Rocksolid Light

Welcome to RetroBBS

mail  files  register  newsreader  groups  login

Message-ID:  

"Little else matters than to write good code." -- Karl Lehenbauer


computers / alt.os.linux.slackware / Tool to encrypt/decrypt the contents of a directory recursively

SubjectAuthor
* Tool to encrypt/decrypt the contents of a directory recursivelyHarold Johanssen
+* Re: Tool to encrypt/decrypt the contents of a directory recursivelyRich
|`- Re: Tool to encrypt/decrypt the contents of a directory recursivelyJavier
+- Re: Tool to encrypt/decrypt the contents of a directory recursivelyJavier
`* Re: Tool to encrypt/decrypt the contents of a directory recursivelyJoseph Rosevear
 `* Re: Tool to encrypt/decrypt the contents of a directory recursivelyJoseph Rosevear
  `- Re: Tool to encrypt/decrypt the contents of a directory recursivelyJoseph Rosevear

1
Tool to encrypt/decrypt the contents of a directory recursively

<tto80c$1ag9$1@dont-email.me>

 copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=1635&group=alt.os.linux.slackware#1635

 copy link   Newsgroups: alt.os.linux.slackware
Path: i2pn2.org!i2pn.org!eternal-september.org!reader01.eternal-september.org!.POSTED!not-for-mail
From: noemail@please.net (Harold Johanssen)
Newsgroups: alt.os.linux.slackware
Subject: Tool to encrypt/decrypt the contents of a directory recursively
Date: Wed, 1 Mar 2023 19:11:08 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 6
Message-ID: <tto80c$1ag9$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Date: Wed, 1 Mar 2023 19:11:08 -0000 (UTC)
Injection-Info: reader01.eternal-september.org; posting-host="69e0d2dcbda43440b727220fbc81ec71";
logging-data="43529"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18jq66kf4KyxLYba9OnInTJ1j2jYEXGjGU="
User-Agent: Pan/0.149 (Bellevue; 4c157ba git@gitlab.gnome.org:GNOME/pan.git)
Cancel-Lock: sha1:mOmphemW3XiGMFHUHtQf7DwGBNg=
 by: Harold Johanssen - Wed, 1 Mar 2023 19:11 UTC

I am looking for a tool to encrypt/decrypt the contents of a
directory recursively. Looking around, people mention gpgdir. The thing
is, this is a Perl-based tool, and after having been burnt by third-party
Perl tools before, I'd prefer to use something else. Thus, if there is
something out there that people might know about, I'd like to know.

Re: Tool to encrypt/decrypt the contents of a directory recursively

<tto9na$1hln$1@dont-email.me>

 copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=1636&group=alt.os.linux.slackware#1636

 copy link   Newsgroups: alt.os.linux.slackware
Path: i2pn2.org!i2pn.org!eternal-september.org!reader01.eternal-september.org!.POSTED!not-for-mail
From: rich@example.invalid (Rich)
Newsgroups: alt.os.linux.slackware
Subject: Re: Tool to encrypt/decrypt the contents of a directory recursively
Date: Wed, 1 Mar 2023 19:40:26 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 15
Message-ID: <tto9na$1hln$1@dont-email.me>
References: <tto80c$1ag9$1@dont-email.me>
Injection-Date: Wed, 1 Mar 2023 19:40:26 -0000 (UTC)
Injection-Info: reader01.eternal-september.org; posting-host="57fe71a4e77953fdc9ff76836bb344c7";
logging-data="50871"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19kX86qFI7Z373DoF6MwR1Q"
User-Agent: tin/2.0.1-20111224 ("Achenvoir") (UNIX) (Linux/3.10.17 (x86_64))
Cancel-Lock: sha1:NJEeKRBNpkLCQQWxJT5h9SXX3Q4=
 by: Rich - Wed, 1 Mar 2023 19:40 UTC

Harold Johanssen <noemail@please.net> wrote:
> I am looking for a tool to encrypt/decrypt the contents of a
> directory recursively. Looking around, people mention gpgdir. The
> thing is, this is a Perl-based tool, and after having been burnt by
> third-party Perl tools before, I'd prefer to use something else.
> Thus, if there is something out there that people might know about,
> I'd like to know.

Does using tar to collect up the contents recursively, then encrypting
the tar file count?

I.e.:

tar -cvf - /dir-to-encrypt | gpg --options > encrypted-directory.tar.gpg

Re: Tool to encrypt/decrypt the contents of a directory recursively

<O9qcnRzTkMv6MGL-nZ2dnZfqnPGdnZ2d@brightview.co.uk>

 copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=1637&group=alt.os.linux.slackware#1637

 copy link   Newsgroups: alt.os.linux.slackware
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!news.misty.com!border-2.nntp.ord.giganews.com!nntp.giganews.com!Xl.tags.giganews.com!local-1.nntp.ord.giganews.com!nntp.brightview.co.uk!news.brightview.co.uk.POSTED!not-for-mail
NNTP-Posting-Date: Wed, 01 Mar 2023 19:54:15 +0000
From: invalid@invalid.invalid (Javier)
Subject: Re: Tool to encrypt/decrypt the contents of a directory recursively
Newsgroups: alt.os.linux.slackware
References: <tto80c$1ag9$1@dont-email.me>
Message-ID: <O9qcnRzTkMv6MGL-nZ2dnZfqnPGdnZ2d@brightview.co.uk>
Date: Wed, 01 Mar 2023 19:54:15 +0000
Lines: 11
X-Usenet-Provider: http://www.giganews.com
X-Trace: sv3-DIZXkSpol+vKSHG6rY4vfwJ1ZhRUdGjtj5yuwwozqrovAF28CMy9lU0JBvMeflCjJrYGJBHHOucOo7i!mlBVP5xyLBNMH4odTYslmPHOKK776OCdkngOIgwz2EtwwmDI1DZKQPmQ/5ErKAhf6U6MLW9n3M0p!hG2FPbzhOeIvNDJ1KmbQTbSWccY=
X-Abuse-and-DMCA-Info: Please be sure to forward a copy of ALL headers
X-Abuse-and-DMCA-Info: Otherwise we will be unable to process your complaint properly
X-Postfilter: 1.3.40
 by: Javier - Wed, 1 Mar 2023 19:54 UTC

Harold Johanssen <noemail@please.net> wrote:
> I am looking for a tool to encrypt/decrypt the contents of a
> directory recursively. Looking around, people mention gpgdir. The thing
> is, this is a Perl-based tool, and after having been burnt by third-party
> Perl tools before, I'd prefer to use something else. Thus, if there is
> something out there that people might know about, I'd like to know.

This uses FUSE.

https://vgough.github.io/encfs/

Re: Tool to encrypt/decrypt the contents of a directory recursively

<kA-dnaTQh_1gMmL-nZ2dnZfqn_udnZ2d@brightview.co.uk>

 copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=1638&group=alt.os.linux.slackware#1638

 copy link   Newsgroups: alt.os.linux.slackware
Path: i2pn2.org!i2pn.org!weretis.net!feeder6.news.weretis.net!news.misty.com!border-2.nntp.ord.giganews.com!nntp.giganews.com!Xl.tags.giganews.com!local-1.nntp.ord.giganews.com!nntp.brightview.co.uk!news.brightview.co.uk.POSTED!not-for-mail
NNTP-Posting-Date: Wed, 01 Mar 2023 20:05:17 +0000
From: invalid@invalid.invalid (Javier)
Subject: Re: Tool to encrypt/decrypt the contents of a directory recursively
Newsgroups: alt.os.linux.slackware
References: <tto80c$1ag9$1@dont-email.me> <tto9na$1hln$1@dont-email.me>
Message-ID: <kA-dnaTQh_1gMmL-nZ2dnZfqn_udnZ2d@brightview.co.uk>
Date: Wed, 01 Mar 2023 20:05:17 +0000
Lines: 16
X-Usenet-Provider: http://www.giganews.com
X-Trace: sv3-hrLP46ef9KLLmGiVG7/VdcPQimcvd2FT/Wa+sGWCxJaFtBulPgv3g1TL0TB2v95onOSouCdmS2mC7bn!40QX5P07XZSSbF7W2GMUUeITs6wyJv069JRfV+HZNlJJlQqb9RCqhHLzq8kghyCoWjp2eIrl6+OO!EzFr5zeWwA8KYwnBYGPbRksaIzg=
X-Abuse-and-DMCA-Info: Please be sure to forward a copy of ALL headers
X-Abuse-and-DMCA-Info: Otherwise we will be unable to process your complaint properly
X-Postfilter: 1.3.40
 by: Javier - Wed, 1 Mar 2023 20:05 UTC

Rich <rich@example.invalid> wrote:
> tar -cvf - /dir-to-encrypt | gpg --options > encrypted-directory.tar.gpg

I would add a -C /parentdir option to tar to chdir to the parent dir of
dir-to-encrypt and avoid innecessary prefixes.

For decrypting the safest would be to decrypt it to tmpfs.

Also for symmetric encryption (which I guess is the best for the OP
question) there are other tools instead of gpg like aespipe

http://loop-aes.sourceforge.net/

The gpg CLI interface is not well designed and is certainly way too
complex for something simple like symmetric encryption.

Re: Tool to encrypt/decrypt the contents of a directory recursively

<tu0lc2$12ht1$1@dont-email.me>

 copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=1642&group=alt.os.linux.slackware#1642

 copy link   Newsgroups: alt.os.linux.slackware
Path: i2pn2.org!i2pn.org!eternal-september.org!reader01.eternal-september.org!.POSTED!not-for-mail
From: Mail@JoesLife.org (Joseph Rosevear)
Newsgroups: alt.os.linux.slackware
Subject: Re: Tool to encrypt/decrypt the contents of a directory recursively
Date: Sat, 4 Mar 2023 23:48:18 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 61
Message-ID: <tu0lc2$12ht1$1@dont-email.me>
References: <tto80c$1ag9$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Date: Sat, 4 Mar 2023 23:48:18 -0000 (UTC)
Injection-Info: reader01.eternal-september.org; posting-host="f5904a3e37ff65f4dc7ecd1a5fa341c1";
logging-data="1132449"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18pnkWzBsIfnIVTC/7/261ZRyM63sCsxGc="
User-Agent: Pan/0.149 (Bellevue; 4c157ba git@gitlab.gnome.org:GNOME/pan.git)
Cancel-Lock: sha1:4H37lzUdObSko8q1ipSeQzhzz+4=
Face: iVBORw0KGgoAAAANSUhEUgAAADAAAAAwCAQAAAD9CzEMAAAAB3RJTUUH5wISBRox
oH115AAA ABV0RVh0U29mdHdhcmUAWFBhaW50ID
MuMS40FRQqnAAAB39JREFUWI
_Vl2NuOG1d2BuBv7zrw oFZ3W5IlWbYnA2SAzOQi
mOQd8nS5yUsFCAIMnIkxQRLb
_k8T2WHLr1N1kkyxW1d65qF3sHoS8 YRWLa6/Dv/
71L4Z/+EeCLArlnQWVpNVgIV
_iICJKkM+gdHYwGWZYNBgkZSZKM5VNWe2CWLKlB
IwhajVatVomCvWgv69WojI4G
_kw3oJbkclCdrWVaJ5WYQZVEUVKJK7Uz0WK2S3AqyrEFl0MuC
rCqez+YVZ6mPqu
_J/LImIoqxSqTUeWbp0bqGSLLU6H1TY26kkjEbJWBI2vcdyUJ1k1IJ08jqI
glpj
Ye3CMxcaQbZ0bvTClQ+Cc1sf7Q0lwWNJTThFURI+ohZLmaaMRtHC2spTFxalQo+
sdEa1 VtIbLT128MGISqb4niVZEmO5HIylVLkkq
lZpnTsr5ue7C7VYMFVJKtGlT
_1SlrNlY4iAUyBhL 8dpiKqrL10urcm8u3dZ7t3p
3frYXbFVG0Zl3pyPyKYJ6Pik
_bjQWetSSJKo2l+Gfmk1u0Nra+ 99pO7xOvPDNqH
SRBlqTyfD0HnwqsMirVqVjjq
_WDTa3BnKzu3sPaj//AnP/repb/RlAQpqR4R 5za
bMtcbCp4nRA3u9OWIKfDOE68
_803rrG/9t7a9d4r1/sSlWRkNxsKBoPiSJ5ahBpRNES289
syxQ6IyOOt/5Z2/sd
_A6yX/i1//XGH/xCe3IlTOgMBTXpFNhkuFdp7DAaPEcWHR11fuffbGSt
rLPzXz7
3G7/1Vu1ac7LEOHPRRHYTXCewRtnGEcmZvSOi0d7v/KudPZJRJTj4T3/ymVfOne
kd HHSSUXiIolCYZQLtaKMVbT1VuTXIKp2vfS27
sysGFpK97NbGH9V6B5UvfSaK
_E9xDydcgG0sH dHqtaOcLF3aFCm/8uzcqG8lCi4
PRVmWhsZMdde4E3zn3dKaKe/
_YbBSQHlUbl4Eu9f7I1UWKS ta4lKztbFa4svNCp
7AXBTkLn2pOJ7GbjgYL+3iio
_HK39wbflau3CUmNwkPVIdu6sfYLOSmdj 7UNBYv
LOpXqaB1ks5sfyZdRLdn4vFr
_+PNs40PrV067HGyhvnLmSNRqX10rbMtqjyxAeXcx/k
QhUzgum0Psr2BrVs8NSu
_QDBqRdlzH2RRhaNaZWsEa2uDp95NNbifpVM0uYzBM2t7vbF08+eS
H7z1uSNqtU
_91pXpTFt4ia730TG3wTJwIbCzTVCHiobT7555bGBxlB8FjC3/lvVs33pchVBXs
XfhOL2u88FuxsHAkGQyFw6cenPmoN/rUL70QJXc655750mdadzobQa07TcO1YOl
Lfy+51U5x pmJ6LvUUbiiQHbH2SO216LWFZ372o
61HlpKdhaOl3kLlUudXPvEjl
_job1QzTWdPkU0UYCkNl 2ROV5KhxJVo609j7aOG
lsQAkWflba0dre98KXnqnzif
_z06d0YvJwgmwwai1wtNQKPriWrZ3Z GXCwEyW3F
lh6buUrtR/U4TSJZ6kUSgyx9
_O5oGuSDKIh+li3VeksL17KjXi8a9b7XurFC5cbd
FEHGwsFQ0pTKyMul8NOECIJ
_R54naxkKltnfQu9IXUhgkVz4Wmz9rZi6KVt5rPfeT/nRELuaz
QdbLokF0Zi0YX
_bt242ASCaHw52gUzVKuJljp7RywczCKEqcj5gTOrnywdm7vxre27gQsVYKg
Ekq
sk4Q2HXCU7Tx1o7N0rT2ZT6cYiowyWtn64M6VroC7FtSCygKdiX4qRSRXBmf2Hn
sreOr6 VNoZtrPOmef2ja8Mll7ZalVqlUZSW7vT
P5iQRFa2arWlC12RHjN404Oi
_zxHdeFu49rVX1h4V iR8sNH4obBALEmPWOdp76q
hxdFmk/KqYDCf/J0nCaFHubl
_1ZiVYqVILfuy3SPxeQRyq/tJH8 pLIo/v6qkPe0
q+QHUSiEPd19TcHKyp2vXRd1
_Hk4wqbO9S5XRF841gsYXDq6sH5R4LKYnapzz u9
T6xt85OPrJuyL7J7qsjaJBPX
_XpCys7wdJW64mvLNwLqHuOmragSfWtRJ3eOx99lMv96oS3
XmOYlO2dF4KslmV/
_gasyKufijg+uRsnSeZkZK//jppieaacrUp5RTIVpDlhYe+kvfXwA0XQi
wFRqkt
yJOtOaFUs7TYtXY9o5W6mksZ6k4dFSstBg4/uyUt1TRSr1mMB7XebFoJJVRe5Py
+So K406qYuYythbq63Udr7xWngwhh62W5Ls9RJ
qB/N+l0XJUnYwWhRQZFmcqHk
_nWml0NjY2J42c PNweJ/N3RqPKNKUn4dwYtRpZp
ym7Z+GuaQ5vjWpJ59qbkzbO/
_y+GfZG1g8r7UtSxzOSlwUEq 8A4FJvXUqx+dG3X
eeu299mTeA1bNOJp3nnd6q1K
_VSm8h6B00Gke5JJl6qvbexqhxcGMsK+H8 mkfSP
N+yYGuvKSv81BuTrh5clCfm+
_KPy8cqNUS9oT39yeJCmqZ+Do2RwKNyf78Fob+fRCVHz
7+M87HeyXrLSGh1ODzg
_9PEnebP5XJj7wszHYaaxLrLPCIt77N3m1EtQ2Jfv3muPPafved3L5
5yJ5fKrYv Yz4P1Ypm+8jxpaGAAAAAElFTkSuQmCC
 by: Joseph Rosevear - Sat, 4 Mar 2023 23:48 UTC

On Wed, 1 Mar 2023 19:11:08 -0000 (UTC), Harold Johanssen wrote:

> I am looking for a tool to encrypt/decrypt the contents of a directory
> recursively. Looking around, people mention gpgdir. The thing is, this
> is a Perl-based tool, and after having been burnt by third-party Perl
> tools before, I'd prefer to use something else. Thus, if there is
> something out there that people might know about, I'd like to know.

Hello,

I have taken a different approach to the problem of encryption.
Initially, like you I tried encrypting locally--within a file system. I
found that frustratingly difficult. And also dangerous: Everytime you
encrypt something you run the risk of losing it, *and* you have one more
passphrase to keep track of.

So I tried instead using the cryptsetup command to make, open and close
LUKS encrypted partitions. This took a little work to get going, but it
was well worth the effort. To do this I made a set of scripts:

luksetup
crypt
ucrypt
lksmnt
ulksmnt

Script luksetup makes $1 into a LUKS encrypted partition (and destroys
any existing file system). To do this it prompts you for a passphrase.
Here is the script:

cryptsetup \
--verbose \
--cipher aes-xts-plain64 \
--key-size 256 \
--hash sha256 \
--iter-time 1000 \
--use-urandom luksFormat $1

You will need to run scripts crypt and ucrypt directly only
occasionally. For example you will need them after running luksetup to
make a new file system on the LUKS encrypted partition. Script crypt
will prompt you for the passphrase. Here is an example:

crypt /dev/sda1 bob
mke2fs /dev/mapper/bob
ucrypt bob

Scripts lksmnt and ulksmnt do the mounting and un-mounting of a LUKS
encrypted partition. They call scripts crypt and ucrypt. Here is an
example:

lksmnt /dev/sda1 /mnt/hd bob
<Do what you need to do to /mnt/hd.>
ulksmnt bob

I'll quit here without giving the text of scripts crypt, ucrypt, lksmnt
and ulksmnt. They are, however, short one and two line scripts that use
only the commands and scripts I have named here. I'll leave them as a
puzzle for you, but let me know if you need help.

-Joe

Re: Tool to encrypt/decrypt the contents of a directory recursively

<tu0m82$12ht1$2@dont-email.me>

 copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=1643&group=alt.os.linux.slackware#1643

 copy link   Newsgroups: alt.os.linux.slackware
Path: i2pn2.org!i2pn.org!eternal-september.org!reader01.eternal-september.org!.POSTED!not-for-mail
From: Mail@JoesLife.org (Joseph Rosevear)
Newsgroups: alt.os.linux.slackware
Subject: Re: Tool to encrypt/decrypt the contents of a directory recursively
Date: Sun, 5 Mar 2023 00:03:15 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 59
Message-ID: <tu0m82$12ht1$2@dont-email.me>
References: <tto80c$1ag9$1@dont-email.me> <tu0lc2$12ht1$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Date: Sun, 5 Mar 2023 00:03:15 -0000 (UTC)
Injection-Info: reader01.eternal-september.org; posting-host="f5904a3e37ff65f4dc7ecd1a5fa341c1";
logging-data="1132449"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/Ek5u1H7ClmXeb6J1IXWj8GjuD+Tp8gak="
User-Agent: Pan/0.149 (Bellevue; 4c157ba git@gitlab.gnome.org:GNOME/pan.git)
Cancel-Lock: sha1:Mno0Gndju8/SDzGw1NZF+v0zXPo=
Face: iVBORw0KGgoAAAANSUhEUgAAADAAAAAwCAQAAAD9CzEMAAAAB3RJTUUH5wISBRox
oH115AAA ABV0RVh0U29mdHdhcmUAWFBhaW50ID
MuMS40FRQqnAAAB39JREFUWI
_Vl2NuOG1d2BuBv7zrw oFZ3W5IlWbYnA2SAzOQi
mOQd8nS5yUsFCAIMnIkxQRLb
_k8T2WHLr1N1kkyxW1d65qF3sHoS8 YRWLa6/Dv/
71L4Z/+EeCLArlnQWVpNVgIV
_iICJKkM+gdHYwGWZYNBgkZSZKM5VNWe2CWLKlB
IwhajVatVomCvWgv69WojI4G
_kw3oJbkclCdrWVaJ5WYQZVEUVKJK7Uz0WK2S3AqyrEFl0MuC
rCqez+YVZ6mPqu
_J/LImIoqxSqTUeWbp0bqGSLLU6H1TY26kkjEbJWBI2vcdyUJ1k1IJ08jqI
glpj
Ye3CMxcaQbZ0bvTClQ+Cc1sf7Q0lwWNJTThFURI+ohZLmaaMRtHC2spTFxalQo+
sdEa1 VtIbLT128MGISqb4niVZEmO5HIylVLkkq
lZpnTsr5ue7C7VYMFVJKtGlT
_1SlrNlY4iAUyBhL 8dpiKqrL10urcm8u3dZ7t3p
3frYXbFVG0Zl3pyPyKYJ6Pik
_bjQWetSSJKo2l+Gfmk1u0Nra+ 99pO7xOvPDNqH
SRBlqTyfD0HnwqsMirVqVjjq
_WDTa3BnKzu3sPaj//AnP/repb/RlAQpqR4R 5za
bMtcbCp4nRA3u9OWIKfDOE68
_803rrG/9t7a9d4r1/sSlWRkNxsKBoPiSJ5ahBpRNES289
syxQ6IyOOt/5Z2/sd
_A6yX/i1//XGH/xCe3IlTOgMBTXpFNhkuFdp7DAaPEcWHR11fuffbGSt
rLPzXz7
3G7/1Vu1ac7LEOHPRRHYTXCewRtnGEcmZvSOi0d7v/KudPZJRJTj4T3/ymVfOne
kd HHSSUXiIolCYZQLtaKMVbT1VuTXIKp2vfS27
sysGFpK97NbGH9V6B5UvfSaK
_E9xDydcgG0sH dHqtaOcLF3aFCm/8uzcqG8lCi4
PRVmWhsZMdde4E3zn3dKaKe/
_YbBSQHlUbl4Eu9f7I1UWKS ta4lKztbFa4svNCp
7AXBTkLn2pOJ7GbjgYL+3iio
_HK39wbflau3CUmNwkPVIdu6sfYLOSmdj 7UNBYv
LOpXqaB1ks5sfyZdRLdn4vFr
_+PNs40PrV067HGyhvnLmSNRqX10rbMtqjyxAeXcx/k
QhUzgum0Psr2BrVs8NSu
_QDBqRdlzH2RRhaNaZWsEa2uDp95NNbifpVM0uYzBM2t7vbF08+eS
H7z1uSNqtU
_91pXpTFt4ia730TG3wTJwIbCzTVCHiobT7555bGBxlB8FjC3/lvVs33pchVBXs
XfhOL2u88FuxsHAkGQyFw6cenPmoN/rUL70QJXc655750mdadzobQa07TcO1YOl
Lfy+51U5x pmJ6LvUUbiiQHbH2SO216LWFZ372o
61HlpKdhaOl3kLlUudXPvEjl
_job1QzTWdPkU0UYCkNl 2ROV5KhxJVo609j7aOG
lsQAkWflba0dre98KXnqnzif
_z06d0YvJwgmwwai1wtNQKPriWrZ3Z GXCwEyW3F
lh6buUrtR/U4TSJZ6kUSgyx9
_O5oGuSDKIh+li3VeksL17KjXi8a9b7XurFC5cbd
FEHGwsFQ0pTKyMul8NOECIJ
_R54naxkKltnfQu9IXUhgkVz4Wmz9rZi6KVt5rPfeT/nRELuaz
QdbLokF0Zi0YX
_bt242ASCaHw52gUzVKuJljp7RywczCKEqcj5gTOrnywdm7vxre27gQsVYKg
Ekq
sk4Q2HXCU7Tx1o7N0rT2ZT6cYiowyWtn64M6VroC7FtSCygKdiX4qRSRXBmf2Hn
sreOr6 VNoZtrPOmef2ja8Mll7ZalVqlUZSW7vT
P5iQRFa2arWlC12RHjN404Oi
_zxHdeFu49rVX1h4V iR8sNH4obBALEmPWOdp76q
hxdFmk/KqYDCf/J0nCaFHubl
_1ZiVYqVILfuy3SPxeQRyq/tJH8 pLIo/v6qkPe0
q+QHUSiEPd19TcHKyp2vXRd1
_Hk4wqbO9S5XRF841gsYXDq6sH5R4LKYnapzz u9
T6xt85OPrJuyL7J7qsjaJBPX
_XpCys7wdJW64mvLNwLqHuOmragSfWtRJ3eOx99lMv96oS3
XmOYlO2dF4KslmV/
_gasyKufijg+uRsnSeZkZK//jppieaacrUp5RTIVpDlhYe+kvfXwA0XQi
wFRqkt
yJOtOaFUs7TYtXY9o5W6mksZ6k4dFSstBg4/uyUt1TRSr1mMB7XebFoJJVRe5Py
+So K406qYuYythbq63Udr7xWngwhh62W5Ls9RJ
qB/N+l0XJUnYwWhRQZFmcqHk
_nWml0NjY2J42c PNweJ/N3RqPKNKUn4dwYtRpZp
ym7Z+GuaQ5vjWpJ59qbkzbO/
_y+GfZG1g8r7UtSxzOSlwUEq 8A4FJvXUqx+dG3X
eeu299mTeA1bNOJp3nnd6q1K
_VSm8h6B00Gke5JJl6qvbexqhxcGMsK+H8 mkfSP
N+yYGuvKSv81BuTrh5clCfm+
_KPy8cqNUS9oT39yeJCmqZ+Do2RwKNyf78Fob+fRCVHz
7+M87HeyXrLSGh1ODzg
_9PEnebP5XJj7wszHYaaxLrLPCIt77N3m1EtQ2Jfv3muPPafved3L5
5yJ5fKrYv Yz4P1Ypm+8jxpaGAAAAAElFTkSuQmCC
 by: Joseph Rosevear - Sun, 5 Mar 2023 00:03 UTC

On Sat, 4 Mar 2023 23:48:18 -0000 (UTC), Joseph Rosevear wrote:

Sorry,

I'm having trouble with Pan. Here is my message again, with corrections:

> Hello,
>
> I have taken a different approach to the problem of encryption.
> Initially, like you I tried encrypting locally--within a file system. I
> found that frustratingly difficult. And also dangerous: Everytime you
> encrypt something you run the risk of losing it, *and* you have one more
> passphrase to keep track of.
>
> So I tried instead using the cryptsetup command to make, open and close
> LUKS encrypted partitions. This took a little work to get going, but it
> was well worth the effort. To do this I made a set of scripts:

luksetup
crypt
ucrypt
lksmnt
ulksmnt

> Script luksetup makes $1 into a LUKS encrypted partition (and destroys
> any existing file system). To do this it prompts you for a passphrase.
> Here is the script:
>
> cryptsetup \
> --verbose \
> --cipher aes-xts-plain64 \ --key-size 256 \
> --hash sha256 \
> --iter-time 1000 \
> --use-urandom luksFormat $1
>
> You will need to run scripts crypt and ucrypt directly only
> occasionally. For example you will need them after running luksetup to
> make a new file system on the LUKS encrypted partition. Script crypt
> will prompt you for the passphrase. Here is an example:

crypt /dev/sda1 bob
mke2fs /dev/mapper/bob
ucrypt bob

> Scripts lksmnt and ulksmnt do the mounting and un-mounting of a LUKS
> encrypted partition. They call scripts crypt and ucrypt. Here is an
> example:

lksmnt /dev/sda1 /mnt/hd bob
<Do what you need to do to /mnt/hd.>
ulksmnt bob

> I'll quit here without giving the text of scripts crypt, ucrypt, lksmnt
> and ulksmnt. They are, however, short one and two line scripts that use
> only the commands and scripts I have named here. I'll leave them as a
> puzzle for you, but let me know if you need help.
>
> -Joe

Re: Tool to encrypt/decrypt the contents of a directory recursively

<pan$ad663$3cb1780a$3a8d9bb6$c03f9dc4@JoesLife.org>

 copy mid

https://www.rocksolidbbs.com/computers/article-flat.php?id=1644&group=alt.os.linux.slackware#1644

 copy link   Newsgroups: alt.os.linux.slackware
Path: i2pn2.org!i2pn.org!eternal-september.org!reader01.eternal-september.org!.POSTED!not-for-mail
From: Mail@JoesLife.org (Joseph Rosevear)
Newsgroups: alt.os.linux.slackware
Subject: Re: Tool to encrypt/decrypt the contents of a directory recursively
Date: Sun, 5 Mar 2023 00:26:53 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 59
Message-ID: <pan$ad663$3cb1780a$3a8d9bb6$c03f9dc4@JoesLife.org>
References: <tto80c$1ag9$1@dont-email.me> <tu0lc2$12ht1$1@dont-email.me>
<tu0m82$12ht1$2@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Date: Sun, 5 Mar 2023 00:26:53 -0000 (UTC)
Injection-Info: reader01.eternal-september.org; posting-host="f5904a3e37ff65f4dc7ecd1a5fa341c1";
logging-data="1132449"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+42Vq9Omp5pwAMHOpfYYA8hkl2BPp4EoQ="
User-Agent: Pan/0.149 (Bellevue; 4c157ba git@gitlab.gnome.org:GNOME/pan.git)
Cancel-Lock: sha1:JnQ5IBJK5zTR+Fb8UPGBgxon3FM=
Face: iVBORw0KGgoAAAANSUhEUgAAADAAAAAwCAQAAAD9CzEMAAAAB3RJTUUH5wISBRox
oH115AAA
 by: Joseph Rosevear - Sun, 5 Mar 2023 00:26 UTC

Sorry again,

This is my last try. Perhaps I'll post the message also to my blog at:

https://joeslife.org

>> Hello,
>>
>> I have taken a different approach to the problem of encryption.
>> Initially, like you I tried encrypting locally--within a file system. I
>> found that frustratingly difficult. And also dangerous: Everytime you
>> encrypt something you run the risk of losing it, *and* you have one
>> more passphrase to keep track of.
>>
>> So I tried instead using the cryptsetup command to make, open and close
>> LUKS encrypted partitions. This took a little work to get going, but
>> it was well worth the effort. To do this I made a set of scripts:

luksetup
crypt
ucrypt
lksmnt
ulksmnt

>> Script luksetup makes $1 into a LUKS encrypted partition (and destroys
>> any existing file system). To do this it prompts you for a passphrase.
>> Here is the script:
>>
>> cryptsetup \
>> --verbose \
>> --cipher aes-xts-plain64 \ --key-size 256 \
>> --hash sha256 \
>> --iter-time 1000 \
>> --use-urandom luksFormat $1
>>
>> You will need to run scripts crypt and ucrypt directly only
>> occasionally. For example you will need them after running luksetup to
>> make a new file system on the LUKS encrypted partition. Script crypt
>> will prompt you for the passphrase. Here is an example:

crypt /dev/sda1 bob
mke2fs /dev/mapper/bob
ucrypt bob
>> Scripts lksmnt and ulksmnt do the mounting and un-mounting of a LUKS
>> encrypted partition. They call scripts crypt and ucrypt. Here is an
>> example:

lksmnt /dev/sda1 /mnt/hd bob
<Do what you need to do to /mnt/hd.>
ulksmnt bob
>> I'll quit here without giving the text of scripts crypt, ucrypt, lksmnt
>> and ulksmnt. They are, however, short one and two line scripts that
>> use only the commands and scripts I have named here. I'll leave them
>> as a puzzle for you, but let me know if you need help.
>>
>> -Joe

1
server_pubkey.txt

rocksolid light 0.9.7
clearnet tor