</p><div class="quotebox"><cite>Vizitor wrote:</cite><blockquote><div><p>&quot;for i in 1; do&quot; --- this does shorten shutdown/reboot time. (Beowulf included)<br />But, the question is: Does encrypted filesystem/partition/container in the end get proper unmount?<br />Because all those unmounting messages are ending with &quot;<span style="color: #FF0000">failed</span>&quot;.<br /> am concerned that over time, some files may become corrupted without noticing.</p></div></blockquote></div><p>Edit: This is beginning to be thread hijacking, so I&#039;ll not continue on here.</p>]]></description>
			<author><![CDATA[dummy@example.com (Vizitor)]]></author>
			<pubDate>Tue, 23 Apr 2019 08:09:29 +0000</pubDate>
			<guid>http://dev1galaxy.org/viewtopic.php?pid=15678#p15678</guid>
		</item>
		<item>
			<title><![CDATA[Re: HOWTO: Devuan with full disk encryption]]></title>
			<link>http://dev1galaxy.org/viewtopic.php?pid=15675#p15675</link>
			<description><![CDATA[<p>See this thread for a solution to the shutdown delay:<br /><a href="https://dev1galaxy.org/viewtopic.php?id=674" rel="nofollow">https://dev1galaxy.org/viewtopic.php?id=674</a></p>]]></description>
			<author><![CDATA[dummy@example.com (fsmithred)]]></author>
			<pubDate>Mon, 22 Apr 2019 21:16:29 +0000</pubDate>
			<guid>http://dev1galaxy.org/viewtopic.php?pid=15675#p15675</guid>
		</item>
		<item>
			<title><![CDATA[Re: HOWTO: Devuan with full disk encryption]]></title>
			<link>http://dev1galaxy.org/viewtopic.php?pid=15669#p15669</link>
			<description><![CDATA[<p>.. and there is no repeating message (?):</p><div class="codebox"><pre><code>Stopping remaining crypt disks...sdX_crypt(busy)</code></pre></div><p>I have it on Beowulf.<br />I see it on MX Linux 18. (There it appears for very short moment, but it DOES appear)<br />Probably this is an issue on ALL debian/devuan distros.</p><p>Also,<br />If Your installation is on UEFI based machine, and I see it is, You can put GRUB into retirement and use EFISTUB.</p>]]></description>
			<author><![CDATA[dummy@example.com (Vizitor)]]></author>
			<pubDate>Mon, 22 Apr 2019 17:18:36 +0000</pubDate>
			<guid>http://dev1galaxy.org/viewtopic.php?pid=15669#p15669</guid>
		</item>
		<item>
			<title><![CDATA[Re: HOWTO: Devuan with full disk encryption]]></title>
			<link>http://dev1galaxy.org/viewtopic.php?pid=15087#p15087</link>
			<description><![CDATA[<p>Thanks, I have added a note that the procedure is applicable/relevant to the netinst installation (which uses d-i).</p>]]></description>
			<author><![CDATA[dummy@example.com (dev)]]></author>
			<pubDate>Tue, 26 Mar 2019 21:50:44 +0000</pubDate>
			<guid>http://dev1galaxy.org/viewtopic.php?pid=15087#p15087</guid>
		</item>
		<item>
			<title><![CDATA[Re: HOWTO: Devuan with full disk encryption]]></title>
			<link>http://dev1galaxy.org/viewtopic.php?pid=15048#p15048</link>
			<description><![CDATA[<p>For the record: If you install from one of the live isos, you would choose to encrypt the root filesystem and not select a separate partition for /boot. That&#039;s all. The installer will add the line to /etc/default/grub.</p>]]></description>
			<author><![CDATA[dummy@example.com (fsmithred)]]></author>
			<pubDate>Mon, 25 Mar 2019 09:32:48 +0000</pubDate>
			<guid>http://dev1galaxy.org/viewtopic.php?pid=15048#p15048</guid>
		</item>
		<item>
			<title><![CDATA[Re: HOWTO: Devuan with full disk encryption]]></title>
			<link>http://dev1galaxy.org/viewtopic.php?pid=15022#p15022</link>
			<description><![CDATA[<p>No, just this one change was enough.</p>]]></description>
			<author><![CDATA[dummy@example.com (dev)]]></author>
			<pubDate>Sat, 23 Mar 2019 22:45:13 +0000</pubDate>
			<guid>http://dev1galaxy.org/viewtopic.php?pid=15022#p15022</guid>
