Stuff that has not yet gone into the official build.
Post a reply

Re: Alternative usb installation method, part 2

Tue Apr 15, 2014 3:43 am

I don't use luks so I didn't notice that limitation of udevil.
FWIW, zuluCrypt is I what I've seen (read) mentioned for reading encrypted block devices.
http://ubuntuforums.org/archive/index.p ... 46292.html
https://github.com/mhogomchungu/zuluCrypt
http://ignorantguru.github.io/misc/zulu ... -12-12.txt

Re: Alternative usb installation method, part 2

Wed Apr 16, 2014 1:08 pm

You can also use udisks directly.
Code:
udisks --mount <device>
udisks --unmount <device>
Yes, that's unmount, not umount.

It won't do encrypted partitions, and it won't let you specify the mountpoint. It mounts at /media/<disklabel> or if there's no no label, it uses the uuid.

Thunar volman lets you mount encrypted partitions without using the root password. I don't know how that works, but looking at top when I mounted an encrypted volume, I saw cryptsetup at the top momentarily.

I also took at look at cryptmount, and it looks like you have to specify who is allowed to mount what in a config file ahead of time. No thanks.

The next few versions of refracta2usb will most likely continue to use pmount.

Re: Alternative usb installation method, part 2

Wed Apr 16, 2014 1:12 pm

udevil should be OK for the script, if/when pmount disappears. Always best to use official debs.

(OT) I can't get udevil to open normal ext* image files RW (bug report sent).. "fuseext2" can. Also I found another (really good) way to mount LUKS partitions/files as user: https://packages.debian.org/search?keywords=cryptmount

I also took at look at cryptmount, and it looks like you have to specify who is allowed to mount what in a config file ahead of time.

Works right away here, for user. For a file, no need for manual losetup. You need only an entry in /e-t-c/cryptmount/cmtab beginnig with a "mapper name". A symlink works for dev=

Code:
luks-data {
keyformat=luks
dev=/block/device/or/file
dir=/path/to/mountpoint
fstype=ext2
}

Then simply:
Code:
:~$ cryptmount luks-data
Enter password for target "luks-data":
########
cryptmount -u luks-data

udisks seems limited to removable block devices
Post a reply