med-mastodon.com is one of the many independent Mastodon servers you can use to participate in the fediverse.
Medical community on Mastodon

Administered by:

Server stats:

339
active users

#cryptsetup

0 posts0 participants0 posts today
Khurram Wadee ✅<p>My experience with <a href="https://mastodon.org.uk/tags/FlashDrives" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FlashDrives</span></a> recently has been mixed. I have no problem in encrypting them with <a href="https://mastodon.org.uk/tags/LUKS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LUKS</span></a>, using <a href="https://mastodon.org.uk/tags/cryptsetup" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptsetup</span></a> or with formatting a partition with <a href="https://mastodon.org.uk/tags/Btrfs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Btrfs</span></a>, for instance, using <a href="https://mastodon.org.uk/tags/gparted" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gparted</span></a> and doing other tinkering with <a href="https://mastodon.org.uk/tags/Gnome" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Gnome</span></a> <a href="https://mastodon.org.uk/tags/disks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>disks</span></a>. But the problem has been with the actual drives themselves. The cheaper ones seem to have quite a few bad sectors, etc. and so they’re not really reliable for medium term storage.</p><p>1/2</p><p><a href="https://mastodon.org.uk/tags/Hardware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hardware</span></a> <a href="https://mastodon.org.uk/tags/StorageDevices" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>StorageDevices</span></a> <a href="https://mastodon.org.uk/tags/Unix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Unix</span></a> <a href="https://mastodon.org.uk/tags/GNU" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GNU</span></a> <a href="https://mastodon.org.uk/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://mastodon.org.uk/tags/Fedora" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Fedora</span></a></p>
13reak :fedora:<p>In case someone else is wondering why linux <code>luks</code> hard disk encryption is usually within a <code>lvm</code> container: that way you only need one password to unlock multiple partitions.</p><p>(found out the hard way)</p><p><a href="https://infosec.exchange/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://infosec.exchange/tags/cryptsetup" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptsetup</span></a> <a href="https://infosec.exchange/tags/harddisk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>harddisk</span></a> <a href="https://infosec.exchange/tags/encryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>encryption</span></a></p>
Khurram Wadee ✅<p>So today I tired <a href="https://mastodon.org.uk/tags/mkfs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mkfs</span></a>.btrfs and this works. I was using <a href="https://mastodon.org.uk/tags/gparted" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gparted</span></a>, which can’t create <a href="https://mastodon.org.uk/tags/encrypted" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>encrypted</span></a> file systems and so I created a blank (cleared) one, used <a href="https://mastodon.org.uk/tags/cryptsetup" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptsetup</span></a> to create the <a href="https://mastodon.org.uk/tags/encryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>encryption</span></a> on the device, and then created the brtrfs file system.</p><p><a href="https://mastodon.org.uk/tags/GNU" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GNU</span></a> <a href="https://mastodon.org.uk/tags/FreeSoftware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeSoftware</span></a></p>
Hraban (fiëé visuëlle)<p>Ich würde gerne vermeiden, das Passwort für die <a href="https://literatur.social/tags/Festplattenverschl%C3%BCsselung" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Festplattenverschlüsselung</span></a> meines <a href="https://literatur.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a>-Laptops jedes Mal eingeben zu müssen – meine Kinder sollen den auch benutzen können, ohne dass ich ihnen das Passwort sage.</p><p>Das müsste sich doch irgendwie auf ein Hardware-Token (USB-Stick oder SD-Karte) umstellen lassen? Wie am besten?</p><p><a href="https://literatur.social/tags/encryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>encryption</span></a> <a href="https://literatur.social/tags/cryptsetup" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptsetup</span></a></p>
scy @ WHY2025 (7299)<p>TIL: If you want to `cryptsetup open` a BitLocker encrypted drive using the recovery key (8 blocks of 6 digits each), make sure to enter it _with_ the dashes between each block of digits, else it won't be recognized.</p><p><a href="https://chaos.social/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://chaos.social/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> <a href="https://chaos.social/tags/BitLocker" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BitLocker</span></a> <a href="https://chaos.social/tags/cryptsetup" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptsetup</span></a></p>
