mastodon.xyz is one of the many independent Mastodon servers you can use to participate in the fediverse.
A Mastodon instance, open to everyone, but mainly English and French speaking.

Administered by:

Server stats:

812
active users

#cryptsetup

0 posts0 participants0 posts today

My experience with #FlashDrives recently has been mixed. I have no problem in encrypting them with #LUKS, using #cryptsetup or with formatting a partition with #Btrfs, for instance, using #gparted and doing other tinkering with #Gnome #disks. But the problem has been with the actual drives themselves. The cheaper ones seem to have quite a few bad sectors, etc. and so they’re not really reliable for medium term storage.

1/2

Dear fellow #linux #cryptsetup users, I need your assistance while I'm trying to encrypt my root partition:

The Arch Linux wiki (wiki.archlinux.org/title/Dm-cr) has some guide to first unmount and then shrink the partition before reencryption, but then it has a header saying "cryptsetup 2.2 using LUKS2 supports online encryption/decryption/reencryption". Does that mean I can skip the unmount and resize, and just run the reencrypt command when the OS is still running on that partition?

wiki.archlinux.orgdm-crypt/Device encryption - ArchWiki

Quick guide on encrypting an external drive. Assuming the drive is at /dev/sda with a /dev/sda1 partition

Set up encrypted volume (-y for verifying the password)
# cryptsetup luksFormat -y -v /dev/sda1

Unlock the encrypted volume and create a mapping to /dev/mapper/DUDE
# cryptsetup luksOpen /dev/sda1 DUDE

Create a file system
# mkfs.ext4 /dev/mapper/DUDE

Mount the partition
# mkdir /mnt/DUDE
# mount /dev/mapper/DUDE /mnt/DUDE

Continued thread

Ok, some more info. Decided to do some basic #benchmark. Run #iperf3 on it. I was able to get gigabit against my desktop. No routing, I have just one network card. But I tried #veth interfaces and benchmarked throughput between two namespaces and got to 7 gigabits. #cryptsetup benchmarks just #aes-cbc and claims 40MiB/s for 128b and 30MiB/s for 256b which sounds like no accelerator is used and support for other ciphers might be missing from the kernel. Still using official firmware - no time to reinstall yet.

Has anyone succeeded yet in running a Guix System with grub on an encrypted btrfs partition with subvolumes?

guix system init seems to produce a sensible grub.cfg, which (after insmod of luks2) calls cryptomount, but after reboot, it doesn't even ask for the passphrase before complaining that the decrypted device doesn't exist and dropping to grub rescue.

#Guix#Linux#btrfs
Replied in thread

@campuscodi: A few notes and thoughts on CVE-2023-2283 in #libssh:

* libssh (libssh-4 in Debian and derivatives) ≠ libssh2 (libssh2-1 in Debian and derivatives)

* Obviously only servers using libssh to let users log in should be affected by any authentication bypass. Most libssh reverse dependencies though seem to be client-side applications.

The only potential libssh server-side reverse dependencies I found so far are:

* #cryptsetup-ssh
* #tmate-ssh-server
* maybe #cockpit-bridge