Mailing list for all users of the OCaml language and system.
 help / color / mirror / Atom feed
From: ls-ocaml-developer-2006@m-e-leypold.de
To: caml-list@inria.fr
Subject: ANNOUNCE: LSD mount utilities, version 1.3
Date: Sat, 17 Feb 2007 13:12:14 +0100	[thread overview]
Message-ID: <2m3b55oue9.fsf@hod.lan.m-e-leypold.de> (raw)
In-Reply-To: <6w1wlcd8ya.fsf@hod.lan.m-e-leypold.de> (ls-ocaml-developer's message of "Tue, 30 Jan 2007 12:56:29 +0100")




    Release 1.3 of LSD mount utilities with mkfs, fsck and LUKS support
    ___________________________________________________________________
    
    A new version (1.3) of the LSD mount utilities has been released.
    
      - LUKS support has been tested (by Alexander Ulrich) and seems to be OK.
    
      - Basic versions of mkfs.lcrypt and fsck.lcrypt have been added:
        You can now use mkfs to create a file system on your encrypted
        device and fsck to check your file system.
     
      - The file USAGE (see below) is intended to be the beginning of
        a user manual.
    
    LSD mount utilities are written in OCaml.
    
    Regards -- M E Leypold, 16 Feb 2007.
    
    


*   About
    =====

    The LSD mount utilities assist in setting up (creating) and
    mounting of encrypted loopback file systems in Linux 2.4 and 2.6.

    They also enable users (not only root) to mount encrypted
    file systems if appropriate entries have been added to /etc/fstab.

    The LSD mount utilities are licensed/distributed under the the
    terms of the GPL Version 2 (no later version). We'll usually be
    happy though to relicense under other OS licenses, but you have to
    ask and get the licensing change from us in writing.

    The LSD mount utilities are available from
    http://software.m-e-leypold.de. Read the README file from the
    distribution before using the software!
    

*   How to get more information and help
    ====================================

    Information on recent development and plans and updated
    documentation will be posted at

      http://www.etc-network.de/blog/mel/projects/lsd-mount-utilities

    If you need help, have questions concerning the LSD mount
    utilities or have suggestions for further implementation you can
    write the developer at

       development-2006-8ecbb5cc8a-REMOVE-THIS@AND-THAT-m-e-leypold.de.

    I don't guarantee support, but will usually do my best to help.


    
*   How to use (excerpt from USAGE)
    ===============================
    
    PLEASE DO READ the file USAGE in the distribution. The following
    excerpt is only intended to give you a basic idea how things work
    with LSD mount utilities (i.e. that the hide all losetup and
    cryptsetup stuff from the user).
    
    
**  Creating an encrypted file system
    ---------------------------------

    Before you can make an encrypted file system you need to create an
    image file and preferably fill it with random noise:

      dd if=/dev/urandom of=/secret/image

    Given an image files a encrypted file systems can be initialized
    with plain mkfs:

      mkfs -t lcrypt /secret/image 10000

    The 'blocks' number is optional (you usually can leave it
    out). You'll be asked for the passphrase twice.


**  Checking an encrypted file system
    ---------------------------------

    An encrypted file system can be checked passing '-t lcrypt' to fsck.
 
      fsck -t lcrypt /secret/image

    You will, of course be asked for the passphrase.

    If there is an entry in /etc/fstab (see the next sections) which
    already gives the type of /secret/image as lcrypt, the '-t lcrypt'
    might be omitted:

      fsck /secret/image


**  Mounting an encrypted file system
    ----------------------------------

    To mount an encrypted file system you can pass '-t lcrypt' to
    mount:

      mount -t lcrypt /data/encrypted-image /mnt 

    You'll be asked for the passphrase.

    If there is an entry in /etc/fstab (see the next sections) which
    already gives the type of /secret/image as lcrypt, the '-t lcrypt'
    and the mount point might be omitted.

      mount /data/encrypted-image


**  Setting up encrypted file systems in /etc/fstab
    -----------------------------------------------

    Use lcrypt as file system type. Use the option 'user', if
    non-privileged users should be able to mount the device:

      /etc/fstab:
      |
      ...
      |
      | /data/encrypted-image /secret-mnt lcrypt  rw,noauto,user,exec 0 0
      |

    
**  Loclean: Clean up loopback devices
    ----------------------------------
    
    Loclean can only be used by root:

      loclean

    and will try to remove all associations with files from loopback
    devices (/dev/loop*) that are not currently in use.


    


  reply	other threads:[~2007-02-17 12:06 UTC|newest]

Thread overview: 3+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2007-01-30 11:56 ANNOUNCE: LSD mount utilities ls-ocaml-developer-2006
2007-02-17 12:12 ` ls-ocaml-developer-2006 [this message]
2007-04-13  8:55   ` ANNOUNCE: LSD mount utilities, version 1.4 ls-ocaml-developer-2006

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=2m3b55oue9.fsf@hod.lan.m-e-leypold.de \
    --to=ls-ocaml-developer-2006@m-e-leypold.de \
    --cc=caml-list@inria.fr \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox