{"id":1916,"date":"2019-11-10T22:07:27","date_gmt":"2019-11-10T20:07:27","guid":{"rendered":"https:\/\/blog.cipworx.org\/laserman\/?p=1916"},"modified":"2019-11-28T11:36:07","modified_gmt":"2019-11-28T09:36:07","slug":"verschlusselte-ubuntu-partition-mounten","status":"publish","type":"post","link":"https:\/\/blog.cipworx.org\/laserman\/2019\/11\/10\/verschlusselte-ubuntu-partition-mounten\/","title":{"rendered":"verschl\u00fcsselte Ubuntu Partition mounten"},"content":{"rendered":"\n<p>&#8230; mit udisksctl (ubuntu 18.04)<\/p>\n\n\n\n<p><code>sudo apt install libblockdev-crypto2<br \/>sudo systemctl restart udisks2.service<br \/>udisksctl<\/code> <code>unlock -b \/dev\/sdb5<\/code><br \/>Passphrase: <br \/>   Unlocked \/dev\/sdb5 as \/dev\/dm-3.<br \/>l<code>s -la \/dev\/mapper<br \/>udisksctl mount -b \/dev\/mapper\/kubuntu--vg-root<\/code><br \/><br \/><br \/>wieder aush\u00e4ngen:<br \/><code>udisksctl unmount -b \/dev\/mapper\/kubuntu--vg-root<\/code><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>&#8230;mit cryptsetup:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">sudo cryptsetup luksFormat -c aes-xts-plain64 -s 512 -h sha512 -y \/dev\/PARTITION<br \/>sudo cryptsetup luksOpen \/dev\/PATITION NAME<br \/>sudo mkfs.ext4 \/dev\/mapper\/NAME<\/pre>\n\n\n\n<p>Quelle: <a href=\"https:\/\/wiki.ubuntuusers.de\/LUKS\/\">https:\/\/wiki.ubuntuusers.de\/LUKS\/<\/a><br \/><\/p>\n\n\n\n<p>Option f\u00fcr \/etc\/crypttab:<br \/>noauto<br \/>            Entirely ignore the device at the boot process. It&#8217;s still possible<br \/>            to map the device manually using cryptdisks_start.<\/p>\n\n\n\n<p><br \/><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><br \/><br \/><\/p>\n\n\n\n<p><br \/><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8230; mit udisksctl (ubuntu 18.04) sudo apt install libblockdev-crypto2sudo systemctl restart udisks2.serviceudisksctl unlock -b \/dev\/sdb5Passphrase: Unlocked \/dev\/sdb5 as \/dev\/dm-3.ls -la \/dev\/mapperudisksctl mount -b \/dev\/mapper\/kubuntu&#8211;vg-root wieder aush\u00e4ngen:udisksctl unmount -b \/dev\/mapper\/kubuntu&#8211;vg-root &#8230;mit cryptsetup: sudo cryptsetup luksFormat -c aes-xts-plain64 -s 512 -h sha512 -y \/dev\/PARTITIONsudo cryptsetup luksOpen \/dev\/PATITION NAMEsudo mkfs.ext4 \/dev\/mapper\/NAME Quelle: https:\/\/wiki.ubuntuusers.de\/LUKS\/ Option f\u00fcr \/etc\/crypttab:noauto Entirely ignore [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10,4,9],"tags":[152,151],"class_list":["post-1916","post","type-post","status-publish","format-standard","hentry","category-kubuntu","category-linux","category-ubuntu","tag-crypto","tag-ubuntu"],"_links":{"self":[{"href":"https:\/\/blog.cipworx.org\/laserman\/wp-json\/wp\/v2\/posts\/1916","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cipworx.org\/laserman\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cipworx.org\/laserman\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cipworx.org\/laserman\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cipworx.org\/laserman\/wp-json\/wp\/v2\/comments?post=1916"}],"version-history":[{"count":4,"href":"https:\/\/blog.cipworx.org\/laserman\/wp-json\/wp\/v2\/posts\/1916\/revisions"}],"predecessor-version":[{"id":1922,"href":"https:\/\/blog.cipworx.org\/laserman\/wp-json\/wp\/v2\/posts\/1916\/revisions\/1922"}],"wp:attachment":[{"href":"https:\/\/blog.cipworx.org\/laserman\/wp-json\/wp\/v2\/media?parent=1916"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cipworx.org\/laserman\/wp-json\/wp\/v2\/categories?post=1916"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cipworx.org\/laserman\/wp-json\/wp\/v2\/tags?post=1916"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}