"Fossies" - the Fresh Open Source Software Archive  

Source code changes of the file "FAQ" between
cryptsetup-2.3.6.tar.xz and cryptsetup-2.4.0.tar.xz

About: cryptsetup is a utility used to conveniently setup disk encryption based on the dm-crypt kernel module. These include plain dm-crypt volumes, LUKS volumes, loop-AES and TrueCrypt compatible format.

FAQ  (cryptsetup-2.3.6.tar.xz):FAQ  (cryptsetup-2.4.0.tar.xz)
skipping to change at line 230 skipping to change at line 230
went active. The confirmation emails from the listserver have subjects went active. The confirmation emails from the listserver have subjects
like these (with other numbers): like these (with other numbers):
Subject: confirm 9964cf10..... Subject: confirm 9964cf10.....
and are sent from dm-crypt-request@saout.de. You should check whether and are sent from dm-crypt-request@saout.de. You should check whether
you have anything like it in your sent email folder. If you find you have anything like it in your sent email folder. If you find
nothing and are sure you did not confirm, then you should look into a nothing and are sure you did not confirm, then you should look into a
possible compromise of your email account. possible compromise of your email account.
* 1.9 What can I do if cryptsetup is running out of memory?
Memory issues are generally related to the key derivation function. You may
be able to tune usage with the options --pbkdf-memory or --pbkdf pbkdf2.
* 1.10 Can cryptsetup be run without root access?
Elevated privileges are required to use cryptsetup and LUKS. Some operations
require root access. There are a few features which will work without root
access with the right switches but there are caveats.
* 1.11 What are the problems with running as non root?
The first issue is one of permissions to devices. Generally, root or a group
such as disk has ownership of the storage devices. The non root user will
need write access to the block device used for LUKS.
Next, file locking is managed in /run/cryptsetup. You may use
--disable-locks but cryptsetup will no longer protect you from race
conditions and problems with concurrent access to the same devices.
Also, device mapper requires root access. cryptsetup uses device mapper to
manage the decrypted container.
2. Setup 2. Setup
* 2.1 LUKS Container Setup mini-HOWTO * 2.1 LUKS Container Setup mini-HOWTO
This item tries to give you a very brief list of all the steps you This item tries to give you a very brief list of all the steps you
should go through when creating a new LUKS encrypted container, i.e. should go through when creating a new LUKS encrypted container, i.e.
encrypted disk, partition or loop-file. encrypted disk, partition or loop-file.
01) All data will be lost, if there is data on the target, make a 01) All data will be lost, if there is data on the target, make a
backup. backup.
 End of changes. 1 change blocks. 
0 lines changed or deleted 24 lines changed or added

Home  |  About  |  Features  |  All  |  Newest  |  Dox  |  Diffs  |  RSS Feeds  |  Screenshots  |  Comments  |  Imprint  |  Privacy  |  HTTP(S)