Full disk encryption on boot partition
location: linuxquestions.com - date: March 6, 2008
I am wondering if anyone knows of a howto for using Full disk encryption on a ubuntu installation? I want the entire disk to be encrypted even the boot partition.
I have found a wikipedia page on Full disk encryption:
and it states on the page the boot partition encryption is possiable with a password prompt:
"Using a boot-time driver that can ask for a password from the user"
that is what I am trying to achieve, can anyone help.
Guide: Software raid and LVM full disk encryption Oneiric 11.10
location: ubuntuforums.com - date: March 4, 2012
(Pictures to come later) I'm writing this because I couldn't find any guidance when I searched and I don't want you to waste your Saturday morning like I did.
This brief guide assumes that you will be installing Ubuntu as your only operating system, I am not sure if you could get the software raid to work with a dual boot setup.
Step 1: Download the alternate install image.
Step 2: Go through the normal setup steps, stop when you get to the partitioning screen.
Step 3: Select 'manual'.
Step 4: Remove all partitions.
Step 5. Create a 550MB /boot partition on one of the drives. Set the format to be ext4.
Step 6. Select 'Configure software raid' and add the select the free space left over that you'd like to include in your raid setup.
Step 7. Select your raid configuration. I picked raid0.
Step 8. After you're finished with raid select 'Configure encrypted volumes'.
Step 9. Encryp
Hardware Full Disk Encryption how secure?
location: ubuntuforums.com - date: October 26, 2009
I have a Lenovo ThinkPad X200, which supports Full Disk Encryption in hardware, configurable from the BIOS as detailed here:
This reads like a great set of features, and it really does work this way. What I find worrying however is that, after a system restart (as opposed to starting up cold), the encryption password is not requested and the drive remains unencrypted between restarts.
So if the device is stolen while suspended (as opposed to powered off), the thief could switch to a VT, hit ALT+CTRL+Del to reboot, modify grub settings to boot off a Live CD or flash drive and then access my data from that environment.
(I think it would also be possible to simply interrupt the boot process to gain root access and access the data from there?)
I always travel with my laptop suspended (it's just faster than booting each time!), and there seems to be no BIOS option to force a password request after a reboot
HOWTO: Set up Full Disk Encryption in a Dual Boot System
location: ubuntuforums.com - date: April 21, 2008
Hi there, this is my first tutorial, so I apologise if it's a little rough around the edges.
What This Covers
This tutorial will allow you to create a basic dual boot system, using only free open source software, which is fully encrypted (apart from a boot partitioin).
I am by no means an encryption expert, so please do not take anything I say as cannon.
At the end of this tutorial, you will have a system in which both windows and ubuntu are completely encrypted, including swap space, the windows page file, and hibernation files.
I have only tired this on a VMware virtual machine, and my HP 530 laptop. I cannot guarantee it will work on any computer.
Also, this is not bulletproof. It is difficult to change the LUKS passphrase, and does not support keyfiles. You will therefore have to rely upon a very strong passphrase, which cannot change.
Also, your boot files will not be encrypted. There are ways around this; you can save them to a USB key, and ta
Full disk encryption on dual boot system
location: ubuntuforums.com - date: April 13, 2011
I currently have a system running Ubuntu 10.10 64-bit and Windows 7 Ultimate SP1 64-bit. I currently use EXT3 file system drivers so that Windows 7 can read and write to my ext3 partition and obviously Ubuntu has NTFS-3G built in. Is there any way to implement a full disk encryption system that would still allow the two OSes to read and write to each other's drives?
At the very least I would like it to be possible to have at least one of the two systems be encrypted so I could make an effort to store sensitive information on that drive.
I also plan to move over to EXT4 come 11.04. I used EXT3 because the EXT3 drivers for Windows used to have a lot of problems with EXT4.
12.10 full disk encryption access to passphrase files if drive is changed to aux us
location: ubuntuforums.com - date: October 28, 2012
I have completed an install of Ubuntu 12.10 and used the full disk encryption option.
I normally take my old installation disk and mount it in a USB enclosure and then copy mail
folders and other desired files to the new system disk.
I wanted to see if this would still work when I have to retreive folders off of the the 12.10
c/w full disk encryption option, so did a 2nd 12.10 install c/w full disk encryption and then tried
to access the Home folder of the first install when the disk was mounted as an aux in a USB case.
The aux drive shows up in the side bar as two volumes.... one locked and one not locked.
The unlocked Volume has the Grub folder and other misc boot files. When the locked volume is accessed ,
I am asked for a passphrase as shown in the screenshot.
As shown in the 2nd screen shot the resulting message states Unable to mount 1000 GB Encrypted
The unlocked device does not have a recognizable file system on it.
The passphrase is accepted as correct but does
Passwordless Full Disk Encryption??
location: linuxquestions.com - date: September 1, 2013
Running Debian Wheezy on a Raspberry Pi. I've used luks to successfully implement full disk encryption on the SD card, based on the description at https://plus.google.com/108063823920...ts/d964bRurWpv
It works perfectly, asking for a passphrase at boot-time and the impact on speed is surprisingly not too bad.
OK, so I'm trying to be a bit clever, and I want to run the encryption without the request for a passphrase at boot-time, so I found the description at http://wejn.org/how-to-make-password...ryptsetup.html and I'm going through the description which is basically
1) Create a password file;
2) Put it somewhere that it can be accessed during boot time;
3) Create a script to tell the boot process where to find the password file
4) Boot process goes to the file, gets the password, decrypts the disk and the system completes loading from the decrypted disk
Now, I'm running a fairly standard R-Pi, with a FAT partition and a Linux partition. It first boots from the
Mageia, Fedora or Slackware Full Disk Encryption with installation?
location: linuxquestions.com - date: November 4, 2012
I am switching distro's. Does anyone know if Fedora, Slackware or Mageia has full disk encryption on install? I know my other choice, Arch, does.
I did use Mandrake, then Mandriva. I have tried Fedora but it has been some years and I can't remember if they had that. I never tried Slackware.
Can full disk encryption be removed?
location: linuxquestions.com - date: November 14, 2010
I had asked a question at another forum about cloning my Linux install, which is all encrypted (except for boot of course.)
While I waited I do what I usually do and Scroogled my question to see what, if anything, I could find. I do know about cold boot attacks. But I ran across a couple of posts/websites that had me wonder if it is possible, without the passphrase, to just remove the encryption? This sounds crazy to me, but these days I thought I would ask just in case, lol.
Full Disk Encryption, Yubikey unlock
location: ubuntuforums.com - date: January 2, 2012
I am in a position now where I need more security for my computer, starting a business and certain data needs to be protected. I would like to try a method of security that seems to me to be top notch.
Namely I would like to fully encrypt my disk so that it requires an OTP from a yubikey to start-up, I have tried google searches for this but havn't found very much information. The info I have found seems to require a very indepth knowledge that I haven't gained yet.
Does anybody have any experience with this?
Page: 1 2 3 4 5 6 7 8 9 10