Comments on How to Encrypt Directories/Partitions with eCryptfs on Debian 8 (Jessie)
eCryptfs is a POSIX-compliant enterprise-class stacked cryptographic filesystem for Linux. You can use it to encrypt partitions and also directories that don't use a partition of their own, no matter the underlying filesystem, partition type, etc. This tutorial shows how to use eCryptfs to encrypt a directory on Debian Jessie
5 Comment(s)
Comments
Great article! I must ask you, why did you choose 16 key bytes and not 24 or 32 key bytes?
Very cool article! You could even write a udev rule to run a script when the device appears (filtered by device vendor/serial) to mount ecryptfs on-the-fly. You can then also write a similar udev rule to unmount ecryptfs when the usb key is removed, effectively giving you a hardware key that unencrypts your data only when the key is inserted! :)
Hello!
Thanks for the article, very helpful!
But one question – when I want to keep my folder encrypted and do NOT plugin a USB key during boot process I got error like:
Timeout wait for device dev-sda1.device
Dependency failed for /mnt/usd
Dependency failed for Local File System
End boot process ends with root account is looked, starting shell..
How to avoid it and keep folder encrypted and not affect booting process??
Thanks in advance
Is there a typo here? You create a file ~/.ecryptfsrcand then say that you must ensure the signature is put in, but you don't say that it should be in the .ecryptfsrc file.
And then there is no mention that the original sig_cache.txt file should be removed.
To avoid the boot to halt of the USB key is not present add "nofail" as a mount option in fstab.ex.
/home/falko /home/falko ecryptfs defaults,nofail 0 0