Tagged Questions
encoding information in a way so that it can only be decoded if a secret is known; used to prevent exposure of data to other parties
0
votes
1answer
13 views
What are the folder that I cannot set as encrypted folders decrypted at login? [on hold]
I want maximize the number of folders encrypted with ecryptfs and decrypted at login with the module pam_ecryptfs.so.
Which folders cannot possibly be encrypted before login in?
I guess a lsof ran ...
-1
votes
1answer
31 views
How To F2FS Filesystem Encryption?
I read that the f2fs format is good for SSD storage so I formatted one of my drives with it. I also read in some kernel notes that encryption was added for it but there's no documentation to speak of. ...
6
votes
0answers
63 views
+500
gnupg 2.1.16 blocks waiting for entropy
Releases of gnupg from 2.1.16 (currently 2.1.17) block waiting for entropy only on first invocation.
Note: this isn't an attempt to generate a key, just to decrypt a file and start the agent.
The ...
0
votes
1answer
25 views
OpenSSL Usage to decrypt a string
I apologise if this is not the correct community.
I have a string that I believe was encrypted using an RC2 cipher. I know the secret key and the IV but I am struggling to decrypt it using OpenSSL. ...
0
votes
0answers
8 views
Xarchiver/PeaZip and multipart encrypted archives
As an archive utility I prefer Xarchiver or PeaZip, because I don't use a desktop environment.
Sadly I can get neither, not Xarchiver (0.5.47, just hangs) nor PeaZip (6.0 "illegal hardware ...
0
votes
0answers
10 views
add encrypted disk from previous setup [Debian]
I had two disks on my Linux, both were encrypted with LVM set during installation. First disk had system and everything, second had one partition and was mounted as /opt. First disk has failed and I ...
0
votes
0answers
63 views
Toward a maximized functional encryption [closed]
I want to have all files individually encrypted except those that are used by specific program called in an ad hoc manner.
Which strategy would you use to decrypt all files that are used in a ...
0
votes
0answers
15 views
Data at Rest Encryption Centos
For Centos 7, is there data at rest software already loaded with the OS? If there is data at rest software can you tell me what the name is?
1
vote
1answer
23 views
How to encrypt the ffmpeg output when generating video chunks?
I can openssl encrypt a ffmpeg video stream with
ffmpeg -i video1.mp4-video1.mp4.mp4 -f ogg - |
openssl enc -des3 > outptu.ogg.des3
Which strategy would you use to encrypt the ffmpeg output ...
3
votes
1answer
25 views
Encrypt with GPG using a key passed as CLI argument
I want to create a script that would automatically encrypt and push to GitHub into public repo some sensible files I don't want to expose (but do want to keep together with the whole project).
As a ...
0
votes
0answers
11 views
Using AES implementation/libraries/packages in linux [duplicate]
I'm using openwrt distribution and I'm trying to encrypt a file using AES, I found out that many AES files/libraries existing in openwrt (running locate aes I can see them)
Is it possible to use ...
0
votes
1answer
23 views
Testing password against encrypted ext2 container
I have a encrypted container containing a mountable EXT2 file system with no partition table. How can I mount that file using cryptsetup? My attemps fail with 'VFS: cant find ext4 filesystem'...
1
vote
0answers
40 views
Rewrapping the passphrase makes encryption disappear
I was exploring the possibility of changing the login password of ecryptfs. In this system (Ubuntu 14.04 LTS) the login password for ecryptfs and that for the Linux user are the same. My ecryptfs-...
1
vote
1answer
18 views
AES encryption for openwrt distribution
I'm using openwrt distribution and I want to encrypt a file using AES. How can I do that quickly and easily, and how can I - or someone else -decrypt it again?
1
vote
1answer
9 views
GPG encryption with gradual deletion in parallel
Say I have a 100GB file that I want to GPG encrypt on a system with 120GB hard drive memory and a small RAM.
How can I decrypt the file without using an external memory, that is gpg encrypt a file ...
0
votes
0answers
23 views
Is multiple ecryptfs encryption possible?
Is multiple ecryptfs encryption possible?
How to encrypt a folder called level2 with ecryptfs that is inside a ecryptfs mounted folder called level1?
level1 and level2 folder are organized as
# ...
0
votes
1answer
39 views
How to encrypt a string with my SSH pubkey?
If I only have an SSH pubkey, how can I encrypt an ex.: IP address (so a short string), only using the ssh pubkey?
For decryption, the other party would have the pair of the pubkey, so the private ...
1
vote
1answer
19 views
Cannot install loop-aes-utils on debian 8.0
I need to install the package loop-aes-utils on Debian 8.0 to following this Ubuntu tutorial.
It is not in Debian official package however.
Would it be the aespipe package or is it another package?
...
0
votes
1answer
31 views
Installing on encrypted HDDs
I am trying to install kali linux on one SSD and linux mint on the other SSD.
Both instalations are encrypted using LVM encryption. Linux mint works great and also kali linux boots up the first time ...
1
vote
1answer
16 views
How to set a machine specific encryption to allow only one machine to decrypt data
Security is highered if only one machine can do the decryption.
How would you suggest to allow only one computer to be able to decrypt an LUKS partition?
I would simply need to get a set of variable ...
0
votes
0answers
115 views
Creating elliptic curve keys and certs (ECC and ECDH) for openvpn server
I have a raspi at home with openvpn so I can safely browse the internet when I use my laptop or phone in a public place (coffee shop, bar, hotel...) that has open wifi.
I want make my openvpn server ...
0
votes
0answers
16 views
How to repair corrupted directory in LUKS filesystem?
I have lost certain data for unknown reason on a LUKS encrypted partition.
Some folders are working properly whereas for some others I have an output like this:
# ls foldername
┐╣╧▒ⁿ£─{.]=? à╝ö┐?░...
0
votes
0answers
17 views
How to encrypt a partition multiple times?
Is it possible to use cryptsetup only to encrypt a partition multiple times?
If not, what would you suggest to use to encrypt a partition say, 3 times in the most reliable way?
0
votes
2answers
42 views
How to hide the encrypted version of a file put in a cryptfs filesystem?
Say I create an encrypted folder and add a file to it:
# mount -t ecryptfs /srv /srv
# echo word > /srv/file
The content of file is unavailable only after unmounting the filesystem.
How can I ...
1
vote
2answers
21 views
Is it easy to recover an encryption password from a compiled encryption script only?
Can a encryption password <password> in compiled script script.x be easily recovered?
The source version of script.x would be for instance
# cat script
openssl enc -des3 -in myfile -out ...
4
votes
2answers
46 views
How to gradually encrypt the tshark output file along the capture?
In order to secure a packet capture, which method would you use to make all (or close to all) past captured packet utterly unaccessible unless a given password is given.
My habbits are
to mount an ...
1
vote
1answer
11 views
What is the fastest way of checking a encfs password?
Is there any faster way of checking the password of an encfs folder than
echo <password> | encfs -S /root/.folder /root/folder
1
vote
1answer
19 views
Encrypted home folder and email
I'd like to encrypt my home folder in CentOS. I notice Dovecot has created directories and files under ~/mail. If I encrypt, will my email stop working (remote access over imap and smtp)?
3
votes
2answers
59 views
How can I encrypt a folder in linux using only the command line?
I need to encrypt a folder with documents (about 560kb if that makes any difference) and I was wondering whether it was possible to accomplish that using the command line?
I am searching for ...
0
votes
0answers
14 views
Which encryption utility allows data autodeletion after a certain amount of repeated wrong decryption?
Which encryption utility allows data auto-deletion after a certain amount of repeated wrong decryption?
For instance, data may be auto deleted after someone enter, say 20 times the wrong decryption ...
1
vote
2answers
37 views
zero knowledge encryption
I'm looking to deploy a solution where large files are generated on the server containing customer sensitive information. Customers' can then login and download these files.
My question is "is there ...
1
vote
1answer
37 views
Exporting public keys using gpg
In this web page GNU, it says that exporting public key using the command below will generate a public key without the secret key.
gpg --armor --export [email protected] > mykey.asc
If person B ...
2
votes
1answer
245 views
How to encrypt if public key does not have email
How to encrypt a file using the command below, if the recipient mail is not showing up when I type the --list-keys command.
Sample Encrypt file command using GPG
gpg --output "output_filename" --...
1
vote
1answer
18 views
Revert initramfs to an earlier state after setting up Dropbear for early LUKS decryption
I've tried to set up Dropbear and Busybox on my virtualization host running Debian Jessie, so I could unlock the encrypted filesystems from the initramfs, before the actual boot. I've followed this ...
0
votes
2answers
52 views
After encrypting a disk, how do you check that a known plain-text inside the disk became gibberish? [closed]
I encrypted a disk using cryptsetup. I want to be able to visualize that a known text before encrypting the disk became gibberish after encrypting.
How do I do such comparison?
Here's an example ...
2
votes
0answers
40 views
Storing application secrets safely [closed]
I have a linux network service that needs to read a secret to decrypt some data. The application also allows the users to change the encryption password during runtime. The application will run under ...
2
votes
1answer
127 views
Disable Arcfour encryption
I'm new to this but have been searching everywhere for a clear answer.
To pass PCI compliance the Arcfour cipher should be disabled.
I've tried to edit the ciphers in my sshd_conf and ssh_conf files ...
2
votes
0answers
37 views
Macbook pro retina 2013 with full disk encryption boot issue
I have installed Ubuntu 15.10 on Macbook Pro Retina late 2013. It was working well until I break the boot by reinstalling grub.
Now I am not able to repair it.
I have three partitions:
/dev/sda1 - /...
0
votes
3answers
52 views
Is there a utility to encrypt a file with a key I created? [closed]
I'd like to encrypt a file (using AES 256) with a key that I create and manage myself. Is there any linux command line utilty that supports this? gpg does not, and I don't think openssl does either?
...
0
votes
1answer
321 views
“No such file or directory” when generating a gpg key
I'm trying to generate a gpg key
$ gpg --full-gen-key
but eventurally I get an error
gpg: agent_genkey failed: No such file or directory
Key generation failed: No such file or directory
I'm on ...
3
votes
0answers
32 views
Configuring IPSec with PSK
I'm struggling with IPSec while trying to configure to a Windows server. I need to use IPSec only in the 172.30.1.0/24 network.
Linux Settings
Running in AWS EB 4.4.15-25.57.amzn1.x86_64 GNU/Linux, ...
3
votes
1answer
28 views
How to gradually delete a file in parallel to encryption?
I need to encrypt a huge file but don't have sufficient storage on my hard-drive to store the file and its encrypted version at the same time.
It appears possible to gradually delete the file ...
0
votes
1answer
49 views
How to recover encrypted partition after dd command [closed]
I wanted to create bootable usb (dd bs=4M if=input.iso of=/dev/sdc) but sdc is my hard disk with two partitions: 1 simply ext4 and 2 encrypted LUKS. After this action I got Windows installed on my ...
1
vote
0answers
24 views
Recovering files from a decrypted .Private directory
Using Linux Mint 17 Cinnamon 64-bit.
Originally, I asked this on askubuntu - http://askubuntu.com/questions/831300/cannot-see-contents-of-home-directory-after-error-and-restart - and was then told to ...
0
votes
0answers
16 views
How can I copy a fedora-encrypted partition?
For some reasons probably related to GRUB2, fedora doesn't boot on my computer. I plan to make a recommended repair with boot-repair in order to fix that, but before, I'd like to back-up my data.
The ...
12
votes
2answers
798 views
Is it possible to encrypt a hard disk with a key file instead of a password?
Looking into hard disk encryption. the go to solution seems to be dm-crypt with LUKS using a password. I work with multiple independent hard disks mounted into a disk pool for reading. In this case, I ...
0
votes
0answers
39 views
Backup of encrypted Linux image won't restore on a different machine
When I tried to restore a backup image of a Linux machine on another PC. The backup is from a previously encrypted drive using full drive encryption. I am having trouble restore this image on a ...
0
votes
1answer
36 views
RSA: private key safety? (ssh/gpg) [closed]
I would like to know about the safety of RSA based encryption, especially when used to encrypt files with gpg or encrypt connections over ssh.
Is it possible to reconstruct a working private key, ...
0
votes
0answers
28 views
How do I pimp my BT keyboard's encryption security in Arch Linux?
I'm building an ultra compact Desktop rig that's going to be the size of a large laptop.
Ideally I'd like to use the Logitech K810 as its keyboard because it's very compact, it's got a great rep for ...
-1
votes
1answer
20 views
rsync 'flip' characterization [closed]
I ran across an example pair where there was an original and a 'flip' version:
Original
rsync -aHAXxv --numeric-ids --delete --progress -e "ssh -T -c arcfour -o Compression=no -x" user@<source>...