From: ls-ocaml-developer-2006@m-e-leypold.de
To: caml-list@inria.fr
Subject: ANNOUNCE: LSD mount utilities, version 1.3
Date: Sat, 17 Feb 2007 13:12:14 +0100 [thread overview]
Message-ID: <2m3b55oue9.fsf@hod.lan.m-e-leypold.de> (raw)
In-Reply-To: <6w1wlcd8ya.fsf@hod.lan.m-e-leypold.de> (ls-ocaml-developer's message of "Tue, 30 Jan 2007 12:56:29 +0100")
Release 1.3 of LSD mount utilities with mkfs, fsck and LUKS support
___________________________________________________________________
A new version (1.3) of the LSD mount utilities has been released.
- LUKS support has been tested (by Alexander Ulrich) and seems to be OK.
- Basic versions of mkfs.lcrypt and fsck.lcrypt have been added:
You can now use mkfs to create a file system on your encrypted
device and fsck to check your file system.
- The file USAGE (see below) is intended to be the beginning of
a user manual.
LSD mount utilities are written in OCaml.
Regards -- M E Leypold, 16 Feb 2007.
* About
=====
The LSD mount utilities assist in setting up (creating) and
mounting of encrypted loopback file systems in Linux 2.4 and 2.6.
They also enable users (not only root) to mount encrypted
file systems if appropriate entries have been added to /etc/fstab.
The LSD mount utilities are licensed/distributed under the the
terms of the GPL Version 2 (no later version). We'll usually be
happy though to relicense under other OS licenses, but you have to
ask and get the licensing change from us in writing.
The LSD mount utilities are available from
http://software.m-e-leypold.de. Read the README file from the
distribution before using the software!
* How to get more information and help
====================================
Information on recent development and plans and updated
documentation will be posted at
http://www.etc-network.de/blog/mel/projects/lsd-mount-utilities
If you need help, have questions concerning the LSD mount
utilities or have suggestions for further implementation you can
write the developer at
development-2006-8ecbb5cc8a-REMOVE-THIS@AND-THAT-m-e-leypold.de.
I don't guarantee support, but will usually do my best to help.
* How to use (excerpt from USAGE)
===============================
PLEASE DO READ the file USAGE in the distribution. The following
excerpt is only intended to give you a basic idea how things work
with LSD mount utilities (i.e. that the hide all losetup and
cryptsetup stuff from the user).
** Creating an encrypted file system
---------------------------------
Before you can make an encrypted file system you need to create an
image file and preferably fill it with random noise:
dd if=/dev/urandom of=/secret/image
Given an image files a encrypted file systems can be initialized
with plain mkfs:
mkfs -t lcrypt /secret/image 10000
The 'blocks' number is optional (you usually can leave it
out). You'll be asked for the passphrase twice.
** Checking an encrypted file system
---------------------------------
An encrypted file system can be checked passing '-t lcrypt' to fsck.
fsck -t lcrypt /secret/image
You will, of course be asked for the passphrase.
If there is an entry in /etc/fstab (see the next sections) which
already gives the type of /secret/image as lcrypt, the '-t lcrypt'
might be omitted:
fsck /secret/image
** Mounting an encrypted file system
----------------------------------
To mount an encrypted file system you can pass '-t lcrypt' to
mount:
mount -t lcrypt /data/encrypted-image /mnt
You'll be asked for the passphrase.
If there is an entry in /etc/fstab (see the next sections) which
already gives the type of /secret/image as lcrypt, the '-t lcrypt'
and the mount point might be omitted.
mount /data/encrypted-image
** Setting up encrypted file systems in /etc/fstab
-----------------------------------------------
Use lcrypt as file system type. Use the option 'user', if
non-privileged users should be able to mount the device:
/etc/fstab:
|
...
|
| /data/encrypted-image /secret-mnt lcrypt rw,noauto,user,exec 0 0
|
** Loclean: Clean up loopback devices
----------------------------------
Loclean can only be used by root:
loclean
and will try to remove all associations with files from loopback
devices (/dev/loop*) that are not currently in use.
next prev parent reply other threads:[~2007-02-17 12:06 UTC|newest]
Thread overview: 3+ messages / expand[flat|nested] mbox.gz Atom feed top
2007-01-30 11:56 ANNOUNCE: LSD mount utilities ls-ocaml-developer-2006
2007-02-17 12:12 ` ls-ocaml-developer-2006 [this message]
2007-04-13 8:55 ` ANNOUNCE: LSD mount utilities, version 1.4 ls-ocaml-developer-2006
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=2m3b55oue9.fsf@hod.lan.m-e-leypold.de \
--to=ls-ocaml-developer-2006@m-e-leypold.de \
--cc=caml-list@inria.fr \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox