![]() I won't bother with the various messages I got but suffice to say that Truecrypt is not working on my 18.04 LTS install. As a test, I created a container and then tried to mount it and that also failed. However, it will not decrypt any of my existing encrypted folders. I see that Truecrypt doesn't seem to be included in the standard distro so I installed it manually. I have quite a few folders that have been encrypted using Truecrypt. This machine happens to have an AMD processor. I downloaded the standard amd iso and installed Ubuntu without disk encryption (or LVM). I recently installed 18.04 on a crash dummy machine for testing and it mostly is working quite well. I have been anticipating upgrading them to 18.04LTS. This was something handy I discovered yesterday that I thought I might share.I have several desktops running 16.04LTS. I'm running Ubuntu 8.10, but it might work fine with other versions too. create a new user (let's call him or her 'work') Quickly and not in too much detail you can do the following: If you have a user on your laptop, such as one you use for work related material, that you want to secure.but you don't want to encrypt the whole drive, this is for you. deb package for it that's easy to install. create an encrypted file/disk image (not partition). You'll find the instructions for how to on the web. # Stolen from the debian kdm setup, aren't I sneaky in my case I called the file workimage.tc and placed it in /home, but you can place it anywhere as long as the 'work' user owns it and can read and write to it. Now when you boot the computer, just before the login screen you'll get a popup asking you for the password for workimage.tc (it also asks when switching users.or complain that it's already mounted if it is). Pressing Cancel on the password prompt will go on to the login screen, letting you use the other users without mounting the truecrypt image. ![]() It's pretty easy to setup, and lets you run a mix of encrypted and non-encrypted users on the same machine. It is not 100% secure though, as you're only encrypting that users files and settings, and not your logs or swap space. For that you would need whole drive encryption. :evil:Ī little step-by-step tutorial for the process I used (Ubuntu 10.04 圆4):ĭownload the appropriate Standard Linux package for TrueCrypt from: The 'work' folder itself should be 99.99% secure provided you've used a long random password (and nobody captures you and tortures the password out of you). (Of course there's probably a way to pass the password not in plaintext that I didn't discover.) This process can be done using the console package, but requires saving the encryption password in plaintext nullifying any improvement in security. Tar -xzvf truecrypt-7.0a-linux-圆4.tar.gzįor some reason I had to make the file executable:įollow the simple installation procedure, then create your encrypted volume: #Ubuntu truecrypt alternative password Now we need to copy your existing home folder into the encrypted volume, but we can't do that while you're logged in. If you already have another admin user you can log in to skip this step. Otherwise let's make a new user and allow it to sudo. Log out and log back in as the new user or hit ctrl+alt+f1 to go straight to the commandline. Next we'll relocate your home folder and then recreate it, but now empty (to serve only as a mountpoint for the encrypted volume). Now we need to copy your home folder data into the encrypted volume. First mount the encrypted volume.Īlmost there, now we add the instructions for your encrypted volume to be mounted when gdm starts. Insert the following code with your username and path to your encrypted container inserted. (I put these lines directly above "exit 0".) I've added a check to make sure the volume isn't already mounted, otherwise gdm was hanging on startup for me when it crashed or I had to restart it. If !(echo `mount` | grep -q "/home/ type")įinally you can restart gdm and see if it worked. (If you don't get any errors then it worked, the idea is that everything SHOULD look the same.)ġ. If everything is working you should “sudo rm -rf /home/backup” since having an unencrypted copy of files you've just encrypted is silly. If you're really worried you could copy those files off to some other secured backup medium.Ģ. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |