[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Make fully encrypted disk without LVM during install



Hi Jon,

> The system on which you might want to read the disk will need to know
> how to decrypt it.  Do you anticipate hot-plugging it to a running
> machine, or trying to boot from it?

In this situation I will have a disk which is used to boot one machine, but 
does contain data that will be needed on another machine. That machine will 
definitely not use this disk to boot from, but just as a data disk.

I know I could move the data around as an encrypted archive, but my customer 
wants a solution where the data is only stored on one disk. And yes, they are 
aware of the potential risks that brings with it. Still, that's how the want 
it.

> The convenience-partitioning-scheme offered by d-i which uses LVM and
> encryption also creates a non-encrypted, non-LVM /boot partition, within
> which the kernel and initramfs are stored. These are set up to
> understand how to interpret both the encryption and LVM.  I'm having
> trouble seeing why LVM would be much more pain than encryption already
> brings you, from a portable POV. (I suppose it's one fewer command to
> type!)

Ever tried to put a fully encrypted disk with LVM in another machine, without 
booting from it? If you boot from it there's almost no hassle at all. I know 
it is possible to mount such a disk. I've used the scenario described at 
http://canonical.org/~kragen/crypted-disk.html often enough. However, for this 
sitation I need something a bit more userfriendly. Preferably a scenario where 
my customer only needs to enter his password when mounting. That's why I 
thought of leaving LVM out of the picture altogether. In this situation it has 
no purpose at all, so why use it then?

Thanks for trying to help.

Grx HdV


Reply to: