The Following 17 Users Say Thank You to NIN101 For This Useful Post: | ||
|
2011-05-17
, 16:19
|
Posts: 49 |
Thanked: 39 times |
Joined on May 2011
|
#2
|
|
2011-06-10
, 11:53
|
|
Posts: 71 |
Thanked: 47 times |
Joined on Dec 2009
|
#3
|
|
2011-06-10
, 12:40
|
|
Posts: 71 |
Thanked: 47 times |
Joined on Dec 2009
|
#4
|
Nokia-N900:/home/user/MyDocs# truecrypt -t test.tc Enter mount directory [default]: Enter password for /home/user/MyDocs/test.tc: Enter keyfile [none]: Protect hidden volume (if any)? (y=Yes/n=No) [No]: Error: mount: mounting /dev/mapper/truecrypt1 on /media/truecrypt1 failed: Invalid argument
|
2011-06-13
, 16:59
|
Posts: 58 |
Thanked: 31 times |
Joined on Nov 2010
|
#5
|
truecrypt -m nokernelcrypto --protect-hidden=no /dev/mmcblk0p1 /home/user/MyDocs
|
2011-06-15
, 17:28
|
Posts: 115 |
Thanked: 342 times |
Joined on Dec 2010
|
#6
|
truecrypt gui just doesn't fit on the screen, better to build without
couldn't actually build without gui, wxWidgets decency hell
Wouldn't it be possible to load the compiled Trucrypt7.0a into extra-devel?
EDIT: Got it! Adding --fs-options=rw,uid=29999 to the tcmount did it.
|
2011-08-22
, 22:17
|
Posts: 115 |
Thanked: 342 times |
Joined on Dec 2010
|
#7
|
|
2011-12-01
, 21:21
|
|
Posts: 5,028 |
Thanked: 8,613 times |
Joined on Mar 2011
|
#8
|
|
2011-12-02
, 20:27
|
Posts: 115 |
Thanked: 342 times |
Joined on Dec 2010
|
#9
|
|
2011-12-02
, 20:45
|
|
Posts: 1,455 |
Thanked: 3,309 times |
Joined on Dec 2009
@ Rochester, NY
|
#10
|
Kernel Crypto
Without crypto modules, TC will be probably slower and you have to mount with truecrypt -m nokernelcrypto. AES and Twofish with the block cipher mode XTS are supported by power kernel v48 out of the box.
If you want kernel crypto for older versions, take a look at this page.
Precompiled
Available in extras-devel
Compilation in scratchbox
Verification of the downloaded packages is up to you.
Setup scratchbox as described here http://wiki.maemo.org/Documentation/...l_Installation
Log in and choose the ARM target.
Add these two friends to /etc/apt/sources.list
copy truecrypt-7.0a-source/Main/truecrypt to /usr/bin/truecrypt on your N900
If you don't want to use kernel crypto, you have to mount it with something like this: truecrypt -m nokernelcrypto [disk/container] [mountpoint]. Otherwise you will have some errors.
Security Tips
Password leaks
If the auto complete function of maemo is enabled, most of the passwords entered to a GUI will be saved into a database. Turn this feature off before using TC. Database path: /home/user/.osso/dictionaries/.personal.dictionary.
Protection when mounted
There is of course no protection when your device is turned on and the partition or file container mounted. If someone steals your phone, your tc protected files will become accessible. To prevent this, you can enable the lock code. This should be secure unless your attacker has SSH access or something similar to that.
Swap
See some paragraphs below.
Issues
GUI does not fit. To fix this, we can deactivate the Maemo Theme for tc:
Autostart Script
/etc/event.d/truecrypt
This will mount the volumes you want on hildon start up. The known dialog("Enter password for...") will ask you to enter your password and to provide the keys etc.
Protection of private data in /home/user/
The following steps are very messy. A better solution - but harder - is the encryption of the /home/ partition. check this
If the partition or the file container which contains these things is not mounted, you can't use your crypted data and this will result in some error messages. And again, you are doing it at your own risk and only you are responsible for data loss.
So, mount your TC volume.
Please keep in mind that the following steps are not recommended/possible if you are using FAT thanks to user permissions and stuff like that which fat can not handle the way traditional linux filesystems do.
a) Moving phonebook
This will move your phone book. Symbolic links will point to the path in your encrypted volume. However, this is just a "mv", which means, no secure delete will occur on the source directories.
The same principle can be adapted to other directories, for example .mozilla.
Swap encryption
Unencrypted parts can remain in the swap partition. We should deal with that. Please make sure that you have the tools and the kernel modules!
Encryption of the Swap-Partition
1. cat /proc/swaps - Find out which device is your swap partition. Usually it is /dev/mmcblk0p3.
2. Open /etc/event.d/rcS-late
3. Find "swapon -a"
4. Replace it with:
It's recommended to test it first without editing the bootscripts.
General tips
FAT
If you want to write to FAT volumes as user, read this (--fs-options).
ext performance
For ext volumes, the following options are recommended.
root user
To avoid multiple issues (e. g. setting device mappings and mounting), run tc as root.
Last edited by NIN101; 2014-08-07 at 14:27. Reason: link