Sample Header Ad - 728x90

Unix & Linux Stack Exchange

Q&A for users of Linux, FreeBSD and other Unix-like operating systems

Latest Questions

4 votes
1 answers
3267 views
How can ubuntu/truecrypt be configured so users can mount volumes if-and-only-if they have proper permissions on the mount-point?
If I add the line: `ALL= /usr/bin/truecrypt` to the sudoers file this lets all users mount volumes at arbitrary mount-points. The problem is a user could create a truecrypt volume and then mount it at `/etc/apache2` or `/var/www` -- directories which they shouldn't be able to tamper with. If a user...
If I add the line: ALL= /usr/bin/truecrypt to the sudoers file this lets all users mount volumes at arbitrary mount-points. The problem is a user could create a truecrypt volume and then mount it at /etc/apache2 or /var/www -- directories which they shouldn't be able to tamper with. If a user doesn't have sudo rights to run /usr/bin/truecrypt then truecrypt fails after prompting for the administrator/user password. What's the proper way to configure the system/truecrypt so users can mount volumes in a sane/safe way? **e.g. they can only mount volumes to mount-points which they own (or have write-access to)?**
sente (151 rep)
Mar 23, 2012, 06:44 AM • Last activity: May 20, 2025, 06:08 PM
4 votes
2 answers
8122 views
Open VeraCrypt file with cryptsetup/LUKS
Can cryptsetup be used to open a veracrypt file like crypsetup/dm-crypt can open luks? What is the correct process ? Want to make sure other software can open veracrypt file , command line or gui is fine, as long as it can open a veracrypt file. Tried: - `sudo cryptsetup tcryptOpen '/media/path/to/v...
Can cryptsetup be used to open a veracrypt file like crypsetup/dm-crypt can open luks? What is the correct process ? Want to make sure other software can open veracrypt file , command line or gui is fine, as long as it can open a veracrypt file. Tried: - sudo cryptsetup tcryptOpen '/media/path/to/veracrypt/file' stuff - sudo cryptsetup --type --tcryptOpen ''/media/path/to/veracrypt/file' stuff - cryptsetup tcryptOpen '/media/path/to/veracrypt/file' stuff The @Vojtech Trefny answer below seemed to work, but with an error:
sudo cryptsetup --type tcrypt --veracrypt open '/media/path/to/veracrypt/file' stuff
Enter passphrase for /media/...: 
Device '/media/path/to/veracrypt/file' is too small.
``` password was able to open the veracrypt file using veracrypt, but not using cryptsetup. Additional note: This is command allowed me to access veracrypt/truecrypt files using cryptsetup sudo cryptsetup --type tcrypt open container-to-mount container-name kenfavors.com has a simple example page that may be useful to anyone having similar problem described above
t09 (71 rep)
Mar 10, 2021, 07:33 AM • Last activity: Jul 26, 2024, 07:29 PM
1 votes
2 answers
2191 views
crunch wordlist generation with all combinations
I'm trying to generate a wordlist in order to use it to bruteforce my own Truecrypt container. I do know parts of the password, its built up using blocks of other known passwords to increase length, but I forgot in which order the blocks were used and if some blocks weren't used at all. Example "blo...
I'm trying to generate a wordlist in order to use it to bruteforce my own Truecrypt container. I do know parts of the password, its built up using blocks of other known passwords to increase length, but I forgot in which order the blocks were used and if some blocks weren't used at all. Example "blocks" separated with space: dog cat bird xyz cow1 lion8 What I would like to do is create a wordlist containing each possible combination of these blocks. E.g dog cat dogcat catdog bird dogbird catbird birdcat birddog dogcatbird catdogbird xyz dogcatbirdxyz cow1 xyzcow1dogcat xyzcow1dogcatbird catdogbirdxyzcow8 lion8 catdogbirdxyzcow1lion8 lion8catdogbirdxyzcow1 dogcatbirdxyzcow1lion8 cow1birddogcatxyzlion8 cow1lion8birddogcatxyz ... So far I've tried to utilize a tool called crunch: http://www.irongeek.com/i.php?page=backtrack-r1-man-pages/crunch But the challenge seems to be how one should generate combinations of shorter combinations, not including all known blocks, example: dogcat only includes 2 blocks. Perhaps someone know crunch better than me, or if I should use another tool or combination of tools?
Niklas J. MacDowall (163 rep)
Apr 19, 2018, 06:36 AM • Last activity: Dec 28, 2020, 02:24 PM
5 votes
3 answers
2004 views
error mounting truecrypt disk with cryptsetup
Trying to use ``cryptsetup`` to mount a drive encrypted with truecrypt. Doing this: sudo cryptsetup open --type tcrypt --readonly /dev/sdc1 encrypted_drive and then typing the passphrase gives me: Activation is not supported for 4096 sector size. **What does this error mean, and how can I mount my t...
Trying to use `cryptsetup` to mount a drive encrypted with truecrypt. Doing this: sudo cryptsetup open --type tcrypt --readonly /dev/sdc1 encrypted_drive and then typing the passphrase gives me: Activation is not supported for 4096 sector size. **What does this error mean, and how can I mount my truecrypt volume?** Useful information: * The drive was encrypted with truecrypt 7.1a * The machine trying to do this is booted into a live USB version of ubuntu, specifically ubuntu 14.04.01, i386 desktop version. * `cryptsetup --version yields cryptsetup 1.6.1` * removing the `--readonly` option produces no change
stochastic (563 rep)
Jan 18, 2015, 06:36 PM • Last activity: Jun 14, 2019, 07:37 PM
1 votes
1 answers
243 views
dmsetup doesn't work with drives over 2TB
The original title of this post was about CryptSetup not loading a Truecrypt device with 4096 byte sectors. I managed to dump the Truecrypt header (with the master key) anyway, but now when I try to load it with dmsetup it doesn't work: echo "0 5860533168 crypt aes-xts-plain64 256 /dev/sdh 256" | dm...
The original title of this post was about CryptSetup not loading a Truecrypt device with 4096 byte sectors. I managed to dump the Truecrypt header (with the master key) anyway, but now when I try to load it with dmsetup it doesn't work: echo "0 5860533168 crypt aes-xts-plain64 256 /dev/sdh 256" | dmsetup create test device-mapper: resume ioctl on test failed: Invalid argument Command failed It doesn't seem to support size numbers over 2^32 so I tried adding the **sector_size:4096** argument to the table: echo "0 732566646 crypt aes-xts-plain64 256 /dev/sdh 256 sector_size:4096" | dmsetup create test device-mapper: reload ioctl on test failed: Invalid argument Command failed It works if I set the number of sectors to be **under 2TB** (2^32 * 512), but not over. I've tried to replicate the same command in pure cryptsetup, but I don't know how to match the dmsetup table exactly and I can't replicate it. Is there a way to force dmsetup to work with devices over 2TB? Is there a way to pass the master key directly to cryptsetup? This is what I've tried so far, but it decrypts with wrong key: echo | cryptsetup open --type plain /dev/sdh test --offset 256 --cipher aes-xts-plain64 --hash plain --key-size 512
SurpriseDog (662 rep)
Jun 14, 2019, 05:09 AM • Last activity: Jun 14, 2019, 07:13 PM
1 votes
1 answers
1175 views
Mounting external HFS+ device with truecrypt - read only file-system
I´m trying to mount my external HFS+ HDDs on my raspberry pi with raspbian "wheezy". The disks are encrypted with truecrypt so I mount them with the command `truecrypt /dev/sda /media/usbdisk/disk1`. But each time I try to write something to the disk, for example a new folder, it tells me `mkdi...
I´m trying to mount my external HFS+ HDDs on my raspberry pi with raspbian "wheezy". The disks are encrypted with truecrypt so I mount them with the command truecrypt /dev/sda /media/usbdisk/disk1. But each time I try to write something to the disk, for example a new folder, it tells me
mkdir: cannot create directory 'newFolder': Read-only file system. I´ve tried to google that but could not find anything that solves the problem. I have already installed the packages hfsplus, hfsutils and hfsprogs. Does anyone know what I have to do to write something to the disks?
