How to enable full disk encryption after install? #58
Loading…
x
Reference in New Issue
Block a user
No description provided.
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Would help Benjamin-Loison/cinnamon/issues/179.
Wikipedia: Linux Unified Key Setup (1239229939) may help.
Reading:
would also help.
Related to Benjamin_Loison/ecryptfs/issues/8.
Wikipedia: Linux Unified Key Setup#Examples (1239229939) may help otherwise I read completely this article.
gparted
helps?Can try in a virtual machine first.
Let us try from a fresh Linux Mint 22.1:
Screenshot_Linux_Mint_2025-01-18_15:58:46.png
does not request an encryption password and rebooting leads to usual login prompt.DuckDuckGo search Linux Mint enable full disk encryption after install.
Could investigate the documentation of:
cryptsetup reencrypt
cryptsetup-reencrypt
Backing up before encrypting seems safer.
As there is a decryption screen, there is no need to take screenshots how to access the disk from another system.
However, a final screenshot once encrypted of
gparted
to show that it is encrypted would be nice.https://forums.linuxmint.com/viewtopic.php?t=391261 seems more about not identical backup and restore.
The Ask Ubuntu answer 369623 states quickly that it is not possible.
Source: luksipc/blob/e222ca7ff89e7465345c8ae8786096130e06a30f/README.md?plain=1#L7-L11
Source: the Ask Ubuntu comment 2501628
Let us figure out why I faced above in https://gitea.lemnoslife.com/attachments/f3fda48c-04fc-4a5c-ac80-d884d6cde31c:
Output:
DuckDuckGo and Google search
"cryptosetup-reencrypt"
and"cryptosetup-reencrypt" "apt"
.https://man7.org/linux/man-pages/man8/cryptsetup-reencrypt.8.html
On my Debian 12 GNOME work laptop:
https://command-not-found.com/cryptsetup-reencrypt
cryptsetup
The Ask Ubuntu question 1445879 faces the same issue as me.
https://bugs.launchpad.net/ubuntu/+source/cryptsetup/+bug/2014228/comments/5 seems to recommend instead
cryptsetup reencrypt
.even if
sudo
.On my Debian 12 GNOME work laptop:
Output:
Based on above Ask Ubuntu answer:
wiki.archlinux.org: dm-crypt/Device encryption#Encrypt an existing unencrypted file system (824010)
Is not shrinking the most heavier than shrinking the least possible.
Output:
Should investigate:
https://cryptsetup-team.pages.debian.net/cryptsetup/encrypted-boot.html
What about Debian 12 GNOME to just encrypt ext4 with LUKS without LVM?
This would help the person:
See the Tchap message where the person states not needing it finally by proceeding to a reinstall:
Output:
Output:
Output:
does not request a password or output anything, same for
/dev/vda1
and it does not return change anything during reboot.Let us try from a live ISO. Does not help
cryptsetup reencrypt
.Output:
Output:
Output:
Output:
Output:
Output:
On my Debian 12 GNOME laptop:
/etc/fstab
:/etc/crypttab
:/mnt/etc/fstab
:/mnt/etc/crypttab
:Output:
Replacing in
/mnt/etc/fstab
0e9a3032-7390-4a7f-8073-e690fc58839a
with4ce57ca1-ca7c-4b06-abb8-eb0892d6897e
does not help booting.Let us try:
/etc/fstab
:/etc/crypttab
:Even if I ended up making it work the other person:
is not interested as I explain him the dis/advantages, see issues/22#issuecomment-2956.
I may have an issue with the boot partition.
Above configuration is still stuck on SeaBIOS.
/mnt/etc/mkinitcpio.conf
does not exist.Should test with:
/etc/mkinitcpio.conf
:wiki.archlinux.org: Mkinitcpio#Image creation and activation (823193) makes me believe that
mkinitcpio
is Arch specific.wiki.archlinux.org: Dm-crypt/System configuration#Unlocking in late userspace (822797) may help.
Improve_websites_thanks_to_open_source/issues/967 would help.
See calendar event of 04/02/25 at 14:00 to encrypt my cloud VMs.
Could reinstall OVH VPS to activate encryption but this is too heavy.