modprobe cryptoloop
modprobe aes
modprobe anubis
modprobe arc4
modprobe blkcipher
modprobe blowfish
modprobe cast5
modprobe cast6
modprobe cbc
modprobe crc32c
modprobe crypto_algapi
modprobe crypto_hash
modprobe cryptomgr
modprobe crypto_null
modprobe deflate
modprobe des
modprobe ecb
modprobe gf128mul
modprobe hmac
modprobe khazad
modprobe lrw
modprobe md4
modprobe md5
modprobe michael_mic
modprobe serpent
modprobe sha1
modprobe sha256
modprobe sha512
modprobe tea
modprobe tgr192
modprobe twofish_common
modprobe twofish
modprobe wp512
modprobe xcbc
# dm_mod should give you dm_snapshot, dm_zero and dm_mirror?
modprobe dm_mod
modprobe dm_cryptdmsetup targetsshould give you something along the lines of:
crypt v1.0.0 striped v1.0.1 linear v1.0.1 error v1.0.1
lsmodwill show you which modules are currently installed.
ls -d1 /dev/loop* | wc -l
for i in $(seq 0 127); do
if [ ! -f /dev/loop$i ] ; then
mknod -m0660 /dev/loop$i b 7 $i
chown root.disk /dev/loop$i
fi
donedd if=/dev/zero of=./volumes/vol_default.vol bs=1M count=1 losetup /dev/loop0 ./volumes/vol_default.vol echo password1234567890ABC | cryptsetup-luks luksFormat /dev/loop0 cryptsetup-luks luksDump /dev/loop0 echo password1234567890ABC | cryptsetup-luks luksOpen /dev/loop0 myMapper dmsetup ls dmsetup table dmsetup status cryptsetup-luks status myMapper losetup /dev/loop1 /dev/mapper/myMapper mkdosfs /dev/loop1 mkdir ./test_mountpoint mount /dev/loop1 ./test_mountpoint cp ./test_files/SHORT_TEXT.txt ./test_mountpoint cp ./test_files/BINARY_ZEROS.dat ./test_mountpoint cp ./test_files/BINARY_ABC_RPTD.dat ./test_mountpoint cp ./test_files/BINARY_00_FF_RPTD.dat ./test_mountpointumount ./test_mountpoint losetup -d /dev/loop1 cryptsetup-luks luksClose myMapper losetup -d /dev/loop0 rm -rf ./test_mountpoint
dd if=/dev/zero of=./volumes/vol_aes_256.vol bs=1M count=1 losetup /dev/loop0 ./volumes/vol_aes_256.vol echo password1234567890ABC | cryptsetup-luks -c aes -s 256 luksFormat /dev/loop0 cryptsetup-luks luksDump /dev/loop0 echo password1234567890ABC | cryptsetup-luks luksOpen /dev/loop0 myMapper dmsetup ls dmsetup table dmsetup status cryptsetup-luks status myMapper losetup /dev/loop1 /dev/mapper/myMapper mkdosfs /dev/loop1 mkdir ./test_mountpoint mount /dev/loop1 ./test_mountpoint cp ./test_files/SHORT_TEXT.txt ./test_mountpoint cp ./test_files/BINARY_ZEROS.dat ./test_mountpoint cp ./test_files/BINARY_ABC_RPTD.dat ./test_mountpoint cp ./test_files/BINARY_00_FF_RPTD.dat ./test_mountpoint umount ./test_mountpoint losetup -d /dev/loop1 cryptsetup-luks luksClose myMapper losetup -d /dev/loop0 rm -rf ./test_mountpoint
dd if=/dev/zero of=./volumes/vol_twofish.vol bs=1M count=1
losetup /dev/loop0 ./volumes/vol_twofish.vol
echo password1234567890ABC | cryptsetup-luks -c twofish luksFormat /dev/loop0
cryptsetup-luks luksDump /dev/loop0
echo password1234567890ABC | cryptsetup-luks luksOpen /dev/loop0 myMapper
dmsetup ls
dmsetup table
dmsetup status
cryptsetup-luks status myMapper
losetup /dev/loop1 /dev/mapper/myMapper
#cat ./test_files/2MB_Z.dat > /dev/loop1
#cat ./test_files/2MB_0x00.dat > /dev/loop1
mkdosfs /dev/loop1
mkdir ./test_mountpoint
mount /dev/loop1 ./test_mountpoint
cp ./test_files/SHORT_TEXT.txt ./test_mountpoint
cp ./test_files/BINARY_ZEROS.dat ./test_mountpoint
cp ./test_files/BINARY_ABC_RPTD.dat ./test_mountpoint
cp ./test_files/BINARY_00_FF_RPTD.dat ./test_mountpoint
umount ./test_mountpoint
losetup -d /dev/loop1
cryptsetup-luks luksClose myMapper
losetup -d /dev/loop0
rm -rf ./test_mountpoint
Das Originaldokument ist zu finden unter http://ccf-it.de/tiki-5.0/tiki-index.php?page=DiskEncryption