[Pkg-cryptsetup-devel] TODO list

gebi at sbox.tugraz.at gebi at sbox.tugraz.at
Thu Feb 2 22:23:12 UTC 2006


Quoting Jonas Meurer <jonas at freesources.org>:

> * provide support for LVM on encryped devices
>   - check for existance of source device before running cryptsetup

Is it really necessary in the long term?
What if we just implement better errorhandling in cryptsetup?

> * improve the checks
>   - distinguish between luks, plain cryptsetup and swap
>    swap:
>      + precheck for any existing filesystem, fail if possitive

really?
if the partition has type swap, why should we care?
every live-cd out there whipes a partition with mkswap if it is of  
type swap (id 82).

>      + postcheck for nothing, just go ahead with mkswap, swapon

ok

and no the ugly one :(
>    plain cryptsetup:
>      + precheck for any existing filesystem, fail if possitive

couldn't be avoided :(.

>      + postcheck for the expected filesystem, fail if negative

couldn't be avoided also :(, or any other ideas?
But why should we check if a mount does allready fail?
print a warning for possible false pw or false partition?

>    luks cryptsetup:
>      + precheck for a valid luks partition, fail if negative

yes.

>      + postcheck for the expected filesystem, fail if negative

why?
if luksOpen succeeds it is the right data. Why sould we check if there  
is a filesystem? Who says that there should be a filesystem on the  
cryptovolume?

> feel free to add your ideas ;)

*hehe* ;)

greets,
Michael




More information about the Pkg-cryptsetup-devel mailing list