-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On Tuesday, 2012-08-14 at 03:50 +0200, Peter Hanisch wrote:
Hej!
I don't mean to hijack this thread (and I'm new to the mailing list), so please bear with me for a second:
The trick is to branch the thread, changing the subject line like this: Booting encrypted LVM [Was: 12.2RC2 with encrypted partition - systemctl keeps asking for the passphrase] :-) it has to be related to the original thread; if you start a completely new subject and don't relate to the previous one nor in the subject nor in the text, then it is a hijack and you will get spanked ;-) Have a look at this guide: http://en.opensuse.org/openSUSE:Mailing_list_netiquette
This seems to be LVM over cryptsetup.
What's the purpose of /etc/crypttab to begin with in a setup with an encrypted root partition? I'm running encrypted / (encrypted everything, really) on Tumbleweed and do not have /etc/crypttab at all. My understanding is that by the time systemd, mount or systemctl become active during boot, the unlocking of the encrypted root partition has to have happened already, because we wouldn't even get to systemctl etc without. The unlocking of / happens during the initrd phase, so isn't /etc/crypttab superfluous? And does the actual name of the encrypted partition/device (in the case of LVM) really matter at all?
Well, the initrd archive can contain a copy of /etc/crypttab to be read during boot. But encripted partitions are automatically detected, there is a standard (Linux standard?) for that called LUKS. - -- Cheers, Carlos E. R. (from 11.4 x86_64 "Celadon" at Telcontar) -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.16 (GNU/Linux) iEYEARECAAYFAlAtVcIACgkQtTMYHG2NR9XN/QCfQ1eCB+nu/Uik6HKfztVbe1qu gKUAn2cNeDD//H0kW4/vRUm0D+NsbigD =9Cgw -----END PGP SIGNATURE----- -- To unsubscribe, e-mail: opensuse-factory+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse-factory+owner@opensuse.org