![](https://seccdn.libravatar.org/avatar/77cb4da5f72bc176182dcc33f03a18f3.jpg?s=120&d=mm&r=g)
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 The Saturday 2006-06-17 at 13:46 -0700, kai wrote: ...
Is this something you use with partitioner? I mean, do you install the software then create a virtual partition in YaST or do you just run the software and it creates the virtual encrypted partition?
Yast can create the partition, or, an encrypted filesystem residing in a big file in another partition. Time ago they were defined in /etc/cryptotab, but since I'm not sure when (9.3?) they are defined directly in /etc/fstab. The first method implied running the script "/etc/init.d/boot.crypto start" to "open" them. The second one works with just a normal "mount" command. If the entry has a "noauto" option, it will not be mounted on boot.
When making a backup - kdar or otherwise - does the encryption information go along with the partition?
If the partition is "open" and you backup the files, they will be saved in clear. However, you can 'dd' the raw partition or the file where it resides to the backup media. I posted a small howto on that here, by the way. Trick: if you create an encrypted partition on a file of the exact size of the raw backup media, you can backup it fast and with the same encryption phrase, for example to a CD or DVD, and later mount it read only. - -- Cheers, Carlos Robinson -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.0 (GNU/Linux) Comment: Made with pgp4pine 1.76 iD8DBQFEmZi0tTMYHG2NR9URAsMeAJ9L38rvk3GxCxRn9rBIeeB5rUTQGACfY1hA XEPtdUVVTD00KjNzzkxNcWo= =8mQ3 -----END PGP SIGNATURE----- -- Check the headers for your unsubscription address For additional commands send e-mail to suse-linux-e-help@suse.com Also check the archives at http://lists.suse.com Please read the FAQs: suse-linux-e-faq@suse.com