On Tue, 12 Dec 2017 09:40:14 -0500 "Wells, Roger K." <wellsr@xxxxxxxxxx> wrote: > I have existing systems with un-encrypted disks. > I have tried unsuccessfully to encrypt them using LUKS. > Has anyone out there been able to encrypt an existing system (after > the fact, so to speak)? I have found some ideas of how to do it, but IIRC they all include making a backup beforehand - which means - for the sake of keeping things as simple as possible - if it's important anyways to make a backup, I find it better to make that backup first, and then starting the disk encryption all over again ... For example, I at least rather certainly wouldn't try the solution described here: http://asalor.blogspot.de/2012/08/re-encryption-of-luks-device-cryptsetup.html and instead stick with the LUKS FAQ: ----------- * 2.5 Can I encrypt an already existing, non-empty partition to use LUKS? There is no converter, and it is not really needed. The way to do this is to make a backup of the device in question, securely wipe the device (as LUKS device initialization does not clear away old data), do a luksFormat, optionally overwrite the encrypted device, create a new filesystem and restore your backup on the now encrypted device. Also refer to sections "Security Aspects" and "Backup and Data Recovery". For backup, plain GNU tar works well and backs up anything likely to be in a filesystem. ----------- Sorry. Regards, Wolfgang _______________________________________________ users mailing list -- users@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe send an email to users-leave@xxxxxxxxxxxxxxxxxxxxxxx