个人工具

“UbuntuHelp:TruecryptHiddenVolume”的版本间的差异

来自Ubuntu中文

跳转至: 导航, 搜索
 
(未显示同一用户的7个中间版本)
第1行: 第1行:
 
{{From|https://help.ubuntu.com/community/TruecryptHiddenVolume}}
 
{{From|https://help.ubuntu.com/community/TruecryptHiddenVolume}}
 
{{Languages|UbuntuHelp:TruecryptHiddenVolume}}
 
{{Languages|UbuntuHelp:TruecryptHiddenVolume}}
https://help.ubuntu.com/community/IconsPage?action=AttachFile&do=get&target=PicDocs.png
+
#title Hidden encrypted volume with Truecrypt (command line)
== Encrypted filesystems and hidden volume ==
+
{|border="1" cellspacing="0"
There is [https://help.ubuntu.com/community/Security a lot of documentation] on how to create an encrypted volume. However, a significant problem caused by most of the existing implementations is that the owner of the data may be forced to reveal the password used to encrypt the data.
+
| {i} Please refer to [[UbuntuHelp:EncryptedFilesystems|EncryptedFilesystems]] for further documentation.
 +
|}
 +
For instructions on using the new [[UbuntuHelp:TrueCrypt|TrueCrypt]] GUI, please see [[UbuntuHelp:TrueCrypt|TrueCrypt|GUI]]
 +
There is [[UbuntuHelp:Security|a|lot of documentation]] on how to create an encrypted volume. However, a significant problem caused by most of the existing implementations is that the owner of the data may be forced to reveal the password used to encrypt the data.
 
To address this, different projects exist to implement some [http://en.wikipedia.org/wiki/Steganography steganography] mechanisms, but at the time of writing, only [http://www.truecrypt.org Truecrypt] is full-featured and production quality.
 
To address this, different projects exist to implement some [http://en.wikipedia.org/wiki/Steganography steganography] mechanisms, but at the time of writing, only [http://www.truecrypt.org Truecrypt] is full-featured and production quality.
 
[http://www.truecrypt.org Truecrypt] is a free open-source disk encryption software available on Ubuntu.
 
[http://www.truecrypt.org Truecrypt] is a free open-source disk encryption software available on Ubuntu.
 
It offers a convenient hidden volumes management that includes protection against damages.
 
It offers a convenient hidden volumes management that includes protection against damages.
 
More information is available at [http://www.truecrypt.org/hiddenvolume.php].
 
More information is available at [http://www.truecrypt.org/hiddenvolume.php].
This page is mostly based on the ''man page'' of ''truecrypt 4.3a'' and intents to give a short recipe to implement [http://www.truecrypt.org Truecrypt] hidden volumes on Ubuntu.
+
This page is mostly based on the ''man page'' of ''truecrypt 4.3a'' and intents to give a short recipe to implement [http://www.truecrypt.org Truecrypt] hidden volumes on Ubuntu.  
 
== Truecrypt hidden volumes ==
 
== Truecrypt hidden volumes ==
0. Install [http://www.truecrypt.org Truecrypt]:<pre><nowiki>
+
<ol><li>Download and install [http://www.truecrypt.org Truecrypt]
sudo apt-get install truecrypt
+
</li><li>Create an outer volume (ex: on ''/dev/sdb1''):<pre><nowiki>
</nowiki></pre>
+
0. Create an outer volume (ex: on ''/dev/sdb1''):<pre><nowiki>
+
 
truecrypt --filesystem none --type normal --encryption AES --hash SHA-1 --random-source /dev/urandom -c /dev/sdb1  
 
truecrypt --filesystem none --type normal --encryption AES --hash SHA-1 --random-source /dev/urandom -c /dev/sdb1  
 +
#In truecrypt 5.1a:
 +
truecrypt --text --filesystem=none --volume-type=normal --encryption=AES --hash=SHA-1 --random-source=/dev/urandom -c /dev/sdb1
 
</nowiki></pre>
 
</nowiki></pre>
0. Map the corresponding volume (ex: on ''/dev/sdb1''), but do not mount it:<pre><nowiki>
+
</li><li>Map the corresponding volume (ex: on ''/dev/sdb1''), but do not mount it:<pre><nowiki>
 
truecrypt /dev/sdb1
 
truecrypt /dev/sdb1
 +
truecrypt --text --list #To see where was this mounted (/dev/mapper/truecrypt0 or /dev/loop0)
 
</nowiki></pre>
 
</nowiki></pre>
0. Format outer volume '''with FAT''':<pre><nowiki>
+
</li><li>Format outer volume '''with FAT''':<pre><nowiki>
 
sudo mkfs.vfat /dev/mapper/truecrypt0
 
sudo mkfs.vfat /dev/mapper/truecrypt0
 
</nowiki></pre>
 
</nowiki></pre>
0. Dismount the volume:<pre><nowiki>
+
</li><li>Dismount the volume:<pre><nowiki>
 
truecrypt -d
 
truecrypt -d
 
</nowiki></pre>
 
</nowiki></pre>
0. Create a (ex: 50M) hidden volume within the outer volume (ex: on ''/dev/sdb1''):<pre><nowiki>
+
</li><li>Create a (ex: 50M) hidden volume within the outer volume (ex: on ''/dev/sdb1''):<pre><nowiki>
 
truecrypt --filesystem none --type hidden --size 50M --encryption AES --hash SHA-1 --random-source /dev/urandom -c /dev/sdb1
 
truecrypt --filesystem none --type hidden --size 50M --encryption AES --hash SHA-1 --random-source /dev/urandom -c /dev/sdb1
 
