Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
View | Details | Raw Unified | Return to bug 24213 | Differences between
and this patch

Collapse All | Expand All

(-)config/pam_mount.conf.orig (-1 / +1 lines)
Lines 79-85 Link Here
79
# source in mount.c (it sends the password to the stdin file descriptor
79
# source in mount.c (it sends the password to the stdin file descriptor
80
# of the child process -- look for STDIN_FILENO).
80
# of the child process -- look for STDIN_FILENO).
81
#
81
#
82
lsof /usr/bin/lsof %(MNTPT)
82
lsof /usr/sbin/lsof %(MNTPT)
83
fsck /sbin/fsck -p %(FSCKTARGET)
83
fsck /sbin/fsck -p %(FSCKTARGET)
84
losetup /sbin/losetup -p0 "%(before=\"-e\" CIPHER)" "%(before=\"-k\" KEYBITS)" %(FSCKLOOP) %(VOLUME)
84
losetup /sbin/losetup -p0 "%(before=\"-e\" CIPHER)" "%(before=\"-k\" KEYBITS)" %(FSCKLOOP) %(VOLUME)
85
unlosetup /sbin/losetup -d %(FSCKLOOP)
85
unlosetup /sbin/losetup -d %(FSCKLOOP)
(-)config/pam_mount.conf.orig (+40 lines)
Lines 197-202 Link Here
197
# (thanks to Mike Hommey for this example)
197
# (thanks to Mike Hommey for this example)
198
# volume test local - /tmpfs/test /home/test "size=10M,uid=test,gid=users,mode=0700 -t tmpfs" - -
198
# volume test local - /tmpfs/test /home/test "size=10M,uid=test,gid=users,mode=0700 -t tmpfs" - -
199
199
200
# BEGIN GENTOO EXAMPLES FOR ENCRYPTED HOME
201
# user1 has an encrypted home that uses his/her system passwd as the
202
# encryption key
203
# To create a USB dongle secured user see user2:
204
# Define a user key and group key to use a USB dongle as an encrypted
205
# file system for the key to the user2 file system - so user would need
206
# the USB dongle, the password for user key and the password for user
207
# user2. in order to access the encrypted home of user2. Note that
208
# without the first two the user can still log in and create files
209
# on his home directory mount point. However the security for the
210
# encrypted volume is much better since a dictionary attack would need
211
# the dongle. See http://www.counterpane.com/twofish-final.html
212
# for a discussion on why twofish is a good choice. This setup works
213
# with mm-sources-2.6.0_beta9-r5. So to login graphically as user2
214
# insert key, ctrl-alt-f1 login as key, alt-f7, login as user2,
215
# ctrl-alt-f1, logout key, remove dongle. This works for KDM. Modify
216
# /etc/pam.d/login and /etc/pam.d/kde per docs
217
#volume key local - /dev/sda2 /key loop,encryption=twofish - -
218
#volume user1 local - /home/.user1 /home/user1 loop,encryption=twofish - -
219
#volume user2 local - /home/.user2 - - bf-ecb /key/sp.key
220
# /etc/fstab contains
221
#/home/.user2  /home/user2  reiserfs    user,loop,encryption=twofish,noauto     0 0
222
#/dev/sda2     /key         ext2        user,loop,encryption=twofish,noauto     0 0
223
#
224
# Device-Mapper based encryption (dm-crypt)
225
# Since the introduction of dm-crypt in Linux 2.6.4, cryptoloop has been
226
# deprecated. To use the new dm-crypt interface, you will have to adapt
227
# the preceding examples to use "crypt" instead of "local" as filesystem
228
# type. Additionally the cipher algorithm is specified via the "cipher"
229
# option (to distinguish from cryptoloop's "encryption"). Thus, the
230
# user1 example would look like this:
231
#volume user1 crypt - /home/.user1 /home/user1 loop,cipher=twofish - -
232
# An entry in /etc/fstab is not needed. A detailed HOWTO can be found in
233
# the forums: http://forums.gentoo.org/viewtopic.php?t=274651
234
# Note that pam_mount is LUKS (http://luks.endorphin.org) aware. To
235
# use luks, you need to have cryptsetup-luks (get it at 
236
# http://luks.endorphin.org/dm-cryp) installed. A config line would be
237
#volume user1 crypt - /dev/yourpartition /yourmountpoint - - -
238
# and cryptsetup will be told to read cypher/keysize/etc. from the luks-header.
239
# END GENTOO EXAMPLES
200
240
201
# Details:
241
# Details:
202
# Local user configuration (~/.pam_mount.conf) can extend this.
242
# Local user configuration (~/.pam_mount.conf) can extend this.
(-)scripts/umount.crypt (-1 / +1 lines)
Lines 28-34 Link Here
28
export IFS=`echo -en " \t\n"`;
28
export IFS=`echo -en " \t\n"`;
29
29
30
LOSETUP=/sbin/losetup
30
LOSETUP=/sbin/losetup
31
CRYPTSETUP=/sbin/cryptsetup
31
CRYPTSETUP=/bin/cryptsetup
32
MOUNT=/bin/mount
32
MOUNT=/bin/mount
33
UMOUNT=/bin/umount
33
UMOUNT=/bin/umount
34
READLINK="/usr/bin/readlink";
34
READLINK="/usr/bin/readlink";
(-)scripts/mount.crypt (-1 / +1 lines)
Lines 28-34 Link Here
28
28
29
# Commands
29
# Commands
30
LOSETUP=/sbin/losetup
30
LOSETUP=/sbin/losetup
31
CRYPTSETUP=/sbin/cryptsetup
31
CRYPTSETUP=/bin/cryptsetup
32
MOUNT=/bin/mount
32
MOUNT=/bin/mount
33
FSCK="/sbin/fsck";
33
FSCK="/sbin/fsck";
34
34

Return to bug 24213