Stuart Longland (VK4MSL)<p>Had fun and games trying to unmount my work volume (a LUKS loopback device) today… `cryptsetup` telling me the device was in-use. (But it wasn't!)</p><p>As it happens, kernel namespaces can make things appear to be "in use" when they are not, and Gentoo's Portage uses namespaces to isolate the build process from the host system. Kill the build, and you'll be able to unmount and de-activate the encrypted volume.</p><p><a href="https://forums.gentoo.org/viewtopic-p-8479896.html?sid=fc640855d942c63b54512d9d7f4e8285#8479896" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">forums.gentoo.org/viewtopic-p-</span><span class="invisible">8479896.html?sid=fc640855d942c63b54512d9d7f4e8285#8479896</span></a></p><p><a href="https://mastodon.longlandclan.id.au/tags/Gentoo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Gentoo</span></a> <a href="https://mastodon.longlandclan.id.au/tags/LUKS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LUKS</span></a> <a href="https://mastodon.longlandclan.id.au/tags/cryptsetup" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptsetup</span></a> <a href="https://mastodon.longlandclan.id.au/tags/namespaces" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>namespaces</span></a></p>
Lucas Werkmeister<p>hey neat, Linux 6.10 improved disk encryption performance on my system by ~42% <a href="https://gist.github.com/lucaswerkmeister/965d312193362ccfea6378006ce8cb81" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gist.github.com/lucaswerkmeist</span><span class="invisible">er/965d312193362ccfea6378006ce8cb81</span></a></p><p><a href="https://wikis.world/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://wikis.world/tags/cryptsetup" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptsetup</span></a></p>
rtn<p>Quick guide on encrypting an external drive. Assuming the drive is at /dev/sda with a /dev/sda1 partition</p><p>Set up encrypted volume (-y for verifying the password)<br># cryptsetup luksFormat -y -v /dev/sda1</p><p>Unlock the encrypted volume and create a mapping to /dev/mapper/DUDE<br># cryptsetup luksOpen /dev/sda1 DUDE</p><p>Create a file system<br># mkfs.ext4 /dev/mapper/DUDE</p><p>Mount the partition<br># mkdir /mnt/DUDE<br># mount /dev/mapper/DUDE /mnt/DUDE</p><p><a href="https://chaos.social/tags/cryptsetup" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptsetup</span></a> <a href="https://chaos.social/tags/FDE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FDE</span></a></p>
ricardo :mastodon:<p><a href="https://fosstodon.org/tags/Cryptsetup" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cryptsetup</span></a> 2.7.0 Unveils Advanced <a href="https://fosstodon.org/tags/OPAL" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OPAL</span></a> Hardware Encryption Support</p><p><a href="https://linuxiac.com/cryptsetup-2-7-0-unveils-advanced-opal-hardware-encryption-support/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">linuxiac.com/cryptsetup-2-7-0-</span><span class="invisible">unveils-advanced-opal-hardware-encryption-support/</span></a></p>
Svante<p>Has anyone succeeded yet in running a Guix System with grub on an encrypted btrfs partition with subvolumes?</p><p>guix system init seems to produce a sensible grub.cfg, which (after insmod of luks2) calls cryptomount, but after reboot, it doesn't even ask for the passphrase before complaining that the decrypted device doesn't exist and dropping to grub rescue.</p><p><a href="https://mastodon.xyz/tags/Guix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Guix</span></a> <a href="https://mastodon.xyz/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://mastodon.xyz/tags/btrfs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>btrfs</span></a> <a href="https://mastodon.xyz/tags/cryptsetup" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptsetup</span></a> <a href="https://mastodon.xyz/tags/grub" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>grub</span></a></p>
Axel ⌨🐧🐪🚴😷 | R.I.P Natenom<p><span class="h-card"><a href="https://mastodon.social/@campuscodi" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>campuscodi</span></a></span>: A few notes and thoughts on CVE-2023-2283 in <a href="https://chaos.social/tags/libssh" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>libssh</span></a>: </p><p>* libssh (libssh-4 in Debian and derivatives) ≠ libssh2 (libssh2-1 in Debian and derivatives)</p><p>* Obviously only servers using libssh to let users log in should be affected by any authentication bypass. Most libssh reverse dependencies though seem to be client-side applications.</p><p>The only potential libssh server-side reverse dependencies I found so far are:</p><p>* <a href="https://chaos.social/tags/cryptsetup" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptsetup</span></a>-ssh<br>* <a href="https://chaos.social/tags/tmate" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tmate</span></a>-ssh-server<br>* maybe <a href="https://chaos.social/tags/cockpit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cockpit</span></a>-bridge</p>
Keywan Tonekaboni<p>LUKS: Alte verschlüsselte Container unsicher? Ein Ratgeber für Updates</p><p>Angeblich konnte die französische Polizei einen LUKS-Container knacken. Kein Grund zur Panik, aber ein Anlass, Passwörter und LUKS-Parameter zu hinterfragen.</p><p><a href="https://www.heise.de/news/Alte-LUKS-Container-unsicher-Ein-kleiner-Update-Ratgeber-8981054.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Alte-LUKS-Contai</span><span class="invisible">ner-unsicher-Ein-kleiner-Update-Ratgeber-8981054.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege</span></a> </p><p><a href="https://social.heise.de/tags/Argon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Argon</span></a> <a href="https://social.heise.de/tags/LUKS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LUKS</span></a> <a href="https://social.heise.de/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://social.heise.de/tags/PBKDF2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PBKDF2</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Verschl%C3%BCsselung" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Verschlüsselung</span></a> <a href="https://social.heise.de/tags/cryptsetup" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptsetup</span></a></p>