Mailinglist Archive: opensuse-security (19 mails)

< Previous Next >
RE: [opensuse-security] Inserting Boot Passphrase to decrypt hard drive
  • From: Dave Ellingsberg <Dave.Ellingsberg@xxxxxxxxxxxx>
  • Date: Tue, 8 Jul 2014 11:19:47 +0000
  • Message-id: <9A308D3C14B14344B3CD5A95844003734F450388@wfpexmbx1>
Try pasting to a word processor then copy again and paste into your VM session.
I have to do this with linux and VDI or other VMs. PIA but it gets job done.

Bigfoot.

-----Original Message-----
From: Keith Roberts [mailto:keith.roberts@xxxxxxxxxxxx]
Sent: Tuesday, July 08, 2014 5:55 AM
To: opensuse-security@xxxxxxxxxxxx
Subject: [opensuse-security] Inserting Boot Passphrase to decrypt hard drive

Greetings all.

At work we have a set of VM's that are all using encryption on their hard
drive images.

The current way to insert the decryption key is by using vncviewer which can be
quite time consuming and error prone as we have to manually type the passphrase
into the vncviewer, because copy and paste is not working on my iMac.

Is there a better way you know of please how to insert the passphrase to allow
the VM to boot up normally.

We have discussed a separate boot partition that is not encrypted, but this is
not a viable alternative.

TIA

Keith Roberts



--
To unsubscribe, e-mail: opensuse-security+unsubscribe@xxxxxxxxxxxx
To contact the owner, e-mail: opensuse-security+owner@xxxxxxxxxxxx


--
To unsubscribe, e-mail: opensuse-security+unsubscribe@xxxxxxxxxxxx
To contact the owner, e-mail: opensuse-security+owner@xxxxxxxxxxxx

< Previous Next >
This Thread
Follow Ups
References