Code: Select all
patching file mount/Makefile
Hunk #3 FAILED at 78.
1 out of 3 hunks FAILED -- saving rejects to file mount/Makefile.rej
patching file mount/aes.c
patching file mount/aes.h
patching file mount/lomount.c
Hunk #1 FAILED at 6.
Hunk #2 FAILED at 23.
Hunk #3 FAILED at 140.
Hunk #4 FAILED at 218.
Hunk #5 FAILED at 523.
Hunk #6 FAILED at 549.
Hunk #7 FAILED at 627.
Hunk #8 succeeded at 721 with fuzz 2 (offset 79 lines).
Hunk #9 FAILED at 730.
Hunk #10 succeeded at 719 (offset 57 lines).
Hunk #11 FAILED at 757.
Hunk #12 FAILED at 865.
10 out of 12 hunks FAILED -- saving rejects to file mount/lomount.c.rej
patching file mount/losetup.8
Hunk #1 FAILED at 1.
Hunk #2 FAILED at 7.
Hunk #3 succeeded at 55 with fuzz 2 (offset 24 lines).
Hunk #4 FAILED at 72.
Hunk #5 FAILED at 142.
4 out of 5 hunks FAILED -- saving rejects to file mount/losetup.8.rej
patching file mount/loumount.c
patching file mount/mount.8
Hunk #3 succeeded at 1698 (offset 8 lines).
patching file mount/mount.c
Hunk #2 succeeded at 198 (offset 3 lines).
Hunk #3 succeeded at 208 (offset 3 lines).
Hunk #4 FAILED at 1402.
Hunk #5 FAILED at 1441.
Hunk #6 succeeded at 1489 (offset 19 lines).
2 out of 6 hunks FAILED -- saving rejects to file mount/mount.c.rej
patching file mount/rmd160.c
patching file mount/rmd160.h
patching file mount/sha512.c
patching file mount/sha512.h
patching file mount/swapon.8
patching file mount/swapon.cCode: Select all
tawesley util-linux-2.12 # ls /usr/portage/distfiles/util*
/usr/portage/distfiles/util-linux-2.11z-crypt-gentoo.patch.bz2
/usr/portage/distfiles/util-linux-2.11z.tar.bz2
/usr/portage/distfiles/util-linux-2.12.tar.gz
util-linux-2.12 seems to be a CryptoAPI-only sort of thing.tomaw wrote:OK, here's my next question - does anyone have the patch working for util-linux 2.12?
Im just wondering. If one has a /home partition encrypted then WHY would one need to encrypt the root partition too? All your personal files are in the /home partition and the root filesystem keeps libs,binaries and docs. There is nothing to hide in the root partition?An earlier post (contigab) made the comment that similar results can be achieved using modules taken from the cryptoloop package. If the similar result is an encrypted "root" filesystem then additional work is needed. The kernel will not have access to the root file system to retrieve the encryption module untilt he encryption module is retrieved... a chicken and egg problem. This is the reason that an intermediate root (initrd=/dev/ram) is required to boot. Contigab handles encrypted home, etc, very well and is useful, but does not appear to handle the encrypted root case. The original loop-AES post that started this thread does address this.

Come along sometime -- I can give tours of the Very Large Array -- although (contrary to the move "Contact") I have to admit we haven't found any space-alien transmissions yet!chadders wrote:Watersb profile said: "Where the hell is Socorro, New Mexico?" Its between Las Cruces and Albuquerque (home of Gentoo) and is a good place to see UFOs and planets and star parties! I want to come!
Chad

