![]() |
2008-01-27
, 13:34
|
|
Posts: 739 |
Thanked: 159 times |
Joined on Sep 2007
@ Germany - Munich
|
#3
|
![]() |
2008-01-27
, 18:55
|
Posts: 78 |
Thanked: 9 times |
Joined on Dec 2005
@ Devon, UK
|
#4
|
![]() |
2008-01-27
, 19:07
|
|
Posts: 739 |
Thanked: 159 times |
Joined on Sep 2007
@ Germany - Munich
|
#5
|
![]() |
2008-01-27
, 19:19
|
Posts: 78 |
Thanked: 9 times |
Joined on Dec 2005
@ Devon, UK
|
#6
|
![]() |
2008-01-27
, 19:25
|
|
Posts: 739 |
Thanked: 159 times |
Joined on Sep 2007
@ Germany - Munich
|
#7
|
Done.
I'll follow how you get on with this as the two problems clearly have some shared characteristics.
I did initially build and install a custom kernel, but as I have both N800 and N810 I thought I'd just try it with the standard kernel, and to my surprise it worked.
![]() |
2008-01-28
, 09:45
|
Posts: 78 |
Thanked: 9 times |
Joined on Dec 2005
@ Devon, UK
|
#8
|
![]() |
2008-01-28
, 10:20
|
|
Posts: 739 |
Thanked: 159 times |
Joined on Sep 2007
@ Germany - Munich
|
#9
|
The main problem that concerns me is that failing to dismount a truecrypt volume before removing the card (or use USB cable) will make it impossible to remount the card.
The other problem/opportunity I'd like to consider is some sort of interface to file manager - since it supports internal filesystem, memory cards, bluetooth and samba it ought to be possible to add truecrypt volumes.
LUKS is the upcoming standard for Linux hard disk encryption. It is based on the linux device mapper, as Truecrypt. For the following method or for truecrypt, the default Nokia kernel is not sufficient. If you don't want to change your kernel, then look for user space tools like gpg.
You'll need
*The kernel sources
*A crossdev environment like scratchbox
For those who are not keen on compiling their own kernel, I've uploaded kernel + modules there. You can then skip to part 3.
1) Configuring the kernel
you need to generate a default .config as a starting point (at this point, if you start make, you'll get the same kernel as the one shipped, in theory)
If you like make menuconfig rather than make config, patch the kernel with this:
http://www.internettablettalk.com/fo...26&postcount=8
dm support is quite far in the config so without menuconfig, you'll have to hit enter a hundred times or something. If you miss dm, you have to redo all again..
Go in device driver
Go in Multi-device support (RAID and LVM)
Select (*) Multiple devices driver support (RAID and LVM) (second screenshot)
Put Device mapper as (M)odule
Put Crypt target as (M)odule
Now Exit Exit
Go in Cryptographic options
Select SHA256 as (M)odule and AES as (M)odule (third screenshot)
Exit Exit Yes
2)Enough with playing, time for building!!
find . -name "*.ko"
4)Upload the modules:
ssh-add to connect to your ssh-agent
copy the files:
Can't remember exactly but cryptomgr.ko then aes & sha then dm-mod then dm-crypt
6)Create a partition:
(search on the forum)
In the rest of this thread I'll call the partition /dev/blk0p1
7)Getting some user tools:
Now that the kernel is set up for dm support, you will need user-space tools to interact with
->cryptsetup for creating the encrypted partition
->mkfs.ext2 to create an ext2 fs inside or mkfs.vfat ,..
->pmount to easily mount the encrypted partition
I've uploaded them now to my repo. At the moment they won't be visible in application manager but apt-get will see them. I'll change that later to make them visible.
The tools come directly from standard sources. Pmount has been modified to fit the device (removed the "user" option which is unknown on busybox).
8)Make the partition a LUKS partition
/!\
If you forget this passphrase, say goodbye to your data.
This label is temporary, just give anything.
At this step, you will have an unformatted Luks partition in /dev/mapper/blk0p1 (or whatever label you used)
Now let's format it with a real Filesystem, like ext2
pmount stands for policy mount and usually operates on removable media (users are allowed to mount usb sticks or whatever and these devices don't need an entry in fstab, as you don't know by advance how they will be called). It will check in /sys if the device is really removable and will refuse to mount it if not. Unless it's whitelisted in /etc/pmount.allow. So edit this file and put a single line:
9) Mounting the encrypted partition:
You now have an encrypted partition in /media/blk0p1!
I'm using this on Linux since about 3years everyday. I put all my data there in case somebody steals my laptop. Same for my n800 now.
If you have any trouble with the above method, PM me or answer to this post.
Happy hacking!
Last edited by free; 2008-01-27 at 19:19.