- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - Linux
- >
- Re: 'dm-crypt' - How can I be sure that data is en...
Operating System - Linux
1752678
Members
5754
Online
108789
Solutions
Forums
Categories
Company
Local Language
юдл
back
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Discussions
Discussions
Forums
Forums
Discussions
юдл
back
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Blogs
Information
Community
Resources
Community Language
Language
Forums
Blogs
Go to solution
Topic Options
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО04-15-2009 11:31 PM
тАО04-15-2009 11:31 PM
followed the http://www.saout.de/misc/dm-crypt/
to encrypt file system(/dev/sda6)
I did the following
# echo 0 `blockdev --getsize /dev/sda6` crypt aes-plain
0123456789abcdef0123456789abcdef 0 /dev/sda6 0 | dmsetup create volume0
# mkfs.reiserfs /dev/mapper/volume0
# mount /dev/mapper/volume0 /mnt
# mount |grep volume0
/dev/mapper/volume0 on /mnt type reiserfs (rw)
Now how can I verify that its(encryption) working fine or not ?
I unmount and mount the /dev/mapper/volume0 several times, but it never
ask me to provide the cipher.
How can I be sure(test/verify) that my data is safe/encrypted ?
Regards
to encrypt file system(/dev/sda6)
I did the following
# echo 0 `blockdev --getsize /dev/sda6` crypt aes-plain
0123456789abcdef0123456789abcdef 0 /dev/sda6 0 | dmsetup create volume0
# mkfs.reiserfs /dev/mapper/volume0
# mount /dev/mapper/volume0 /mnt
# mount |grep volume0
/dev/mapper/volume0 on /mnt type reiserfs (rw)
Now how can I verify that its(encryption) working fine or not ?
I unmount and mount the /dev/mapper/volume0 several times, but it never
ask me to provide the cipher.
How can I be sure(test/verify) that my data is safe/encrypted ?
Regards
Solved! Go to Solution.
3 REPLIES 3
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО04-15-2009 11:58 PM
тАО04-15-2009 11:58 PM
Solution
Unmounting and re-mounting the /dev/mapper/volume0 won't cause the pass-phrase to be requested.
Do this instead:
# umount /dev/mapper/volume0
# dmsetup remove volume0
Now your encrypted device is shut down and all information about the pass-phrase is removed from system memory.
To re-start your encrypted device:
# echo 0 `blockdev --getsize /dev/sda6` crypt aes-plain
0123456789abcdef0123456789abcdef 0 /dev/sda6 0 | dmsetup load volume0
# mount /dev/mapper/volume0 /mnt
To verify your data is encrypted, try to use some data recovery tools on /dev/sda6. I don't think you'll find any useful plaintext, unless you used /dev/sda6 as an unencrypted partition before setting up the encryption.
When setting up an encrypted partition, you should fill the partition with random data as the very first step, before "dmsetup create". This ensures no unencrypted data will remain, and makes it impossible to identify which parts of the encrypted partition have actually been used.
(A property of a good encryption algorithm is that the encrypted data resembles random noise unless you decrypt it with a correct key.)
For example:
dd if=/dev/urandom of=/dev/sda6 bs=16384
(Note: this will *destroy* any existing data on /dev/sda6. It will also take a long time.)
MK
Do this instead:
# umount /dev/mapper/volume0
# dmsetup remove volume0
Now your encrypted device is shut down and all information about the pass-phrase is removed from system memory.
To re-start your encrypted device:
# echo 0 `blockdev --getsize /dev/sda6` crypt aes-plain
0123456789abcdef0123456789abcdef 0 /dev/sda6 0 | dmsetup load volume0
# mount /dev/mapper/volume0 /mnt
To verify your data is encrypted, try to use some data recovery tools on /dev/sda6. I don't think you'll find any useful plaintext, unless you used /dev/sda6 as an unencrypted partition before setting up the encryption.
When setting up an encrypted partition, you should fill the partition with random data as the very first step, before "dmsetup create". This ensures no unencrypted data will remain, and makes it impossible to identify which parts of the encrypted partition have actually been used.
(A property of a good encryption algorithm is that the encrypted data resembles random noise unless you decrypt it with a correct key.)
For example:
dd if=/dev/urandom of=/dev/sda6 bs=16384
(Note: this will *destroy* any existing data on /dev/sda6. It will also take a long time.)
MK
MK
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО04-16-2009 03:30 AM
тАО04-16-2009 03:30 AM
Re: 'dm-crypt' - How can I be sure that data is encrypted ?
excellent help Matti Kurkela
thanks
Regards
Maaz
thanks
Regards
Maaz
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО04-16-2009 05:06 AM
тАО04-16-2009 05:06 AM
Re: 'dm-crypt' - How can I be sure that data is encrypted ?
Shalom,
I would try various methods to read the data, including dd, mount/umount, and some typical tools.
If you are very concerned, you can try some tools that use cracklib to crack the passphrase on the data.
But if the data looks like garbage in clear text, its encrypted. The issue to test is whether the pass phrase is something that can be broken.
In an ideal world, I'd devote a system to trying to crack such things to insure data safety.
SEP
I would try various methods to read the data, including dd, mount/umount, and some typical tools.
If you are very concerned, you can try some tools that use cracklib to crack the passphrase on the data.
But if the data looks like garbage in clear text, its encrypted. The issue to test is whether the pass phrase is something that can be broken.
In an ideal world, I'd devote a system to trying to crack such things to insure data safety.
SEP
Steven E Protter
Owner of ISN Corporation
http://isnamerica.com
http://hpuxconsulting.com
Sponsor: http://hpux.ws
Twitter: http://twitter.com/hpuxlinux
Founder http://newdatacloud.com
Owner of ISN Corporation
http://isnamerica.com
http://hpuxconsulting.com
Sponsor: http://hpux.ws
Twitter: http://twitter.com/hpuxlinux
Founder http://newdatacloud.com
The opinions expressed above are the personal opinions of the authors, not of Hewlett Packard Enterprise. By using this site, you accept the Terms of Use and Rules of Participation.
News and Events
Support
© Copyright 2024 Hewlett Packard Enterprise Development LP