Not quite... I suggest that you compile the cryptoloop drivers as part of the kernel -- not as modules -- with the 2.6.0 kernel this is available. You still need some way to tell init to decrypt the root filesystem at boot-time, that is what the initrd is for.sethrab wrote:An earlier post (contigab) made the comment that similar results can be achieved using modules taken from the cryptoloop package. If the similar result is an encrypted "root" filesystem then additional work is needed. The kernel will not have access to the root file system to retrieve the encryption module untilt he encryption module is retrieved... a chicken and egg problem. This is the reason that an intermediate root (initrd=/dev/ram) is required to boot.
The problem with security is that it is hard to anticipate what should be hidden. If you can guarantee that your system is not "leaking" information, then by all means stick with an encrypted home. Just note that your /etc directory will be readable by anyone with physical access to your disk (if they steal a laptop, for example). Likewise /var/spool/mail and /var/cache/squid...Bersi wrote: Im just wondering. If one has a /home partition encrypted then WHY would one need to encrypt the root partition too? All your personal files are in the /home partition and the root filesystem keeps libs,binaries and docs. There is nothing to hide in the root partition?
Ok what's happening to my limited knowledge is that your scsi driver isn't getting loaded *duh* and because of that the root partition won't get mounted. Remember that laptops have scsi hard drives mostly. Then after the initrd is finished you end up with the kernel panic and blinking keyboard because it doesn't have anything to boot.rwar wrote:hi all, ive also got a problem.
encrypting worked, and i can mount and unmount the partition manually from knoppix, but booting does not work.
i built the utils, the loop module, initrd, configured it all (devfs=1 etc), the modules and some libs are on /boot, but when i boot i get virtually no errors except a kernel panic? i get one error that is a insmod scsi error but i believe thats pcmcia related.
also, since the kernel panics i cant scroll up to read more, and since the fs is encrypted its not logging it, how can i read the rest of my debug msgs (to see if initrd and the loop module are even being loaded, i dont see them when its scrolling by, but then again it scrolls by really fast :O)? cant login and use dmesg, its not logged in the first place, rebooting with knoppix and using dmesg of course shows knoppix's messages
i tried passing rootfilesystem=minix to the kernel but to no avail.
(side question: what does init=/linuxrc do?)
anyway this is whats left on the screen everything else looks normal
kmod: failed to exec /sbin/modprobe -s -k scsi_hostadapter errno = 2
NET4: Unix domain sockets 1.0/SMP for Linux NET4.0.
spurious 8259A interrupt: IRQ7
Yenta IRQ list 04b8
spurious 8259A interrupt: IRQ7
Yenta IRQ list 04b8
Kernel panic: VFS: Unable to mount root fs on 01:00
is this from the ramdisk or from the actual root fs? /dev/loop5 from fstab in this case
one thing, im using 2.4.20-ck6, i have the kernel modules configured right but im wondering if theres a patch thats causing trouble?
Well be careful with that. The passphrase to get into your encrypted filesystem can be ordered from you by the courts. Don't give it up? You'll be in contempt and go to jail.TenPin wrote:I've always thought having an encrypted root fs would be really thrifty. If for whatever reason the law confiscates your machine then you can be quite smug knowing it would be near impossible for them to retrieve anything.
No. Just plead the Fifth. Unless you've actually got the key written down somewhere, they can't ask you to reveal it yourself, as you can't subpoena thought. Of course, I don't think it'll come up.Well be careful with that. The passphrase to get into your encrypted filesystem can be ordered from you by the courts. Don't give it up? You'll be in contempt and go to jail.

Code: Select all
"Unmounting filesystems... [OK]"
"Remounting remaining filesystems readonly... [!!]"Code: Select all
/sbin/rc: line 1: /proc/cmdline: No such file or directory
Give root password for maintenance
(or type Control-D for normal startup):Code: Select all
none /proc proc rw 0 0 
Subject: Request for comments on "Disk Encryption HOWTO"
Date: 14 Aug 2003 01:24:42 -0700
From: David Braun
To: linux-crypto@nl.linux.org
I wanted to encrypt my whole hard disk and looked for a method to do
so. I found methods close to this goal but not quite achieving it so I
made my own method and wrote it up.
I've included it in a new "Disk Encryption HOWTO", intended to supersede
the existing "Loopback Encrypted Filesystem HOWTO" [1]. Please read it
and provide me with criticism, suggestions, and other feedback. Here
are some things I'm looking for:
* Sanity check. Does it make sense? Am I way off base?
* Smoke test. Does the procedure work for you?
* Weakness. Could the security be improved in a practical way?
* Readability. Do you understand it easily?
The document is here:
http://mica.nfshost.com/HOWTO/Disk-Encryption/
David Braun
[1] http://www.tldp.org/HOWTO/Loopback-Encr ... HOWTO.html
-
Linux-crypto: cryptography in and on the Linux system
Archive: http://mail.nl.linux.org/linux-crypto/

Yep, but it isn't as bad as it sounds. Good crypto uses CBC mode (cipher block chaining) and not ECB mode (electronic code book) AND USES INITIAL VECTORS. So its LOTS harder to break because EVERY BLOCK has its own key. That means you can't make a table of ciphertext that corresponds to plaintext even if you know what the plaintext is. A real good book is Applied Cryptography. If you go to sci.crypt news group and to http://www.counterpane.com there is lots of stuff about known plain text attacks, differential attacks, and other cool stuff.xi wrote:How can disk encryption be safe ?
Let's assume someone wants to break the encryption, he has several places to start.
He knows what kind of operating system and filesystem you use, so he is able to search for filesystem structures (probably he even knows the position of certain information) and for directories like /etc /bin /sbin and so on.
By checking /boot he can find out what kernel version you run and by getting the sources of this version he gets another 200megs (!) of plaintext data to search for.