David (9 rep)
May 1, 2013, 10:36 AM • Last activity: Apr 5, 2019, 10:31 PM
3 votes
2 answers
2220 views
tcplay: cannot mount filesystem on TrueCrypt volume with hidden volume protection after mapping it
I am using tcplay to work with a Truecrypt volume with a 4 GB hidden volume located at the final gigabyte. When I mount either the normal volume or the hidden volume, they mount just fine. However, when I mount the normal volume with hidden volume protection (option `--protect-hidden`, or in short f...
I am using tcplay to work with a Truecrypt volume with a 4 GB hidden volume located at the final gigabyte. When I mount either the normal volume or the hidden volume, they mount just fine. However, when I mount the normal volume with hidden volume protection (option --protect-hidden, or in short form, -e), this is what I get: [root@oc2222167007 /media]# tcplay -m truecrypt2 -e -d /dev/loop0 Passphrase: Passphrase for hidden volume: All ok! [root@oc2222167007 /media]# parted -l | grep -B1 -A5 truecrypt Error: /dev/mapper/truecrypt2: unrecognised disk label When I mount the filesystem with -e, it won't pick it up... [root@oc2222167007 /media]# cryptsetup remove truecrypt2 [root@oc2222167007 /media]# tcplay -m truecrypt2 -d /dev/loop0 Passphrase: All ok! [root@oc2222167007 /media]# parted -l | grep -B1 -A5 truecrypt Model: Linux device-mapper (crypt) (dm) Disk /dev/mapper/truecrypt2: 4295MB Sector size (logical/physical): 512B/512B Partition Table: loop Number Start End Size File system Flags 1 0.00B 4295MB 4295MB ext4 ...but if I mount the external volume just like that, it works fine. What's happening?
RAKK (1412 rep)
Apr 23, 2014, 05:05 PM • Last activity: Feb 24, 2019, 04:58 PM
3 votes
2 answers
748 views
Dropbox/Copy.com & Truecrypt
I have a partition that contains all my personal stuff, which is mounted at boot under `/home/myuser/foo`. I would like to synchronize it on the cloud via Dropbox or Copy.com, but I don't trust them, so I have to encrypt the data in some way. As I understood, it creates a "volume" when opened, and t...
I have a partition that contains all my personal stuff, which is mounted at boot under /home/myuser/foo. I would like to synchronize it on the cloud via Dropbox or Copy.com, but I don't trust them, so I have to encrypt the data in some way. As I understood, it creates a "volume" when opened, and the data is clear only in ram, which is great. The problem is that this volume is seen as a single file by the Dropbox/Copy.com client, so when I change something, as little as a text file, it will attempt to upload again the whole encrypted "volume". There is some way to encrypt my data and upload it in security?
ludiegu (1677 rep)
Dec 2, 2013, 05:31 PM • Last activity: Nov 25, 2018, 01:14 AM
5 votes
3 answers
4908 views
Is it a script or is it a binary?
At the end, it looks like it's just a regular sh script: [USER@MACHINE ~/Desktop/D] head -2 truecrypt-7.1-setup-x86 #!/bin/sh CHECKSUM=163123652 but @the scripts end: [USER@MACHINE ~/Desktop/D] tail -2 truecrypt-7.1-setup-x86 5��\V<Rx+&#247;o��6ܺF!&8�ʷ�����^��T4 Sk�!�0"�W���L�`���Su�VP�!m�]5����C'}�...
At the end, it looks like it's just a regular sh script: [USER@MACHINE ~/Desktop/D] head -2 truecrypt-7.1-setup-x86 #!/bin/sh CHECKSUM=163123652 but @the scripts end: [USER@MACHINE ~/Desktop/D] tail -2 truecrypt-7.1-setup-x86 5��\V
LanceBaynes (41465 rep)
Dec 21, 2011, 04:18 AM • Last activity: Jul 31, 2018, 01:53 PM
2 votes
1 answers
2426 views
Can't boot truecrypt's rescue.iso on usb using UNetBootin
I tried Unetbootin to put the `truecrypt rescue.iso` file on a USB stick, but the USB stick does not boot properly. It gets into an infinite loop with boot default in 10 seconds over and over again. The default setting is: `/ubnkern initrd=/ubninit`.
