Jari Ruusu wrote:
Plan A: Try using 64 line key file
# gpg --decrypt </home/keyfile.gpg | head -n 64 | \
( sleep 60 ; gpg -a --symmetric >/home/keyfile64.gpg )
And then try it with /home/keyfile64.gpg key file
Plan B: Try using 1 line key file
# gpg --decrypt </home/keyfile.gpg | head -n 1 | \
( sleep 60 ; gpg -a --symmetric >/home/keyfile1.gpg )
And then try it with /home/keyfile1.gpg key file
Plan C: Try using old /bin/mount program from FC3.
Plan D: Try adding one of these mount options to /etc/fstab
phash=rmd160
phash=unhashed2
THANKS ! :}
I've tried Plan A: & Plan B:
Plan B:
Generated key was short
and when i tried to mount with it error was the same as with 'master' key.
236 keyfile1.gpg
4221 keyfile64.gpg
4284 keyfily.gpg
Plan A:" Was FULL SUCCESS !
# gpg --decrypt </home/keyfile.gpg | head -n 64 | ( sleep 60 ; gpg -a
--symmetric >/home/keyfile64.gpg )
gpg: CAST5 encrypted data
gpg: encrypted with 1 passphrase
gpg: WARNING: message was not integrity protected
-- fstab --
/dev/hda4 /mnt/szyfr/ ext2
defaults,noauto,user,loop=/dev/loop0,encryption=AES128,gpgkey=/home/keyfile64.gpg
0
---------
# mount /mnt/szyfr/
# df -h /mnt/szyfr/
Filesystem Size Mounted on
/dev/hda4 153G /mnt/szyfr/
:}
So what just happened ?
I have to use keyfile64.gpg now and in the future ?
thanks again for help
vr
-
Linux-crypto: cryptography in and on the Linux system
Archive: http://mail.nl.linux.org/linux-crypto/