Re: Loopback file system encryption with kernel-source-2.4.19?
On Thu, 2002-12-26 at 05:26, Jack O'Quin wrote:
>
> sudo losetup -e blowfish /dev/loop0 ~/.crypto
> Available keysizes (bits): 128 160 192 256
> Keysize: 256
> Password :xxxxxxxxxxxxx
>
> Password :xxxxxxxxxxxxx
>
> The cipher does not exist, or a cipher module needs to be loaded into the kernel
> ioctl: LOOP_SET_STATUS: Invalid argument
>
After you recompile your kernel with encryption support, you might want
to use this line in '/etc/fstab' instead of using sudo:
"/home/haim/.crypto /home/haim/crypto ext2
defaults,exec,noauto,loop,encryption=AES128,user,exec 0 0"
ofcourse it should be in one line. remember also to put "exec" after
"user" if you want to be able to run executeables from this file system.
see http://encryptionhowto.sourceforge.net/Encryption-HOWTO.html
Bye
--
Haim
Reply to: