[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: cryptoloop as user?



Yes, you scould check cfs, I use that too and I'm able to crypt a selected
folder.

/ernst


On Fri, 13 Dec 2002, Geoff Crompton wrote:

>   Is there away to set a directory to be crypted? Rather than creating a
> file to hold a filesystem and then crypting that? That way, any access
> of the directory would render unusefull information (or just deny
> access), until it was mounted (or unlocked in some fashion) by the
> password.
>   Cheers
>   Geoff
>
> On Thu, Dec 12, 2002 at 09:01:34PM +0100, ernst wrote:
> >
> > Nop, can't do.
> >
> > I have an crypted fil created with 'dd' and ciper blowfish. this file is
> > mounted at loop0.
> >
> > when I mount with the 'mount' command, debian understand that this is my
> > /folder/cryptfile.
> >
> > when I try to do this in fstab, it doesn't understand that loop0 is
> > cryptfile or vice versa, so it need to know about them bouth. and that's
> > where my problem is, how to put 'cryptfile' 'loop0' and mountpoint in
> > fstab so that debian understands it, and with the right permission.
> >
> > so what I did was that I just created a couple of scripts, one that mounts
> > and set the right permission, and one that umount and detach the loop
> > device, this is working fine.
> >
> > the odd thing was when I tryed your solution, it didn't even give me an
> > error:)
> >
> > thanks anyway
> >
> > /ernst
> >
> >
> >
> > On 11 Dec 2002, Matthias Hentges wrote:
> >
> > > Am Die, 2002-12-10 um 16.20 schrieb Rob Weir:
> > > > On Mon, Dec 09, 2002 at 07:15:08PM +0100, ernst wrote:
> > > > > Hi
> > > > >
> > > > > I'm useing cryptoloop to protect my data on a ibmx20 laptop. Im running
> > > > > 2.4.19 kernel with the cryptoloop and cryptoapi modules innstalled.
> > > > >
> > > > > As root, I have created a file with dd, used blowfish as cipher and
> > > > > mounted it trough loop0, so far so good.
> > > > >
> > > > > But I am wondering if there is an easyer way to du this, I would like to
> > > > > do this in bootup, as user.
> > > > >
> > > > > The way I'm doint it now is (as root):
> > > > > losetup -e blowfish -k 128 /dev/loop0 /usr/tmp/my_crypt_file
> > > > > mount /dev/loop0 /home/ernst/mnt/my_crypt_file
> > > > > chown -R ernst:users /home/ernst/mnt/crypt
> > > > >
> > > > > Then I'm there, I can work on my docs as a user, but I'm wondering if
> > > > > there is an easyer way of soing it?
> > > > >
> > > > > To release this again I'm doing :
> > > > > umount /dev/loop0
> > > > > losetup -d /dev/loop0
> > > >
> > > > There isn't really any way to delegate this sort of authority under
> > > > Linux at the moment,
> > >
> > > Yes there is. Edit your fstab and you are done.
> > >
> > > /home/$USER/crypto0     /some/dir       reiserfs           \
> > > defaults,noauto,loop,encryption=twofish,user    0 0
> > >
> > > [...]
> > >
> > > --
> > >
> > > Matthias Hentges
> > > [www.hentges.net] -> PGP + HTML are welcome
> > > ICQ: 97 26 97 4   -> No files, no URLs
> > >
> > > My OS: Debian Woody: Geek by Nature, Linux by Choice
> > >
> > >
> > >
> > > --
> > > To UNSUBSCRIBE, email to debian-user-request@lists.debian.org
> > > with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
> > >
> > >
> >
> >
> > --
> > To UNSUBSCRIBE, email to debian-user-request@lists.debian.org
> > with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
> >
>
>
> --
> To UNSUBSCRIBE, email to debian-user-request@lists.debian.org
> with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
>
>



Reply to: