Re: loop-Aes mount problem HELP ;\

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Jari Ruusu wrote:
Plan A: Try using 64 line key file

    # gpg --decrypt </home/keyfile.gpg | head -n 64 | \
        ( sleep 60 ; gpg -a --symmetric >/home/keyfile64.gpg )

    And then try it with /home/keyfile64.gpg key file

Plan B: Try using 1 line key file

    # gpg --decrypt </home/keyfile.gpg | head -n 1 | \
        ( sleep 60 ; gpg -a --symmetric >/home/keyfile1.gpg )

    And then try it with /home/keyfile1.gpg key file

Plan C: Try using old /bin/mount program from FC3.

Plan D: Try adding one of these mount options to /etc/fstab

    phash=rmd160
    phash=unhashed2
THANKS ! :}
I've tried Plan A: & Plan B:

Plan B:
Generated key was short
and when i tried to mount with it error was the same as  with 'master' key.

  236  keyfile1.gpg
  4221 keyfile64.gpg
  4284 keyfily.gpg



Plan A:" Was FULL SUCCESS !

# gpg --decrypt </home/keyfile.gpg | head -n 64 | ( sleep 60 ; gpg -a --symmetric >/home/keyfile64.gpg )
gpg: CAST5 encrypted data
gpg: encrypted with 1 passphrase
gpg: WARNING: message was not integrity protected

-- fstab --
/dev/hda4 /mnt/szyfr/ ext2 defaults,noauto,user,loop=/dev/loop0,encryption=AES128,gpgkey=/home/keyfile64.gpg 0
---------
#  mount /mnt/szyfr/
# df -h /mnt/szyfr/

Filesystem   Size   Mounted on
/dev/hda4   153G  /mnt/szyfr/

:}
So what just happened ?
I have to use  keyfile64.gpg  now and in the future ?

thanks again for help
vr





-
Linux-crypto:  cryptography in and on the Linux system
Archive:       http://mail.nl.linux.org/linux-crypto/


[Index of Archives]     [Kernel]     [Linux Crypto]     [Gnu Crypto]     [Gnu Classpath]     [Netfilter]     [Bugtraq]
  Powered by Linux