I tried Unetbootin to put the truecrypt rescue.iso file on a USB stick, but the USB stick does not boot properly. It gets into an infinite loop with boot default in 10 seconds over and over again. The default setting is: /ubnkern initrd=/ubninit.
user2726531 (29 rep)
Aug 30, 2013, 05:55 PM • Last activity: Nov 29, 2017, 07:17 PM
1 votes
2 answers
372 views
is there a truecrypt for armv7 hard float?
I am trying to get hold of truecrypt for an armhf linux or something similar. I was wondering if there were any sources to do this? or can anyone make a suggestion? I need it so when its ejected nothing is at risk from being left decrypted.
I am trying to get hold of truecrypt for an armhf linux or something similar. I was wondering if there were any sources to do this? or can anyone make a suggestion? I need it so when its ejected nothing is at risk from being left decrypted.
TheHidden (808 rep)
Oct 14, 2015, 09:59 AM • Last activity: Sep 10, 2017, 04:13 AM
1 votes
1 answers
1306 views
Full Image of internal HDD, drive - dd / dd_rescue - with TrueCrypt [bad sectors] [read error]
**Background** I had a problem under Windows with ndis.sys [sys don't start] *Status: 0xc00000e9 Info: Windows failed to load because a critical system driver...* To repair I had to fully decrypt drive [encrypted with TrueCrypt]. Encryption was running fine, but at some point it found a bad sector....
**Background** I had a problem under Windows with ndis.sys [sys don't start] *Status: 0xc00000e9 Info: Windows failed to load because a critical system driver...* To repair I had to fully decrypt drive [encrypted with TrueCrypt]. Encryption was running fine, but at some point it found a bad sector. enter image description here At some point it slowed down decryption process significantly. As I was thinking it's a disk problem - I did a search and came across - option to do a full drive backup with Linux **dd** command. That supposed to give me image of whole HDD drive in case of ongoing corruption and possibility to run decryption from different drive. Lenovo G500s to rescue sda **What I did so far** sudo mkdir /mnt/usb sudo mount /dev/sdb2 /mnt/usb sudo chmod -R 777 /mnt/usb sudo dd if=/dev/sda of=/mnt/usb/image.dd conv=noerror The result being dd: error reading '/dev/sda': Input/output error 254256+0 records in 254256+0 records out I have just noticed I can do image trough Disks [I work on latest Knoppix DVD], but didn't try it yet. Also I was getting suggestions that I can use dd_rescue, but has heard it is not exactly safe to the data on drive as it over-writes bad blocks? And didn't try it yet. I'm stuck, please help, I don't have a full backup of latest work from my sys partition, although seems that sda3 / sda5 was fully decrypted.
Uno Jorge (11 rep)
Nov 6, 2016, 08:03 PM • Last activity: Nov 7, 2016, 04:06 PM
8 votes
1 answers
3378 views
Is something wrong with VeraCrypt?
I didn't know where to ask this question, so I decided to ask it here. I think all of you know TrueCrypt, and that something weird happened to it some time ago. In the light of those events at least two TC's forks were created: [VeraCrypt][1] and [ZuluCrypt][2]. Those who are using the Debian distro...
I didn't know where to ask this question, so I decided to ask it here. I think all of you know TrueCrypt, and that something weird happened to it some time ago. In the light of those events at least two TC's forks were created: VeraCrypt and ZuluCrypt . Those who are using the Debian distro know that TrueCrypt never made its way to the official Debian repository. I don't know really why, but since TC is gone, let's focus on the two forks. For now only ZuluCrypt is in the main Debian repository . But what about VeraCrypt? There's no VeraCrypt in the new package queue . So it looks like it's not going to be added to the repository at all, and the question is why? Is something wrong with the software?
Mikhail Morfikov (11029 rep)
Oct 26, 2016, 10:14 AM • Last activity: Oct 27, 2016, 10:56 PM
1 votes
0 answers
781 views
mount truecrypt volumes using system encryption passphrase
From a previous Windows setup I have two Truecrypt encrypted harddrives. I can mount these without any problem during my fedora session with: sudo /sbin/cryptsetup open --type tcrypt /dev/sdb2 stuff sudo /sbin/cryptsetup open --type tcrypt /dev/sdb2 otherstuff I have automated this process with the...
From a previous Windows setup I have two Truecrypt encrypted harddrives. I can mount these without any problem during my fedora session with: sudo /sbin/cryptsetup open --type tcrypt /dev/sdb2 stuff sudo /sbin/cryptsetup open --type tcrypt /dev/sdb2 otherstuff I have automated this process with the help of . However, this is stil a bit tedious as I have to type the same passphrase is a bit long and I have to type it twice. I could just write a script storing my passphrase but this would be a vulnerability as the script can be read by anyone. I thought about storing the passphrase in the keyring, but I prefer not to save the passphrase on the pc. Additionally I have no Idea how to do this because I only found an [incomplete tutorial for Arch Linux](https://wiki.archlinux.org/index.php?title=Dm-crypt%2FMounting_at_login&type=revision&diff=425842&oldid=425740) . Since I use the same passphrase for the truecrypt drives as I do for the system drive, I wonder if I can mount these during startup with the passphrase to unlock the system partition. I run Fedora and any help is greatly appreciated! P.S. I have previously [asked this on Ask Fedora](http://ask.fedoraproject.org/en/question/93269/mount-truecrypt-volumes-using-system-encryption-passphrase/) with no response.
Honigmelone (11 rep)
Sep 27, 2016, 11:36 AM • Last activity: Sep 28, 2016, 10:25 PM
0 votes
0 answers
332 views
Diagnose input/output errors on a Truecrypt container
I have been trying to get a local repository located on a usb drive working on an air-gapped machine. The repository was created with apt-mirror on the same kind of system (ubuntu i386). Currently I am blocked by being unable to scan the packages on the usb drive. This is what happens: cd /media/tru...
I have been trying to get a local repository located on a usb drive working on an air-gapped machine. The repository was created with apt-mirror on the same kind of system (ubuntu i386). Currently I am blocked by being unable to scan the packages on the usb drive. This is what happens: cd /media/truecrypt1/apt-mirror/mirror/archive.ubuntu.com sudo dpkg-scanpackages . /dev/null | gzip -9c > Packages.gz bash: Packages.gz Input/output error dpkg-deb: error: error reading archive magic version number from file ./ubuntu/pool/main/libm/libmaa/libmaa-dev_1.3.1-1_amd64.deb: Input/Output error dpkg-scanpackages: error: couldn't parse control information from ./ubuntu/pool/main/libm/libmaa/libmaa-dev_1.3.1-1_amd64.deb What could be my problem here? How do I diagnose an input/output error on a TrueCrypt container?
Tyler Durden (6193 rep)
Mar 27, 2016, 10:56 PM • Last activity: Mar 28, 2016, 09:17 PM
9 votes
2 answers
21840 views
Is there any way to fully encrypt my hard-drive AFTER an installation of Linux Mint?
I'm askin myself, is there any software who can encrypt my whole hard drive with Linux Mint 17.3 on it AFTER the installation? Like TrueCrypt for Windows?! If not and I've to reinstall everthing is there any possibility to safe all my datas (including the installed programs) to restore it after an s...
I'm askin myself, is there any software who can encrypt my whole hard drive with Linux Mint 17.3 on it AFTER the installation? Like TrueCrypt for Windows?! If not and I've to reinstall everthing is there any possibility to safe all my datas (including the installed programs) to restore it after an successful installation of an fully encrypted OS? Maybe with this tool (included in Linux Mint): Image ???
user157526
Feb 21, 2016, 09:11 AM • Last activity: Feb 23, 2016, 09:32 PM
5 votes
1 answers
1459 views
How to decrypt an encrypted container via ssh without entering a passphrase while requiring some client authentication?
