<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>
	Comments on: How to Encrypt Drives Using LUKS in Fedora Linux	</title>
	<atom:link href="https://www.tecmint.com/encrypt-drives-using-luks-in-fedora-linux/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.tecmint.com/encrypt-drives-using-luks-in-fedora-linux/</link>
	<description>Tecmint - Linux Howtos, Tutorials, Guides, News, Tips and Tricks.</description>
	<lastBuildDate>Tue, 02 Jun 2020 17:40:05 +0000</lastBuildDate>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>
		By: jamacoe		</title>
		<link>https://www.tecmint.com/encrypt-drives-using-luks-in-fedora-linux/comment-page-1/#comment-1336229</link>

		<dc:creator><![CDATA[jamacoe]]></dc:creator>
		<pubDate>Tue, 02 Jun 2020 17:40:05 +0000</pubDate>
		<guid isPermaLink="false">https://www.tecmint.com/?p=32888#comment-1336229</guid>

					<description><![CDATA[In reply to &lt;a href=&quot;https://www.tecmint.com/encrypt-drives-using-luks-in-fedora-linux/comment-page-1/#comment-1336227&quot;&gt;jamacoe&lt;/a&gt;.

Hi @aaron:

In &lt;strong&gt;fstabs&lt;/strong&gt; I have to include &#039;&lt;strong&gt;defaults&lt;/strong&gt;&#039; after the file system xfs, otherwise, I boot to service mode.]]></description>
			<content:encoded><![CDATA[<p>In reply to <a target="_blank" href="https://www.tecmint.com/encrypt-drives-using-luks-in-fedora-linux/comment-page-1/#comment-1336227">jamacoe</a>.</p>
<p>Hi @aaron:</p>
<p>In <strong>fstabs</strong> I have to include &#8216;<strong>defaults</strong>&#8216; after the file system xfs, otherwise, I boot to service mode.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: jamacoe		</title>
		<link>https://www.tecmint.com/encrypt-drives-using-luks-in-fedora-linux/comment-page-1/#comment-1336227</link>

		<dc:creator><![CDATA[jamacoe]]></dc:creator>
		<pubDate>Tue, 02 Jun 2020 17:23:05 +0000</pubDate>
		<guid isPermaLink="false">https://www.tecmint.com/?p=32888#comment-1336227</guid>

					<description><![CDATA[In reply to &lt;a href=&quot;https://www.tecmint.com/encrypt-drives-using-luks-in-fedora-linux/comment-page-1/#comment-1336216&quot;&gt;jamacoe&lt;/a&gt;.

Same with restore:
&lt;pre&gt;
[root@centos7 backups]# ls -l /root/backups/luk*
&lt;/pre&gt;
-r--------. 1 root root 1052672  2. Jun 18:59 /root/backups/luk-back
[root@centos7 backups]# cryptsetup -v luksHeaderRestore --header-backup-file /root/backups/luk-back /dev/mapper/luk-a6ca7926-d9b9-4633-8567-7c42d1f1d1d9

WARNING!
========
Device /dev/mapper/luk-a6ca7926-d9b9-4633-8567-7c42d1f1d1d9 does not contain LUKS header. Replacing header can destroy data on that device.

Are you sure? (Type uppercase yes): n
Command failed with code -1 (wrong or missing parameters).
[root@centos7 backups]# cryptsetup -v luksHeaderRestore --header-backup-file /root/backups/luk-back /dev/sdb1

WARNING!
========
Device /dev/sdb1 already contains LUKS header. Replacing header will destroy existing keyslots.

