Dm-crypt / LUKS: Clemens Fruhwirth (LUKS) 2005-02-05: GPL: Yes DriveCrypt: SecurStar GmbH 2001 Proprietary: Yes: DriveSentry GoAnywhere 2 DriveSentry 2008 Proprietary: No E4M: Paul Le Roux: 1998-12-18: Open source: No e-Capsule Private Safe EISST Ltd. 2005 Proprietary: Yes eCryptfs: Dustin Kirkland, Tyler Hicks, (formerly Mike Halcrow) 2005

GPG works on many platforms including Linux, Windows, OSX and FreeBSD. dm-crypt via LUKS. My Rec ommendation for dm-crypt via LUKS. My Recommendation for dm-crypt Dec 13, 2013 · Message-ID: <20050409231207+0100@www.ubuntulinux.org> You can use any blockdevice with dm-crypt. This can be a partition on your disk, RAID or LVM as well as a file mounted loop-back. In fact the crypttab allows for file to be given and sets up a loopback device for it, passing that to the dm-crypt config program. Mar 14, 2017 · Before using cryptsetup, always make sure the dm_crypt kernel module is loaded. Cryptsetup usage. Cryptsetup is the command line tool to interface with dm-crypt for creating, accessing and managing encrypted devices. The tool was later expanded to support different encryption types that rely on the Linux kernel device-mapper and the So you need an initrd, that sets up dm-crypt and then asks swsusp to resume from the encrypted swap device. The most important thing is that you set up dm-crypt in such a way that the swap device you suspend to/resume from has always the same major/minor within the initrd as well as within your running system. Jun 08, 2004 · dm-crypt does not depend on a special user space tool (util-linux) dm-crypt uses mempool, which makes it rock-stable compared to cryptoloop Although it uses a strong crypto algorithm, cryptoloop is seen as a weak implementation, vulnerable to a certain type of plaintext attack.

Jun 08, 2004

crypttab is read before fstab, so that dm-crypt containers can be unlocked before the file system inside is mounted. Note that crypttab is read after the system has booted up, therefore it is not a replacement for unlocking encrypted partitions by using mkinitcpio hooks and boot loader options as in the case of encrypting the root partition . Apr 07, 2014 · Creating a dm-crypt LUKS Container in the File. Before we format the file that we just created, we should create a LUKS partition within the file. LUKS, or Linux Unified Key Setup, is a standard for disk encryption. This is the basic layer that all of our other data will sit on top of. The dm-crypt tools provide a very easy way to create this

LUKS (Linux Unified Key Setup) is now the preferred way to set up disk encryption with dm-crypt using the ‘cryptsetup’ utility, see https:

How to use dm-crypt and swsusp together — The Linux Kernel The most important thing is that you set up dm-crypt in such a way that the swap device you suspend to/resume from has always the same major/minor within the initrd as well as within your running system. The easiest way to achieve this is to always set up this swap device first with dmsetup, so that it will always look like the following