		</item>
		<item>
			<title><![CDATA[Re: HOWTO: Devuan with full disk encryption]]></title>
			<link>http://dev1galaxy.org/viewtopic.php?pid=15021#p15021</link>
			<description><![CDATA[<p>Yes, but with your setup - did you have to do any other modification to grub except adding the crypto module as described in your howto? I mean this change:</p><div class="codebox"><pre><code>echo GRUB_ENABLE_CRYPTODISK=y &gt;&gt; /etc/default/grub</code></pre></div>]]></description>
			<author><![CDATA[dummy@example.com (kuleszdl)]]></author>
			<pubDate>Sat, 23 Mar 2019 21:11:22 +0000</pubDate>
			<guid>http://dev1galaxy.org/viewtopic.php?pid=15021#p15021</guid>
		</item>
		<item>
			<title><![CDATA[Re: HOWTO: Devuan with full disk encryption]]></title>
			<link>http://dev1galaxy.org/viewtopic.php?pid=15019#p15019</link>
			<description><![CDATA[<p>Hey, yes, there is &#039;luks&#039; module loaded in grub and grub decrypts it. And yes, the key needs to be entered twice.<br />I believe this is the standard way how encryption of this type is set up, and one of alternatives is certainly, as you mention, to use signing instead of encryption.<br />Thanks!</p>]]></description>
			<author><![CDATA[dummy@example.com (dev)]]></author>
			<pubDate>Sat, 23 Mar 2019 17:30:31 +0000</pubDate>
			<guid>http://dev1galaxy.org/viewtopic.php?pid=15019#p15019</guid>
		</item>
		<item>
			<title><![CDATA[Re: HOWTO: Devuan with full disk encryption]]></title>
			<link>http://dev1galaxy.org/viewtopic.php?pid=15012#p15012</link>
			<description><![CDATA[<p>Welcome and thanks for sharing this. But how do you boot the Kernel with /boot encrypted? Do you decrypt it in the bootloader (GRUB?) and then a second time during startup, entering the password twice? Not mentioning, that decrypting in GRUB is very slow.</p><p>Personally, I prefer to leave /boot unencrypted but to use signed kernels/initrd and check their signatures in GRUB before booting them.</p>]]></description>
			<author><![CDATA[dummy@example.com (kuleszdl)]]></author>
			<pubDate>Sat, 23 Mar 2019 12:17:33 +0000</pubDate>
			<guid>http://dev1galaxy.org/viewtopic.php?pid=15012#p15012</guid>
		</item>
		<item>
			<title><![CDATA[HOWTO: Devuan with full disk encryption]]></title>
			<link>http://dev1galaxy.org/viewtopic.php?pid=15003#p15003</link>
			<description><![CDATA[<p>The page:<br /><a href="http://techpubs.spinlocksolutions.com/devuan/full-disk-encryption.html" rel="nofollow">http://techpubs.spinlocksolutions.com/d … ption.html</a></p><p>Explains how to set up Devuan with full disk encryption (including /boot) during system installation when using the netinst ISO image. (The netinst ISO uses debian-installer. The Live ISO uses Refracta, which can set up boot on an encrypted root partition without any manual work needed.)</p><p>The procedure explained here is done by entering shell and executing commands after everything has been installed but before user clicks &quot;Finish installation&quot;.</p><p>The idea is that for the official/standard part of the installation, an unencrypted partition is created and /boot is placed on it.<br />Then after the installer is done installing files, user enters shell and moves boot files onto the main (encrypted) partition, and re-purposes the unencrypted /boot partition into an encrypted swap partition.</p><p>This way all goals are met (fully standard installation, with full disk encryption, and with swap, done in the same session as the installation).</p>]]></description>
			<author><![CDATA[dummy@example.com (dev)]]></author>
			<pubDate>Fri, 22 Mar 2019 22:33:46 +0000</pubDate>
			<guid>http://dev1galaxy.org/viewtopic.php?pid=15003#p15003</guid>
		</item>
	</channel>
</rss>
