From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from v6.tansi.org (ns.km31936-01.keymachine.de [87.118.116.4]) by mail.server123.net (Postfix) with ESMTP for ; Fri, 12 Dec 2014 13:11:09 +0100 (CET) Received: from gatewagner.dyndns.org (77-57-49-177.dclient.hispeed.ch [77.57.49.177]) by v6.tansi.org (Postfix) with ESMTPA id B2B7120DC210 for ; Fri, 12 Dec 2014 13:11:08 +0100 (CET) Date: Fri, 12 Dec 2014 13:11:08 +0100 From: Arno Wagner Message-ID: <20141212121108.GA29099@tansi.org> References: <20141211220453.GA24563@citd.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20141211220453.GA24563@citd.de> Subject: Re: [dm-crypt] question List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: dm-crypt@saout.de On Thu, Dec 11, 2014 at 23:04:53 CET, Matthias Schniedermeyer wrote: > On 11.12.2014 18:30, Sayler, Craig A. (AFRC-MI)[InuTeq, LLC] wrote: > > Is there a way to decrypt a drive permanently with out reinstalling? > > Yes. > > But the much safer way is: > Backup, make a new filesystem on the previous backing-device & Restore > from backup. > > > The unsafe(!) 'inplace' method (that as an advantage doesn't need > additional storage): > Just open the container normally, 'dd' the mapped container over the > backing device and pray that process isn't interruped. Because it will > be a huge PITA if it gets interruped. > > > But don't risk it, Backup & Restore is the way this should be done. Interesting approach! Should work though. But you are right that this is very high risk. Arno -- Arno Wagner, Dr. sc. techn., Dipl. Inform., Email: arno@wagner.name GnuPG: ID: CB5D9718 FP: 12D6 C03B 1B30 33BB 13CF B774 E35C 5FA1 CB5D 9718 ---- A good decision is based on knowledge and not on numbers. -- Plato If it's in the news, don't worry about it. The very definition of "news" is "something that hardly ever happens." -- Bruce Schneier