I log in to a server via public key authentication and then mount a container (using e.g. LUKS/dm-crypt or truecrypt). At the moment, I have to enter the container password manually. Is there a way to secure that container using e.g. the ssh agent? Or if that is not possible directly, can I encrypt...
I log in to a server via public key authentication and then mount a container (using e.g. LUKS/dm-crypt or truecrypt). At the moment, I have to enter the container password manually. Is there a way to secure that container using e.g. the ssh agent? Or if that is not possible directly, can I encrypt the container password (or probably better, keyfile) with the ssh public key and use ssh agent to decrypt it temporarily?
Tobias Kienzler (9574 rep)
Sep 18, 2012, 03:15 PM • Last activity: Oct 12, 2015, 11:27 AM
1 votes
1 answers
467 views
Transfer data over SSH directly in Truecrypt volume
my problem is this: I have to transfer data from my computer to a remote system that doesn't have an encrypted partition. Because I don't want that the transferred data can be retrieved by forensic tools (and I can't set up an encrypted partition at moment) I thought: - Mount the Truecrypt volume wi...
my problem is this: I have to transfer data from my computer to a remote system that doesn't have an encrypted partition. Because I don't want that the transferred data can be retrieved by forensic tools (and I can't set up an encrypted partition at moment) I thought: - Mount the Truecrypt volume with SSH - With SFTP transfer data directly in the mounted volume - Unmount the volume Is this correct or is it dangerous?
sivlab (145 rep)
Jun 8, 2015, 06:27 PM • Last activity: Jun 9, 2015, 01:26 AM
1 votes
1 answers
111 views
How do I get the Truecrypt CLI installed?
I have a unix machine with truecrypt 7.1a installed. I'm trying to mount a volume to test with the command line but I don't have the truecrypt command installed evidently. Did the command line functionality come with the install before the software went crazy or am I doing something crazy? Or is the...
I have a unix machine with truecrypt 7.1a installed. I'm trying to mount a volume to test with the command line but I don't have the truecrypt command installed evidently. Did the command line functionality come with the install before the software went crazy or am I doing something crazy? Or is there a place to download the the necessary files to put it on my machine?
masterninja01 (543 rep)
Apr 13, 2015, 03:32 PM • Last activity: Apr 18, 2015, 07:55 PM
2 votes
1 answers
3309 views
Live linux distribution that includes TrueCrypt, to be used for data recovery
I want to be able to use a CD/USB bootable "live" linux distribution to: * read a truecrypt volume * mount local drives Ubuntu Privacy Remix seemed perfect as it does include TrueCrypt, but it explicitly cannot see local drives (kernel source modified, as discussed [here][1]). I want to use this liv...
I want to be able to use a CD/USB bootable "live" linux distribution to: * read a truecrypt volume * mount local drives Ubuntu Privacy Remix seemed perfect as it does include TrueCrypt, but it explicitly cannot see local drives (kernel source modified, as discussed here ). I want to use this live CD/USB distribution for backup/data recovery purposes, as in this question . For example, I might want to use truecrypt to decrypt the local drive and back it up unencrypted. Or, I might want to back up an unencrypted local drive to a truecrypt encrypted backup drive. Or both. Yes, it really really must be truecrypt (or something that can safely **and reliably** read/write **all valid** truecrypt partitions...). I'm aware that it is possible to boot one of the many live distros that doesn't have truecrypt, plug in a usb device with truecrypt on it, install truecrypt, and then use it for the above purposes. But that's painful and inelegant. Hence my question. **edit** I have tried to use cryptsetup, as described in the answer from Xen2050. Cryptsetup has problems mounting some truecrypt partitions . So the question still stands.
stochastic (563 rep)
Jan 4, 2015, 11:09 PM • Last activity: Jan 19, 2015, 05:07 AM
Showing page 1 of 20 total questions