On Fri, Mar 27, 2015 at 4:48 PM, Bjoern Voigt
Yes, /boot must be unencrypted. But unfortunately in openSUSE "/" can't be encrypted without LVM even if there is a separate /boot partition. I already discussed this issue with developers here some time ago. It's probably something, which should be done sometime. But I also don't know a distribution which can handle full-disk encryption without LVM. I don't know an existing feature request for this.
Fedora does.
Now I have done this slightly different. I configured Host-Raid/Fake-RAID on one server. I can manage the RAID with "dmraid" and the BIOS. openSUSE 13.2 handled this without problems during installation. On top of the Fake-RAID I partitioned the RAID device like a single hard disk.
dmraid? Are you sure? If this is Intel firmware RAID, the dmraid support is deprecated. It's all been moved to md/mdadm these days. Otherwise, it sounds fine. -- Chris Murphy -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org