<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>
	Comments on: Installing Debian 8 (Jessie) with LUKS Encrypted /home and /var Partitions	</title>
	<atom:link href="https://www.tecmint.com/install-debian-8-with-luks-encrypted-home-var-lvm-partitions/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.tecmint.com/install-debian-8-with-luks-encrypted-home-var-lvm-partitions/</link>
	<description>Tecmint - Linux Howtos, Tutorials, Guides, News, Tips and Tricks.</description>
	<lastBuildDate>Tue, 21 Mar 2017 09:39:03 +0000</lastBuildDate>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>
		By: Ivan		</title>
		<link>https://www.tecmint.com/install-debian-8-with-luks-encrypted-home-var-lvm-partitions/comment-page-1/#comment-877071</link>

		<dc:creator><![CDATA[Ivan]]></dc:creator>
		<pubDate>Tue, 21 Mar 2017 09:39:03 +0000</pubDate>
		<guid isPermaLink="false">http://www.tecmint.com/?p=13802#comment-877071</guid>

					<description><![CDATA[hi guys

i want to know how to make passpshrase to automaticaly boot from usb.]]></description>
			<content:encoded><![CDATA[<p>hi guys</p>
<p>i want to know how to make passpshrase to automaticaly boot from usb.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Graham		</title>
		<link>https://www.tecmint.com/install-debian-8-with-luks-encrypted-home-var-lvm-partitions/comment-page-1/#comment-847056</link>

		<dc:creator><![CDATA[Graham]]></dc:creator>
		<pubDate>Tue, 13 Dec 2016 01:12:14 +0000</pubDate>
		<guid isPermaLink="false">http://www.tecmint.com/?p=13802#comment-847056</guid>

					<description><![CDATA[Yeah, I&#039;m not convinced automatic decryption works in Debian. If you issue &#039;update-initramfs -u -k all&#039; you get the error, &#039;cryptsetup: WARNING: target sdaX_crypt uses a key file, skipped.&#039; which will hang the system at boot.

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776409

They&#039;re dicking around with systemd and can&#039;t get it sorted out so it isn&#039;t clear if you can use a keyscript in Jessie/Stable.]]></description>
			<content:encoded><![CDATA[<p>Yeah, I&#8217;m not convinced automatic decryption works in Debian. If you issue &#8216;update-initramfs -u -k all&#8217; you get the error, &#8216;cryptsetup: WARNING: target sdaX_crypt uses a key file, skipped.&#8217; which will hang the system at boot.</p>
<p><a target="_blank" href="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776409" rel="nofollow ugc">https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776409</a></p>
<p>They&#8217;re dicking around with systemd and can&#8217;t get it sorted out so it isn&#8217;t clear if you can use a keyscript in Jessie/Stable.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Matei Cezar		</title>
		<link>https://www.tecmint.com/install-debian-8-with-luks-encrypted-home-var-lvm-partitions/comment-page-1/#comment-803415</link>

		<dc:creator><![CDATA[Matei Cezar]]></dc:creator>
		<pubDate>Sun, 31 Jul 2016 12:23:23 +0000</pubDate>
		<guid isPermaLink="false">http://www.tecmint.com/?p=13802#comment-803415</guid>

					<description><![CDATA[In reply to &lt;a href=&quot;https://www.tecmint.com/install-debian-8-with-luks-encrypted-home-var-lvm-partitions/comment-page-1/#comment-803067&quot;&gt;Jim Braxton&lt;/a&gt;.

That&#039;s just a simple trick used to decrypt the partitions. I wouldn&#039;t suggest that you should host the key on any of internal hard-disks but you can use an external drive to keep the key secure and plug the drive.]]></description>
			<content:encoded><![CDATA[<p>In reply to <a target="_blank" href="https://www.tecmint.com/install-debian-8-with-luks-encrypted-home-var-lvm-partitions/comment-page-1/#comment-803067">Jim Braxton</a>.</p>
<p>That&#8217;s just a simple trick used to decrypt the partitions. I wouldn&#8217;t suggest that you should host the key on any of internal hard-disks but you can use an external drive to keep the key secure and plug the drive.</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Jim Braxton		</title>
		<link>https://www.tecmint.com/install-debian-8-with-luks-encrypted-home-var-lvm-partitions/comment-page-1/#comment-803067</link>

		<dc:creator><![CDATA[Jim Braxton]]></dc:creator>
		<pubDate>Fri, 29 Jul 2016 16:24:14 +0000</pubDate>
		<guid isPermaLink="false">http://www.tecmint.com/?p=13802#comment-803067</guid>

					<description><![CDATA[&#062;All sensitive data stored in /home and /var partitions will be highly secured in case someone gains physical access to your machine hard-drive.

I&#039;m sorry, how exactly is it gonna be secured from anyone when we&#039;ve just configured these partitions to be mounted automatically without asking the passphrase so anyone will be able to login on our machine and read all the data from these partitions?]]></description>
			<content:encoded><![CDATA[<p>&gt;All sensitive data stored in /home and /var partitions will be highly secured in case someone gains physical access to your machine hard-drive.</p>
<p>I&#8217;m sorry, how exactly is it gonna be secured from anyone when we&#8217;ve just configured these partitions to be mounted automatically without asking the passphrase so anyone will be able to login on our machine and read all the data from these partitions?</p>
]]></content:encoded>
		
			</item>
		<item>
		<title>
		By: Matei Cezar		</title>
		<link>https://www.tecmint.com/install-debian-8-with-luks-encrypted-home-var-lvm-partitions/comment-page-1/#comment-793454</link>

		<dc:creator><![CDATA[Matei Cezar]]></dc:creator>
		<pubDate>Tue, 21 Jun 2016 14:46:21 +0000</pubDate>
		<guid isPermaLink="false">http://www.tecmint.com/?p=13802#comment-793454</guid>

					<description><![CDATA[If you can boot-up and login to the console check if the / partition is present on fstab (i&#039;m guessing the root partition is not encrypted). Then update  the initramfs image with the command &#039;update-initramfs -u&#039;]]></description>
			<content:encoded><![CDATA[<p>If you can boot-up and login to the console check if the / partition is present on fstab (i&#8217;m guessing the root partition is not encrypted). Then update  the initramfs image with the command &#8216;update-initramfs -u&#8217;</p>
]]></content:encoded>
		
			</item>
	</channel>
</rss>
