![]() When asked for "Select key bytes:", type 1 or 16, can't remember correctly. When asked for "Selection :", type 1 or aes, can't remember correctly. In the last step in step 4, the terminal of the OP seems to have some issues, so here is some edits of what I can remember The directory is the same as the one found in step 2.7, just copy and paste it from the terminal. In step 4, where the OP says, "You need to locate the directory of the. ![]() I came from this topic ( viewtopic.php?f=90&t=323496) as being refereed here by (Kadaitcha Man). We've seen that happen on the forum but changing a login password isn't really the issue then here in this specific post any more: if (and only if, optimistically) the login password of the user who's encrypted home directory a to be recovered encrypted directory once was is available, the method works. If a user uses (say) passwd to update their password, the mount passphrase is decrypted with the old, re-encrypted with the new password automatically but yes, if said user uses say sudo passwd, i.e., changes their password as root, this does not happen, the old password being at the very least conceptually unavailable for decryption of the mount passphrase. you can apply this procedure.Īs to the directory encryption itself only the mount passphrase is relevant and it is in turn encrypted with the user's login password. Well, as to the procedure described here, we're more or less past the encrypted directory being an actual current home directory, and as such, "the login password" from my above reply is to say "the forever frozen in time login password of the user who's encrypted home directory this was". Moreover, in my understanding, if the login password is changed by someone else, the procedure described here won't work. If you don't, you will need to repeat the previous steps again once you reboot and you've probably had enough fun for the day already! Now you can save these files to another location. ![]() In my case, the files were mounted in /media and were accessible. Enter your Mount Passphrase when pĮnable plaintext passthrough (y/n) : nįilename Encryption Key (FNEK) Signature : 0d690d0b3dafaee3Īttempting to mount with the following options:Įcryptfs_sig=3c4b10f3dcadf302folderfolder Selection : aesNavigate to the target file or folderĬlick on the Access files in the Others section Code: Select all sudo mount -t ecryptfs /media/mint/1d8f3bdd-b89d-4ca6-8592-060660799cf0/home/.ecryptfs/userx/.Private /media/ġ) aes: blocksize = 16 min keysize = 16 max keysize = 32Ģ) blowfish: blocksize = 8 min keysize = 16 max keysize = 56ģ) des3_ede: blocksize = 8 min keysize = 24 max keysize = 24Ĥ) twofish: blocksize = 16 min keysize = 16 max keysize = 32ĥ) cast6: blocksize = 16 min keysize = 16 max keysize = 32Ħ) cast5: blocksize = 8 min keysize = 5 max keysize = 16
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |