Re: Re: change from fixed LUKS w/password to random encryption

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 19/02/2009 Ross Boylan wrote:
> On Fri, 2009-02-20 at 01:11 +0000, Lurkos wrote:
> > I will follow these steps:
> > 1) umount swap with
> > # swapoff /dev/mapper/hda5_crypt
> > 2) close partion
> > # cryptsetup luksClose hda5_crypt
> > 3) modify /etc/crypttab
> > hda5_crypt /dev/hda5 /dev/random
> > cipher=cipher=aes-cbc-essiv:sha256,size=128,swap
> > (single line!)
> > 4) modify /etc/fstab
> > /dev/mapper/hda5_crypt none swap sw 0 0
> > 5) reboot
> Thanks for your reply.  Does this mean that swapon at step 5 is a bad
> idea?  Don't I need to regenerate initrd's before booting?

It's perfectly safe to do swapon as step 5 instead of reboot. you don't
need to reboot at all.

and no, you don't need to regenerate the initrd. information about
encrypted disks in initramfs is only required for encrypted rootfs and
for suspend/resume functions. but suspend/resume doesn't work anyway in
conjunction with random key for encrypted swap.

greetings,
 jonas

---------------------------------------------------------------------
dm-crypt mailing list - http://www.saout.de/misc/dm-crypt/
To unsubscribe, e-mail: dm-crypt-unsubscribe@xxxxxxxx
For additional commands, e-mail: dm-crypt-help@xxxxxxxx


[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux