Jonas Meurer wrote: > At debian we already apply a simple patch which does exactly what you > suggested. It checks whether you are root, and exists with an error > otherwise: With 1.0.5 at least superfluous: $ cryptsetup luksOpen /dev/sdd2 fff mlockall failed: Cannot allocate memory WARNING!!! Possibly insecure memory. Are you root? Command failed: Can't get device information. $ cryptsetup create foo /dev/sdd2 mlockall failed: Cannot allocate memory WARNING!!! Possibly insecure memory. Are you root? Command failed: Failure to communicate with kernel device-mapper driver. $ sudo chown $USER /dev/sdd2 $ cryptsetup create foo /dev/sdd2 mlockall failed: Cannot allocate memory WARNING!!! Possibly insecure memory. Are you root? Command failed: Failure to communicate with kernel device-mapper driver. $ cryptsetup luksOpen /dev/sdd2 fff mlockall failed: Cannot allocate memory WARNING!!! Possibly insecure memory. Are you root? Enter LUKS passphrase: Command failed: Failed to setup dm-crypt key mapping. Check kernel for support for the aes-cbc-essiv:sha256 cipher spec and verify that /dev/sdd2 contains at least 133 sectors Also cryptsetup is installed in /sbin so normal users don't have that in their path anyways. cu Ludwig -- (o_ Ludwig Nussel //\ V_/_ http://www.suse.de/ SUSE LINUX Products GmbH, GF: Markus Rex, HRB 16746 (AG Nuernberg) --------------------------------------------------------------------- dm-crypt mailing list - http://www.saout.de/misc/dm-crypt/ To unsubscribe, e-mail: dm-crypt-unsubscribe@xxxxxxxx For additional commands, e-mail: dm-crypt-help@xxxxxxxx