[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]
On Thu, 2 Feb 2006, Greg Lopp wrote:
I have an installer that appears to mount a crypto'd loopback image. It asks me for a password and then, according to strace, tries to access /proc/crypto/cipher.
$ ls /lib/modules/`uname -r`/kernel/crypto anubis.ko cast6.ko des.ko michael_mic.ko tea.ko arc4.ko crc32c.ko khazad.ko serpent.ko twofish.ko blowfish.ko crypto_null.ko md4.ko sha256.ko wp512.ko cast5.ko deflate.ko md5.ko sha512.ko $
Next, check and make sure that the modules really loaded:
$ lsmod | egrep -e "blowfish|cryptoloop" blowfish 12353 0 cryptoloop 7361 0 loop 19401 1 cryptoloop $
Now, setup your loopback device:
$ su # losetup -e blowfish /dev/loop1 /path/to/file.img Password: #
Now, mount it up.
# mount /dev/loop1 /path/to/mountpoint
# umount /path/to/mountpoint # losetup -d /dev/loop1
$ su # dd if=/dev/urandom of=/path/to/file.img bs=1024 count=10240 10240+0 records in 10240+0 records out # losetup -e blowfish /dev/loop1 /path/to/file.img Password: enternewpasswordhere
# mkfs.ext3 /dev/loop1 mke2fs 1.38 (30-Jun-2005) ... # mount /dev/loop1 /path/to/mountpoint
Lemme know if you need help, ep
-- Brian Epstein <ep@epiary.org> Key fingerprint = F9C8 A715 933E 6A64 C220 482B 02CF B6C8 DB7F 41B4 ___________________________________________________________________________ Philadelphia Linux Users Group -- http://www.phillylinux.org Announcements - http://lists.phillylinux.org/mailman/listinfo/plug-announce General Discussion -- http://lists.phillylinux.org/mailman/listinfo/plug