From Fedora Project Wiki
No edit summary |
No edit summary |
||
Line 2: | Line 2: | ||
* In ''Create a mapping to allow access to the device's decrypted contents'', after cryptsetup luksOpen <device> <name> it's worth mentioning explicitly that the mapped device should be used from now on and the original device (/dev/sda3) should only be used with LUKS commands or even better not used at all. This will warn users who don't fully understand how device mapper works. --atodorov | * In ''Create a mapping to allow access to the device's decrypted contents'', after cryptsetup luksOpen <device> <name> it's worth mentioning explicitly that the mapped device should be used from now on and the original device (/dev/sda3) should only be used with LUKS commands or even better not used at all. This will warn users who don't fully understand how device mapper works. --atodorov | ||
* In ''Set a randomly generated key as an additional way to access an encrypted block device'' there's not enough info about key files. In particular in one uses $HOME/keyfile and /home is on encrypted device how it will be possible to use the key to decrypt the device? The man page is silent about this and I personally haven't used keys with LUKS. --atodorov |
Revision as of 06:53, 9 September 2008
- In the section Choosing a Good Passphrase there's no info what a good passphrase really is. For example: at least X characters long, containing small and capital letters, digits and punctuation. -- atodorov
- In Create a mapping to allow access to the device's decrypted contents, after cryptsetup luksOpen <device> <name> it's worth mentioning explicitly that the mapped device should be used from now on and the original device (/dev/sda3) should only be used with LUKS commands or even better not used at all. This will warn users who don't fully understand how device mapper works. --atodorov
- In Set a randomly generated key as an additional way to access an encrypted block device there's not enough info about key files. In particular in one uses $HOME/keyfile and /home is on encrypted device how it will be possible to use the key to decrypt the device? The man page is silent about this and I personally haven't used keys with LUKS. --atodorov