Hello Jari, i did some tests to verify my gpg keyfile, the password and everything around loop-aes. Have a look: ---cut--- merkur:~# cat /etc/fstab # /etc/fstab: static file system information. # # <file system> <mount point> <type> <options> <dump> <pass> proc /proc proc defaults 0 0 /dev/hda6 / reiserfs defaults 0 1 /dev/hda1 /boot reiserfs notail 0 2 #/dev/hda8 none swap sw 0 0 /dev/hda8 none swap sw,loop=/dev/loop1,encryption=AES256 0 0 /dev/hdc /media/cdrom0 iso9660 ro,user,noauto 0 0 # /dev/hda7 /mnt reiserfs defaults,noauto,loop=/dev/loop0,encryption=AES256,gpgkey=/boot/rootkey.gpg 0 0 /dev/hdb1 /mnt reiserfs defaults,noauto,loop=/dev/loop3,encryption=AES256,gpgkey=/root/keyfile.gpg 0 0 merkur:~# mount /dev/hda7 Password: merkur:~# losetup -a /dev/loop0: [0306]:3165 (/dev/hda7) encryption=AES256 multi-key /dev/loop1: [0306]:3166 (/dev/hda8) offset=4096 encryption=AES256 multi-key merkur:~# mount /dev/hda6 on / type reiserfs (rw) proc on /proc type proc (rw) sysfs on /sys type sysfs (rw) devpts on /dev/pts type devpts (rw,gid=5,mode=620) tmpfs on /dev/shm type tmpfs (rw) /dev/hda1 on /boot type reiserfs (rw,notail) /dev/hda7 on /mnt type reiserfs (rw,loop=/dev/loop0,gpgkey=/boot/rootkey.gpg,encryption=AES256) merkur:~# ls /mnt bin cdrom etc initrd lib media opt root srv tmp var boot dev home initrd.img lib64 mnt proc sbin sys usr vmlinuz merkur:~# umount /mnt merkur:~# ---cut--- Michael - Linux-crypto: cryptography in and on the Linux system Archive: http://mail.nl.linux.org/linux-crypto/