Welcome
Welcome to refracta

You are currently viewing our boards as a guest, which gives you limited access to view most discussions and access our other features. By joining our free community, you will have access to post topics, communicate privately with other members (PM), respond to polls, upload content, and access many other special features. In addition, registered members also see less advertisements. Registration is fast, simple, and absolutely free, so please, join our community today!

Alternative usb installation method, part 2

Stuff that has not yet gone into the official build.

Re: Alternative usb installation method, part 2

Postby thwak » Tue Apr 15, 2014 3:43 am

I don't use luks so I didn't notice that limitation of udevil.
FWIW, zuluCrypt is I what I've seen (read) mentioned for reading encrypted block devices.
http://ubuntuforums.org/archive/index.p ... 46292.html
https://github.com/mhogomchungu/zuluCrypt
http://ignorantguru.github.io/misc/zulu ... -12-12.txt
thwak
 
Posts: 165
Joined: Tue Nov 20, 2012 3:58 am

Re: Alternative usb installation method, part 2

Postby fsmithred » Wed Apr 16, 2014 1:08 pm

You can also use udisks directly.
Code: Select all
udisks --mount <device>
udisks --unmount <device>
Yes, that's unmount, not umount.

It won't do encrypted partitions, and it won't let you specify the mountpoint. It mounts at /media/<disklabel> or if there's no no label, it uses the uuid.

Thunar volman lets you mount encrypted partitions without using the root password. I don't know how that works, but looking at top when I mounted an encrypted volume, I saw cryptsetup at the top momentarily.

I also took at look at cryptmount, and it looks like you have to specify who is allowed to mount what in a config file ahead of time. No thanks.

The next few versions of refracta2usb will most likely continue to use pmount.
User avatar
fsmithred
 
Posts: 1987
Joined: Wed Mar 09, 2011 9:13 pm

Re: Alternative usb installation method, part 2

Postby dzz » Wed Apr 16, 2014 1:12 pm

udevil should be OK for the script, if/when pmount disappears. Always best to use official debs.

(OT) I can't get udevil to open normal ext* image files RW (bug report sent).. "fuseext2" can. Also I found another (really good) way to mount LUKS partitions/files as user: https://packages.debian.org/search?keywords=cryptmount

I also took at look at cryptmount, and it looks like you have to specify who is allowed to mount what in a config file ahead of time.

Works right away here, for user. For a file, no need for manual losetup. You need only an entry in /e-t-c/cryptmount/cmtab beginnig with a "mapper name". A symlink works for dev=

Code: Select all
luks-data {
keyformat=luks
dev=/block/device/or/file
dir=/path/to/mountpoint
fstype=ext2
}

Then simply:
Code: Select all
:~$ cryptmount luks-data
Enter password for target "luks-data":
########
cryptmount -u luks-data

udisks seems limited to removable block devices
dzz
 
Posts: 629
Joined: Wed Apr 27, 2011 11:53 am
Location: Devon, England

Previous

Return to Experimental

Who is online

Users browsing this forum: No registered users and 0 guests

suspicion-preferred