[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-users] use of encrypted filesystem


  • To: "Michael Froh" <michael.froh@xxxxxxxxxx>
  • From: "Anand Gupta" <xen.mails@xxxxxxxxx>
  • Date: Thu, 28 Dec 2006 16:22:49 +0530
  • Cc: xen-users@xxxxxxxxxxxxxxxxxxx
  • Delivery-date: Thu, 28 Dec 2006 03:15:16 -0800
  • Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=beta; d=gmail.com; h=received:message-id:date:from:to:subject:cc:in-reply-to:mime-version:content-type:references; b=Hj7ugXz7wRdSsiverYedRMPOZHPFa+Ox3i6WspCtldhdXClrpIXvOlFg7yZDr4V6H8Nynuqfn6GnvSKKlxQzzye/1SuaZuJHHqthDzQsa9QtFKZLX+Ek1RDWG9WZWGymtatIs8DHMQ8pgq8SOePdvTMtFtBjj3toH3/0RD7T30c=
  • List-id: Xen user discussion <xen-users.lists.xensource.com>

Dear Micheal,

Thanks for the response.

On 12/28/06, Michael Froh <michael.froh@xxxxxxxxxx> wrote:
The use of loop-aes requires the kernel module loop.o and the aes key to be fed 
using standard input and uuencoded.  The loop-AES.README is at 

An example from that document to fill an encrypted partition with random data is as follows:
    head -c 15 /dev/urandom | uuencode -m - | head -n 2 | tail -n 1 \
        | losetup -p 0 -e AES128 /dev/loop3 /dev/hda666
    dd if=/dev/zero of=/dev/loop3 bs=4k conv=notrunc 2>/dev/null
    losetup -d /dev/loop3

This example uses a random key with loop-aes, then a dd fill of zeros is converted 
to random ciphertext.  Note the uuencoding of /dev/urandom output and it being
piped into losetup.

I have checked the modules and i am able to load them using modprobe.


--
regards,

Anand Gupta
_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.