Anon wrote:
Markus Reichelt wrote:
I guess you really need experience with it :-) How hard can it be?
I am not stupid by any means or measure, and it can be difficult for a person who does not have
*all* the necessary information. Any process can be difficult to understand with important
information missing. I think it is important to realize we all start from the beginning, without
any prior knowldge on any subject of study, including encrypted filesystems. Nobody is born with
how to use loop-AES, or Linux, or even how to tie their shoes, encoded into their genes.
I did carefully RTFM several times, I did very carefully consider all the examples in
loop-AES.README, and I do understand how to use the "regular" loop device. Still, I never used a
*stack* of loop devices, and I still do not seem to understand how to stack the loops in the
context of using two encrypted loops under loop-AES. I invite you to fill in all the details if
you can.
losetup -e AES128 -K /root/secret1.gpg /dev/loop0 /dev/hda666
losetup -e AES128 -K /root/secret2.gpg /dev/loop1 /dev/loop0
mount /dev/loop1 /mnt
Bis denn
--
Real Programmers consider "what you see is what you get" to be just as
bad a concept in Text Editors as it is in women. No, the Real Programmer
wants a "you asked for it, you got it" text editor -- complicated,
cryptic, powerful, unforgiving, dangerous.
-
Linux-crypto: cryptography in and on the Linux system
Archive: http://mail.nl.linux.org/linux-crypto/