Am 14.06.24 um 21:57 schrieb Carlos E. R.:
On 2024-06-14 20:25, Daniel Bauer wrote:
Am 14.06.24 um 19:35 schrieb Carlos E. R.:
On 2024-06-14 15:57, Daniel Bauer wrote:
run:
lsblk --output NAME,KNAME,RA,RM,RO,PARTFLAGS,SIZE,TYPE,FSTYPE,LABEL,PARTLABEL,PTTYPE,MOUNTPOINT,UUID,PARTUUID,WWN,MODEL,ALIGNMENT > somefile.txt
and attach the "somefile.txt" to the reply email here. Do NOT PASTE it here because Thunderbird will want to wrap the lines to size, making it very difficult to read.
That information should help to interpret the situation.
Here's the file...
Tks.
There is /boot partition #1, non encrypted. There is ESP, #3, non encrypted. There is partition #3, encrypted. Inside there is an LVM "whatever", that contains three "spaces", "/", "/home" (both ext4) and "swap".
Yes, the question is if those three "spaces" are fully encrypted because the "container" is, or not. Googling I didn't find a clear answer, but tending to yes :-) Still, if somebody knows, I'd like to know, too...
I don't name the lvm parts because I'm not an lvm connoisseur, so personally I avoid using it.
I only use LVM because the installer proposes it for encrypted systems with only one passphrase entry. In (much) earlier versions of OS I used to encrypt each partition manually with LUKS and it always worked, but somewhen something changed. So now I use LVM, and I don't actually care :-) -- Daniel Bauer photographer Basel Málaga Twitter: @Marsfotografo (often explicit nudes) https://www.patreon.com/danielbauer https://www.daniel-bauer.com (nudes)