<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 'dm-crypt' - How can I be sure that data is encrypted ? in Operating System - Linux</title>
    <link>https://community.hpe.com/t5/operating-system-linux/dm-crypt-how-can-i-be-sure-that-data-is-encrypted/m-p/4401811#M36111</link>
    <description>Shalom,&lt;BR /&gt;&lt;BR /&gt;I would try various methods to read the data, including dd, mount/umount, and some typical tools.&lt;BR /&gt;&lt;BR /&gt;If you are very concerned, you can try some tools that use cracklib to crack the passphrase on the data.&lt;BR /&gt;&lt;BR /&gt;But if the data looks like garbage in clear text, its encrypted. The issue to test is whether the pass phrase is something that can be broken.&lt;BR /&gt;&lt;BR /&gt;In an ideal world, I'd devote a system to trying to crack such things to insure data safety.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
    <pubDate>Thu, 16 Apr 2009 12:06:26 GMT</pubDate>
    <dc:creator>Steven E. Protter</dc:creator>
    <dc:date>2009-04-16T12:06:26Z</dc:date>
    <item>
      <title>'dm-crypt' - How can I be sure that data is encrypted ?</title>
      <link>https://community.hpe.com/t5/operating-system-linux/dm-crypt-how-can-i-be-sure-that-data-is-encrypted/m-p/4401808#M36108</link>
      <description>followed the &lt;A href="http://www.saout.de/misc/dm-crypt/" target="_blank"&gt;http://www.saout.de/misc/dm-crypt/&lt;/A&gt;&lt;BR /&gt;to encrypt file system(/dev/sda6)&lt;BR /&gt;&lt;BR /&gt;I did the following&lt;BR /&gt;&lt;BR /&gt;# echo 0 `blockdev --getsize /dev/sda6` crypt aes-plain&lt;BR /&gt;0123456789abcdef0123456789abcdef 0 /dev/sda6 0 | dmsetup create volume0&lt;BR /&gt;&lt;BR /&gt;# mkfs.reiserfs /dev/mapper/volume0&lt;BR /&gt;# mount /dev/mapper/volume0 /mnt&lt;BR /&gt;# mount |grep volume0&lt;BR /&gt;/dev/mapper/volume0 on /mnt type reiserfs (rw)&lt;BR /&gt;&lt;BR /&gt;Now how can I verify that its(encryption) working fine or not ? &lt;BR /&gt;&lt;BR /&gt;I unmount and mount the /dev/mapper/volume0 several times, but it never&lt;BR /&gt;ask me to provide the cipher. &lt;BR /&gt;&lt;BR /&gt;How can I be sure(test/verify) that my data is safe/encrypted ?&lt;BR /&gt;&lt;BR /&gt;Regards&lt;BR /&gt;</description>
      <pubDate>Thu, 16 Apr 2009 06:31:05 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/dm-crypt-how-can-i-be-sure-that-data-is-encrypted/m-p/4401808#M36108</guid>
      <dc:creator>Maaz</dc:creator>
      <dc:date>2009-04-16T06:31:05Z</dc:date>
    </item>
    <item>
      <title>Re: 'dm-crypt' - How can I be sure that data is encrypted ?</title>
      <link>https://community.hpe.com/t5/operating-system-linux/dm-crypt-how-can-i-be-sure-that-data-is-encrypted/m-p/4401809#M36109</link>
      <description>Unmounting and re-mounting the /dev/mapper/volume0 won't cause the pass-phrase to be requested. &lt;BR /&gt;&lt;BR /&gt;Do this instead:&lt;BR /&gt;# umount /dev/mapper/volume0&lt;BR /&gt;# dmsetup remove volume0&lt;BR /&gt;&lt;BR /&gt;Now your encrypted device is shut down and all information about the pass-phrase is removed from system memory. &lt;BR /&gt;&lt;BR /&gt;To re-start your encrypted device:&lt;BR /&gt;# echo 0 `blockdev --getsize /dev/sda6` crypt aes-plain&lt;BR /&gt;0123456789abcdef0123456789abcdef 0 /dev/sda6 0 | dmsetup load volume0&lt;BR /&gt;&lt;BR /&gt;# mount /dev/mapper/volume0 /mnt&lt;BR /&gt;&lt;BR /&gt;To verify your data is encrypted, try to use some data recovery tools on /dev/sda6. I don't think you'll find any useful plaintext, unless you used /dev/sda6 as an unencrypted partition before setting up the encryption.&lt;BR /&gt;&lt;BR /&gt;When setting up an encrypted partition, you should fill the partition with random data as the very first step, before "dmsetup create". This ensures no unencrypted data will remain, and makes it impossible to identify which parts of the encrypted partition have actually been used.&lt;BR /&gt;&lt;BR /&gt;(A property of a good encryption algorithm is that the encrypted data resembles random noise unless you decrypt it with a correct key.)&lt;BR /&gt;&lt;BR /&gt;For example:&lt;BR /&gt;dd if=/dev/urandom of=/dev/sda6 bs=16384&lt;BR /&gt;(Note: this will *destroy* any existing data on /dev/sda6. It will also take a long time.)&lt;BR /&gt;&lt;BR /&gt;MK</description>
      <pubDate>Thu, 16 Apr 2009 06:58:20 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/dm-crypt-how-can-i-be-sure-that-data-is-encrypted/m-p/4401809#M36109</guid>
      <dc:creator>Matti_Kurkela</dc:creator>
      <dc:date>2009-04-16T06:58:20Z</dc:date>
    </item>
    <item>
      <title>Re: 'dm-crypt' - How can I be sure that data is encrypted ?</title>
      <link>https://community.hpe.com/t5/operating-system-linux/dm-crypt-how-can-i-be-sure-that-data-is-encrypted/m-p/4401810#M36110</link>
      <description>excellent help Matti Kurkela&lt;BR /&gt;&lt;BR /&gt;thanks&lt;BR /&gt;Regards&lt;BR /&gt;Maaz</description>
      <pubDate>Thu, 16 Apr 2009 10:30:11 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/dm-crypt-how-can-i-be-sure-that-data-is-encrypted/m-p/4401810#M36110</guid>
      <dc:creator>Maaz</dc:creator>
      <dc:date>2009-04-16T10:30:11Z</dc:date>
    </item>
    <item>
      <title>Re: 'dm-crypt' - How can I be sure that data is encrypted ?</title>
      <link>https://community.hpe.com/t5/operating-system-linux/dm-crypt-how-can-i-be-sure-that-data-is-encrypted/m-p/4401811#M36111</link>
      <description>Shalom,&lt;BR /&gt;&lt;BR /&gt;I would try various methods to read the data, including dd, mount/umount, and some typical tools.&lt;BR /&gt;&lt;BR /&gt;If you are very concerned, you can try some tools that use cracklib to crack the passphrase on the data.&lt;BR /&gt;&lt;BR /&gt;But if the data looks like garbage in clear text, its encrypted. The issue to test is whether the pass phrase is something that can be broken.&lt;BR /&gt;&lt;BR /&gt;In an ideal world, I'd devote a system to trying to crack such things to insure data safety.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Thu, 16 Apr 2009 12:06:26 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/dm-crypt-how-can-i-be-sure-that-data-is-encrypted/m-p/4401811#M36111</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2009-04-16T12:06:26Z</dc:date>
    </item>
  </channel>
</rss>

