<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<atom:link href="https://dev1galaxy.org/extern.php?action=feed&amp;tid=5185&amp;type=rss" rel="self" type="application/rss+xml" />
		<title><![CDATA[Dev1 Galaxy Forum / [SOLVED] LUKS Full Disk Encryption]]></title>
		<link>https://dev1galaxy.org/viewtopic.php?id=5185</link>
		<description><![CDATA[The most recent posts in [SOLVED] LUKS Full Disk Encryption.]]></description>
		<lastBuildDate>Fri, 23 Sep 2022 09:07:15 +0000</lastBuildDate>
		<generator>FluxBB</generator>
		<item>
			<title><![CDATA[Re: [SOLVED] LUKS Full Disk Encryption]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=37648#p37648</link>
			<description><![CDATA[<p>I have created an encrypted LVM with logical volumes for swap and root. /boot is unencrypted on another partition. <span class="bbc">/etc/crypttab</span> and <span class="bbc">/etc/fstab</span> look as follows.</p><p><span class="bbc">/etc/crypttab</span>:</p><div class="codebox"><pre><code>lvm_crypt UUID=&lt;luks-uuid&gt; none luks</code></pre></div><p><span class="bbc">/etc/fstab</span>:</p><div class="codebox"><pre><code>/dev/vg00/lvol_devuan_swap	none	swap	sw	0	0
/dev/vg00/lvol_devuan_system	/	ext4	defaults,noatime	0	1
UUID=&lt;boot-uuid&gt;	/boot	ext4	defaults,noatime0	2</code></pre></div><p>I had to <span class="bbc">update-initramfs -u -k all</span> and <span class="bbc">update-grub</span>.</p><p>Now it works without any problems! I can also hibernate and resume from the encrypted swap partition.</p><p>Thank you guys for all your help!</p>]]></description>
			<author><![CDATA[dummy@example.com (unixdan22)]]></author>
			<pubDate>Fri, 23 Sep 2022 09:07:15 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=37648#p37648</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] LUKS Full Disk Encryption]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=37522#p37522</link>
			<description><![CDATA[<div class="quotebox"><cite>unixdan22 wrote:</cite><blockquote><div><p>Does hibernate work with a swap partition inside an LVM?</p></div></blockquote></div><p>It does on my PC (AMD5600G, Chimaera, emulated legacy boot, no encryption, kernel 5.18.0-0.deb11.4-amd64. RAID1).</p><p>I&#039;m still finding hibernation a bit flaky - sometimes it attempt a reboot and I have to kill it with the power button (but then still resumes OK subsequently).</p><p>If you were to try to hibernate to a swapfile one obvious, bur solvable, problem is that you would have to make it significantly larger than 256Mb as it has to have space for what&#039;s in your RAM).</p>]]></description>
			<author><![CDATA[dummy@example.com (Marjorie)]]></author>
			<pubDate>Sun, 11 Sep 2022 10:56:35 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=37522#p37522</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] LUKS Full Disk Encryption]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=37518#p37518</link>
			<description><![CDATA[<div class="quotebox"><cite>rolfie wrote:</cite><blockquote><div><p>Any installer will do, there is nothing special to be done to make grub boot an encrypted root. I am using FDE with unencrypted /boot and an LVM in an encrypted partition for / and /swap for many years now, no issues. Legacy Bios or efi, mbr or gpt do not matter, all combinations work.</p></div></blockquote></div><p>Does hibernate work with a swap partition inside an LVM?</p>]]></description>
			<author><![CDATA[dummy@example.com (unixdan22)]]></author>
			<pubDate>Sun, 11 Sep 2022 10:23:38 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=37518#p37518</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] LUKS Full Disk Encryption]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=37517#p37517</link>
			<description><![CDATA[<p>I&#039;ve never tried to hibernate with a swapfile. There is a uswsusp module in the pm-utils package. I have no idea how you would use it. (dpkg-reconfigure uswsusp won&#039;t work)</p><div class="codebox"><pre><code>$ apt-file find uswsusp
pm-utils: /usr/lib/pm-utils/module.d/uswsusp</code></pre></div>]]></description>
			<author><![CDATA[dummy@example.com (fsmithred)]]></author>
			<pubDate>Sun, 11 Sep 2022 10:18:23 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=37517#p37517</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] LUKS Full Disk Encryption]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=37515#p37515</link>
			<description><![CDATA[<p>I have created a swap file manually as you said and disabled the swap partition. But now the hibernate button in the XFCE logout menu is gone. How to enable hibernate with a swap file?<br />All the tutorials I found tell about installing and configuring the uswsusp package, but this package is missing in the Devuan repository.</p>]]></description>
			<author><![CDATA[dummy@example.com (unixdan22)]]></author>
			<pubDate>Sun, 11 Sep 2022 09:14:44 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=37515#p37515</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] LUKS Full Disk Encryption]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=37507#p37507</link>
			<description><![CDATA[<p>The live installer would have made a swapfile in the root partition if you had not chosen to use the swap partition. So yes, it&#039;s possible to have a swapfile. To be sure, check to see if /swapfile already exists.</p><p>refractainstaller does the following, where bs=1024 and count=1048576:</p><div class="codebox"><pre><code>        dd if=/dev/zero of=/target/swapfile bs=&quot;$swapfile_blocksize&quot; count=&quot;$swapfile_count&quot; ; check_exit 
        mkswap /target/swapfile ; check_exit 
        chmod 600 /target/swapfile</code></pre></div><p>The values for bs and count are in /etc/refractainstaller in case anyone wants to change the size of the swapfile. Currently it&#039;s set to 256mb. And then you have to edit the swap entry in /etc/fstab. Mine looks like this: </p><div class="codebox"><pre><code>/swapfile	none	swap	sw	0	0</code></pre></div>]]></description>
			<author><![CDATA[dummy@example.com (fsmithred)]]></author>
			<pubDate>Sat, 10 Sep 2022 16:31:14 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=37507#p37507</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] LUKS Full Disk Encryption]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=37487#p37487</link>
			<description><![CDATA[<p>Right now I have an unencrypted swap partition. What is the best way to also encrypt that?</p><p>Should I create / and swap partitions inside an LVM as rolfie has suggested or is it possible to create a swap file on the encrypted file system?</p>]]></description>
			<author><![CDATA[dummy@example.com (unixdan22)]]></author>
			<pubDate>Fri, 09 Sep 2022 10:40:00 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=37487#p37487</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] LUKS Full Disk Encryption]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=37486#p37486</link>
			<description><![CDATA[<div class="quotebox"><cite>fsmithred wrote:</cite><blockquote><div><p>I don&#039;t know the details of how it works, but grub has modules for crypto and for luks. Look under /boot/grub/.</p><p>Yeah, I almost warned you about the double password entry. It&#039;s very slow, too. I should have said that I recommend it if that&#039;s what you really want. Another way to make /boot secure is to remove it from the hard disk and put it on a usb stick. Then you can&#039;t boot without the stick. (also inconvenient.)</p></div></blockquote></div><p>I think having /boot unencrypted is not really an issue for me, because it does not contain any personal data anyway. Sorry if the title was misleading.</p>]]></description>
			<author><![CDATA[dummy@example.com (unixdan22)]]></author>
			<pubDate>Fri, 09 Sep 2022 10:31:09 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=37486#p37486</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] LUKS Full Disk Encryption]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=37437#p37437</link>
			<description><![CDATA[<p>a guide for FDE including /boot : https://cryptsetup-team.pages.debian.net/cryptsetup/encrypted-boot.html</p>]]></description>
			<author><![CDATA[dummy@example.com (xinomilo)]]></author>
			<pubDate>Thu, 08 Sep 2022 08:02:48 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=37437#p37437</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] LUKS Full Disk Encryption]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=37421#p37421</link>
			<description><![CDATA[<div class="quotebox"><cite>unixdan22 wrote:</cite><blockquote><div><p>How does the kernel know where to find the system-uuid? It is inside the LUKS partition. To see the UUID of the encrypted partition it would have to decrypt the LUKS partition first. How does it work?</p></div></blockquote></div><p>Have a look at /etc/crypttab. The contents of this file is one of the inputs for grub and the initramfs.</p>]]></description>
			<author><![CDATA[dummy@example.com (rolfie)]]></author>
			<pubDate>Wed, 07 Sep 2022 17:49:30 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=37421#p37421</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] LUKS Full Disk Encryption]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=37420#p37420</link>
			<description><![CDATA[<div class="quotebox"><cite>unixdan22 wrote:</cite><blockquote><div><p>Which partitioning software is it in this documentation?</p></div></blockquote></div><p>These are pictures taken from the standard installer in normal mode.</p>]]></description>
			<author><![CDATA[dummy@example.com (rolfie)]]></author>
			<pubDate>Wed, 07 Sep 2022 17:48:18 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=37420#p37420</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] LUKS Full Disk Encryption]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=37405#p37405</link>
			<description><![CDATA[<p>I don&#039;t know the details of how it works, but grub has modules for crypto and for luks. Look under /boot/grub/.</p><p>Yeah, I almost warned you about the double password entry. It&#039;s very slow, too. I should have said that I recommend it if that&#039;s what you really want. Another way to make /boot secure is to remove it from the hard disk and put it on a usb stick. Then you can&#039;t boot without the stick. (also inconvenient.)</p>]]></description>
			<author><![CDATA[dummy@example.com (fsmithred)]]></author>
			<pubDate>Wed, 07 Sep 2022 12:43:15 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=37405#p37405</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] LUKS Full Disk Encryption]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=37399#p37399</link>
			<description><![CDATA[<p>This is what the GRUB menu entry looks like:</p><div class="codebox"><pre><code>menuentry &#039;Devuan GNU/Linux&#039; --class devuan --class gnu-linux --class gnu --class os $menuentry_id_option &#039;gnulinux-simple-&lt;system-uuid&gt;&#039; {
	load_video
	insmod gzio
	if [ x$grub_platform = xxen ]; then insmod xzio; insmod lzopio; fi
	insmod part_msdos
	insmod ext2
	set root=&#039;hd0,msdos2&#039;
	if [ x$feature_platform_search_hint = xy ]; then
	  search --no-floppy --fs-uuid --set=root --hint-bios=hd0,msdos2 --hint-efi=hd0,msdos2 --hint-baremetal=ahci0,msdos2  &lt;boot-uuid&gt;
	else
	  search --no-floppy --fs-uuid --set=root &lt;boot-uuid&gt;
	fi
	echo	&#039;Loading Linux 5.18.0-0.bpo.1-amd64 ...&#039;
	linux	/vmlinuz-5.18.0-0.bpo.1-amd64 root=UUID=&lt;system-uuid&gt; ro  text iomem=relaxed
	echo	&#039;Loading initial ramdisk ...&#039;
	initrd	/initrd.img-5.18.0-0.bpo.1-amd64
}</code></pre></div><p>How does the kernel know where to find the system-uuid? It is inside the LUKS partition. To see the UUID of the encrypted partition it would have to decrypt the LUKS partition first. How does it work?</p>]]></description>
			<author><![CDATA[dummy@example.com (unixdan22)]]></author>
			<pubDate>Wed, 07 Sep 2022 09:42:50 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=37399#p37399</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] LUKS Full Disk Encryption]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=37398#p37398</link>
			<description><![CDATA[<p>I installed the encrypted system with refractainstaller and it worked!</p><p>First I tried without a separate /boot partition, but then I had to enter the disk password twice during boot: Once to start GRUB and then to boot Devuan. GRUB takes 17 seconds to decrypt which was very annoying.</p><p>Then I tried a different configuration with a separate /boot partition (also with refractainstaller), and it worked perfectly! GRUB starts without a password and I only have to enter the password to boot Devuan.</p>]]></description>
			<author><![CDATA[dummy@example.com (unixdan22)]]></author>
			<pubDate>Wed, 07 Sep 2022 09:34:05 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=37398#p37398</guid>
		</item>
		<item>
			<title><![CDATA[Re: [SOLVED] LUKS Full Disk Encryption]]></title>
			<link>https://dev1galaxy.org/viewtopic.php?pid=37397#p37397</link>
			<description><![CDATA[<div class="quotebox"><cite>rolfie wrote:</cite><blockquote><div><p>There is a guide for guided setup at: <a href="https://www.devuan.org/os/documentation/install-guides/chimaera/full-disk-encryption" rel="nofollow">https://www.devuan.org/os/documentation … encryption</a> which is much easier.</p></div></blockquote></div><p>Which partitioning software is it in this documentation?</p>]]></description>
			<author><![CDATA[dummy@example.com (unixdan22)]]></author>
			<pubDate>Wed, 07 Sep 2022 09:30:46 +0000</pubDate>
			<guid>https://dev1galaxy.org/viewtopic.php?pid=37397#p37397</guid>
		</item>
	</channel>
</rss>