Are you sure? (Type uppercase yes): YES
Command successful.
[root@centos7 backups]# ls -l /mnt/test1
total 4
-rw-r--r--. 1 root root 5  2. Jun 19:00 test.txt
[root@centos7 backups]#]]></description>
			<content:encoded><![CDATA[<p>In reply to <a target="_blank" href="https://www.tecmint.com/encrypt-drives-using-luks-in-fedora-linux/comment-page-1/#comment-1336216">jamacoe</a>.</p>
<p>Same with restore:</p>
<pre>
[root@centos7 backups]# ls -l /root/backups/luk*
</pre>
<p>-r&#8212;&#8212;&#8211;. 1 root root 1052672  2. Jun 18:59 /root/backups/luk-back<br />
[root@centos7 backups]# cryptsetup -v luksHeaderRestore &#8211;header-backup-file /root/backups/luk-back /dev/mapper/luk-a6ca7926-d9b9-4633-8567-7c42d1f1d1d9</p>
<p>WARNING!<br />
========<br />
Device /dev/mapper/luk-a6ca7926-d9b9-4633-8567-7c42d1f1d1d9 does not contain LUKS header. Replacing header can destroy data on that device.</p>
<p>Are you sure? (Type uppercase yes): n<br />
Command failed with code -1 (wrong or missing parameters).<br />
[root@centos7 backups]# cryptsetup -v luksHeaderRestore &#8211;header-backup-file /root/backups/luk-back /dev/sdb1</p>
<p>WARNING!<br />
========<br />
Device /dev/sdb1 already contains LUKS header. Replacing header will destroy existing keyslots.</p>
<p>Are you sure? (Type uppercase yes): YES<br />
Command successful.<br />
[root@centos7 backups]# ls -l /mnt/test1<br />
total 4<br />
-rw-r&#8211;r&#8211;. 1 root root 5  2. Jun 19:00 test.txt<br />
[root@centos7 backups]#</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: jamacoe		</title>
		<link>https://www.tecmint.com/encrypt-drives-using-luks-in-fedora-linux/comment-page-1/#comment-1336216</link>

		<dc:creator><![CDATA[jamacoe]]></dc:creator>
		<pubDate>Tue, 02 Jun 2020 15:45:55 +0000</pubDate>
		<guid isPermaLink="false">https://www.tecmint.com/?p=32888#comment-1336216</guid>

					<description><![CDATA[Hi @Aaron, I stumbled over the same issue as @freedom. 

Man cryptsetup:
&lt;pre&gt;
# luksHeaderBackup  --header-backup-file 
&lt;/pre&gt;
And I figured that the device has to be the mount point, not the &lt;strong&gt;/dev/mapper/&lt;/strong&gt;.

Only this worked on my CentOS 7:
&lt;pre&gt;
# cryptsetup luksHeaderBackup /dev/sdb1 --header-backup-file luk-back
&lt;/pre&gt;]]></description>
			<content:encoded><![CDATA[<p>Hi @Aaron, I stumbled over the same issue as @freedom. </p>
<p>Man cryptsetup:</p>
<pre>
# luksHeaderBackup  --header-backup-file 
</pre>
<p>And I figured that the device has to be the mount point, not the <strong>/dev/mapper/</strong>.</p>
<p>Only this worked on my CentOS 7:</p>
<pre>
# cryptsetup luksHeaderBackup /dev/sdb1 --header-backup-file luk-back
</pre>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Stef		</title>
		<link>https://www.tecmint.com/encrypt-drives-using-luks-in-fedora-linux/comment-page-1/#comment-1329720</link>

		<dc:creator><![CDATA[Stef]]></dc:creator>
		<pubDate>Sat, 25 Apr 2020 19:56:55 +0000</pubDate>
		<guid isPermaLink="false">https://www.tecmint.com/?p=32888#comment-1329720</guid>

					<description><![CDATA[In reply to &lt;a href=&quot;https://www.tecmint.com/encrypt-drives-using-luks-in-fedora-linux/comment-page-1/#comment-1271089&quot;&gt;Hualing&lt;/a&gt;.

I had the same reaction the first time I used &lt;strong&gt;luks&lt;/strong&gt;. If you zeroed the device and applied &lt;strong&gt;luksFormat&lt;/strong&gt;, it is perfectly normal to find zeros after the header. This is because &lt;strong&gt;luksFormat&lt;/strong&gt; does not attempt to encrypt the data in the specified device. 

Those zeros are now the encrypted form of &quot;&lt;strong&gt;a decrypted something&lt;/strong&gt;&quot; that can be retrieved by reading the device created by &lt;strong&gt;luksOpen&lt;/strong&gt;. Of course, as soon as you write in &lt;strong&gt;luksOpen&lt;/strong&gt;, the zeros in &lt;strong&gt;/dev/mmcblk2gp0p2&lt;/strong&gt; will be replaced by encrypted data that look random. 

The key slots area is large because it can store multiple keys of size &lt;strong&gt;258048&lt;/strong&gt; (see in the &lt;strong&gt;luksDump&lt;/strong&gt; output and also the &lt;strong&gt;luksAdd&lt;/strong&gt; command). One could argue that &lt;strong&gt;16744448/258048 = 64 keys&lt;/strong&gt; is a bit too much. 

You can reduce the size and so the maximum number of keys with the option &lt;code&gt; --luks2-keyslots-size&lt;/code&gt; (see man &lt;strong&gt;cryptsetup&lt;/strong&gt;).]]></description>
			<content:encoded><![CDATA[<p>In reply to <a target="_blank" href="https://www.tecmint.com/encrypt-drives-using-luks-in-fedora-linux/comment-page-1/#comment-1271089">Hualing</a>.</p>
<p>I had the same reaction the first time I used <strong>luks</strong>. If you zeroed the device and applied <strong>luksFormat</strong>, it is perfectly normal to find zeros after the header. This is because <strong>luksFormat</strong> does not attempt to encrypt the data in the specified device. </p>
<p>Those zeros are now the encrypted form of &#8220;<strong>a decrypted something</strong>&#8221; that can be retrieved by reading the device created by <strong>luksOpen</strong>. Of course, as soon as you write in <strong>luksOpen</strong>, the zeros in <strong>/dev/mmcblk2gp0p2</strong> will be replaced by encrypted data that look random. </p>
<p>The key slots area is large because it can store multiple keys of size <strong>258048</strong> (see in the <strong>luksDump</strong> output and also the <strong>luksAdd</strong> command). One could argue that <strong>16744448/258048 = 64 keys</strong> is a bit too much. </p>
<p>You can reduce the size and so the maximum number of keys with the option <code> --luks2-keyslots-size</code> (see man <strong>cryptsetup</strong>).</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Aaron Kili		</title>
		<link>https://www.tecmint.com/encrypt-drives-using-luks-in-fedora-linux/comment-page-1/#comment-1312789</link>

		<dc:creator><![CDATA[Aaron Kili]]></dc:creator>
		<pubDate>Mon, 20 Jan 2020 10:23:28 +0000</pubDate>
		<guid isPermaLink="false">https://www.tecmint.com/?p=32888#comment-1312789</guid>

					<description><![CDATA[In reply to &lt;a href=&quot;https://www.tecmint.com/encrypt-drives-using-luks-in-fedora-linux/comment-page-1/#comment-1312360&quot;&gt;Walter&lt;/a&gt;.

@Walter

You have to enter the passphrases twice to open both partitions. If you can find a password caching script for Fedora, you can try using it. Besides, you have to find an RPM package for Fedora.]]></description>
			<content:encoded><![CDATA[<p>In reply to <a target="_blank" href="https://www.tecmint.com/encrypt-drives-using-luks-in-fedora-linux/comment-page-1/#comment-1312360">Walter</a>.</p>
<p>@Walter</p>
<p>You have to enter the passphrases twice to open both partitions. If you can find a password caching script for Fedora, you can try using it. Besides, you have to find an RPM package for Fedora.</p>
]]></content:encoded>
		
			</item>
	</channel>
</rss>
