[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Loopback file system encryption with kernel-source-2.4.19?

On Thu, 2002-12-26 at 05:26, Jack O'Quin wrote:

>   sudo losetup -e blowfish /dev/loop0 ~/.crypto
>   Available keysizes (bits): 128 160 192 256 
>   Keysize: 256
>   Password :xxxxxxxxxxxxx
>   Password :xxxxxxxxxxxxx
>   The cipher does not exist, or a cipher module needs to be loaded into the kernel
>   ioctl: LOOP_SET_STATUS: Invalid argument
After you recompile your kernel with encryption support, you might want
to use this line in '/etc/fstab' instead of using sudo:
"/home/haim/.crypto      /home/haim/crypto       ext2   
defaults,exec,noauto,loop,encryption=AES128,user,exec 0 0"
ofcourse it should be in one line. remember also to put "exec" after
"user" if you want to be able to run executeables from this file system.

see http://encryptionhowto.sourceforge.net/Encryption-HOWTO.html


Reply to: