From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-ee0-x235.google.com (mail-ee0-x235.google.com [IPv6:2a00:1450:4013:c00::235]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by mail.saout.de (Postfix) with ESMTPS for ; Mon, 28 Apr 2014 06:15:04 +0200 (CEST) Received: by mail-ee0-f53.google.com with SMTP id b57so4391039eek.40 for ; Sun, 27 Apr 2014 21:15:03 -0700 (PDT) Message-ID: <535DD5C5.1080902@gmail.com> Date: Mon, 28 Apr 2014 06:15:01 +0200 From: Milan Broz MIME-Version: 1.0 References: <20140427203216.GA29997@tansi.org> In-Reply-To: Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 8bit Subject: Re: [dm-crypt] Encrypted LVs /root, /home, and swap mount at boot, as does 'shared' data LV but without write access? List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: =?UTF-8?B?RMOhaXJlIEZhZ2Fu?= , dm-crypt@saout.de On 04/27/2014 11:20 PM, Dáire Fagan wrote: > Hi > > I have asked for support on the Ubuntu forums, and many non distro > linux forums, I thought someone here might be able to help me as I am > trying to mount a logical volume with write access that is part of a > crypsetup encrypted physical volume - I figured people on this mailing > list would have experience of this. According to list of your devices, it is activated as read/write. (Check it from the bottom to up - use lsblk to display volume stack and then "dmsetup info", "cryptsetup status ", lvs/lvdisplay, mount should verify that all layers are activated properly.) Anyway, it is distro specific how to properly update initramfs to activate volume on boot... (On Debian this works quite nice so I see no reason Ubuntu should differ here, but really, this is not Ubuntu support forum.) Check /etc/fstab and /etc/crypttab (crypt device must be there). Also check access rights to device nodes and directory where are you mounting fs. BTW you can probably change activated name in /etc/crypttab. > Is the encryption method I used best practice? ... >>> When I do this over I will run cryptsetup benchmark first to see which >>> iteration and algorithm works best for my system. Be sure you understand consequences of switching parameters (it is not only about speed). It is better to stick with defaults if you are not sure. Milan