Encrypted files and disk partitions +-------------------------------------- | Idea "They that can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety." -- B. Franklin, 1759 And to protect your liberty try following... ----- How to create and use encrypted file ----- +------------------------------------------------------ | Source For more informations look at: Cryptoloop-HOWTO +-------------------------------------- | How to 1. create a file intended to encrypt dd if=/dev/urandom of=./encrypted.aes bs=1k count=100000 2. load required modules /sbin/modprobe cryptoloop /sbin/modprobe aes ( Use "cat /proc/crypto" to find which crypto modules are ready to use. For permanent use put modprobe commands into /etc/rc.local ) 3. set the loop device up /sbin/losetup -e aes /dev/loop0 /data/encrypted.aes ( The command prompts for a password. ) 4. create file system in the encrypted file /sbin/mkfs.ext3 /dev/loop0 5. mount the encrypted file mkdir /mnt/crypto mount -t ext3 /dev/loop0 /mnt/crypto/ 6. unmount and detach the loop device umount /mnt/crypto/ /sbin/losetup -d /dev/loop0 X. common using mount ./encrypted.aes /mnt/crypto/ -oencryption=aes ( The command prompts for a password. ) ... umount /mnt/crypto/ ----- How to create encrypted disk partition ----- +------------------------------------------------------ | Sources and inspirations dm-crypt LUKS Root.Cz Security-portal.Cz +-------------------------------------- | How to Partition to encrypt (for example): /dev/sdc1 1. check the partition and wipe it with random data badblocks -c 10240 -s -w -t random -v /dev/sdc1 or ( better but very slow wiping ) dd if=/dev/urandom of=/dev/sdc1 2. load required modules (if not loaded automatically) /sbin/modprobe dm-crypt aes-[platform] sha256 lrw xts ( aes-[platform] - for example aes-i586 ) 3. encrypt the partition cryptsetup -c aes-xts-plain -s 512 -y luksFormat /dev/sdc1 ( -c aes-xts-plain -s 512 ... optimal -c aes-lrw-benbi -s 384 ... kernel older than 2.6.24 -c aes-cbc-essiv:sha256 -s 256 ... kernel older than 2.6.20 ) ( The command prompts for a password. ) 4. map the partition to /dev/mapper/encrypted cryptsetup luksOpen /dev/sdc1 encrypted ( The command prompts for a password. ) 5. build ext3 filesystem on the encrypted partition mkfs.ext3 /dev/mapper/encrypted or mkfs.ext3 -L __disk-label__ /dev/mapper/encrypted 6. mount the partition mkdir /mnt/encrypted mount /dev/mapper/encrypted /mnt/encrypted 6. unmount and cancel the luks mapper umount /dev/mapper/encrypted cryptsetup luksClose encrypted X1. common using cryptsetup luksOpen /dev/sdc1 encrypted ( The command prompts for a password. ) mount /dev/mapper/encrypted /mnt/encrypted ... umount /dev/mapper/encrypted cryptsetup luksClose encrypted or External encrypted disks can be mounted automatically in modern GNU/Linux distributions. ( After attaching the disk system prompts for a password. ) X2. encrypted filesystem checking cryptsetup luksOpen /dev/sdc1 encrypted ( The command prompts for a password. ) e2fsck /dev/mapper/encrypted cryptsetup luksClose encrypted Enjoy:-)