</nowiki></pre>
 
</nowiki></pre>
0. Map the corresponding hidden volume (ex: on ''/dev/sdb1''), but do not mount it:<pre><nowiki>
+
</li><li>Map the corresponding hidden volume (ex: on ''/dev/sdb1''), but do not mount it:<pre><nowiki>
 
truecrypt /dev/sdb1 # (use the hidden password)
 
truecrypt /dev/sdb1 # (use the hidden password)
 
</nowiki></pre>
 
</nowiki></pre>
0. Format the hidden volume with a filesystem recognised by ''mount(8)'':<pre><nowiki>
+
</li><li>Format the hidden volume with a filesystem recognised by ''mount(8)'':<pre><nowiki>
 
sudo mkfs.xfs /dev/mapper/truecrypt0
 
sudo mkfs.xfs /dev/mapper/truecrypt0
 
</nowiki></pre>
 
</nowiki></pre>
0. Dismount the hidden volume:<pre><nowiki>
+
</li><li>Dismount the hidden volume:<pre><nowiki>
 
truecrypt -d
 
truecrypt -d
 
</nowiki></pre>
 
</nowiki></pre>
0. Mount the outer volume (ex: ''/dev/sdb1'' on ''/mnt/tc'') with the hidden volume protected:<pre><nowiki>
+
</li><li>Mount the outer volume (ex: ''/dev/sdb1'' on ''/mnt/tc'') with the hidden volume protected:<pre><nowiki>
 
truecrypt -P /dev/sdb1 /mnt/tc
 
truecrypt -P /dev/sdb1 /mnt/tc
 
</nowiki></pre>
 
</nowiki></pre>
0. Copy files to the outer volume:<pre><nowiki>
+
</li><li>Copy files to the outer volume:<pre><nowiki>
 
cp outer_volume_file.txt /mnt/tc
 
cp outer_volume_file.txt /mnt/tc
 
</nowiki></pre>
 
</nowiki></pre>
0. Dismount the outer volume:<pre><nowiki>
+
</li><li>Dismount the outer volume:<pre><nowiki>
 
truecrypt -d
 
truecrypt -d
 
</nowiki></pre>
 
</nowiki></pre>
0. Mount either volume (ex: ''/dev/sdb1'' on ''/mnt/tc'') and enjoy:<pre><nowiki>
+
</li><li>Mount either volume (ex: ''/dev/sdb1'' on ''/mnt/tc'') and enjoy:<pre><nowiki>
 
truecrypt /dev/sdb1 /mnt/tc # (use the password relevant to the volume you want to mount)
 
truecrypt /dev/sdb1 /mnt/tc # (use the password relevant to the volume you want to mount)
</nowiki></pre>
+
</nowiki></pre></li></ol>
 +
 
  
 
[[category:UbuntuHelp]]
 
[[category:UbuntuHelp]]

2009年5月18日 (一) 17:57的最新版本

  1. title Hidden encrypted volume with Truecrypt (command line)
{i} Please refer to EncryptedFilesystems for further documentation.

For instructions on using the new TrueCrypt GUI, please see TrueCrypt|GUI There is a|lot of documentation on how to create an encrypted volume. However, a significant problem caused by most of the existing implementations is that the owner of the data may be forced to reveal the password used to encrypt the data. To address this, different projects exist to implement some steganography mechanisms, but at the time of writing, only Truecrypt is full-featured and production quality. Truecrypt is a free open-source disk encryption software available on Ubuntu. It offers a convenient hidden volumes management that includes protection against damages. More information is available at [1]. This page is mostly based on the man page of truecrypt 4.3a and intents to give a short recipe to implement Truecrypt hidden volumes on Ubuntu.

Truecrypt hidden volumes

  1. Download and install Truecrypt
  2. Create an outer volume (ex: on /dev/sdb1):
    truecrypt --filesystem none --type normal --encryption AES --hash SHA-1 --random-source /dev/urandom -c /dev/sdb1 
    #In truecrypt 5.1a:
    truecrypt --text --filesystem=none --volume-type=normal --encryption=AES --hash=SHA-1 --random-source=/dev/urandom -c /dev/sdb1
    
  3. Map the corresponding volume (ex: on /dev/sdb1), but do not mount it:
    truecrypt /dev/sdb1
    truecrypt --text --list #To see where was this mounted (/dev/mapper/truecrypt0 or /dev/loop0)
    
  4. Format outer volume with FAT:
    sudo mkfs.vfat /dev/mapper/truecrypt0
    
  5. Dismount the volume:
    truecrypt -d
    
  6. Create a (ex: 50M) hidden volume within the outer volume (ex: on /dev/sdb1):
    truecrypt --filesystem none --type hidden --size 50M --encryption AES --hash SHA-1 --random-source /dev/urandom -c /dev/sdb1
    
  7. Map the corresponding hidden volume (ex: on /dev/sdb1), but do not mount it:
    truecrypt /dev/sdb1 # (use the hidden password)
    
  8. Format the hidden volume with a filesystem recognised by mount(8):
    sudo mkfs.xfs /dev/mapper/truecrypt0
    
  9. Dismount the hidden volume:
    truecrypt -d
    
  10. Mount the outer volume (ex: /dev/sdb1 on /mnt/tc) with the hidden volume protected:
    truecrypt -P /dev/sdb1 /mnt/tc
    
  11. Copy files to the outer volume:
    cp outer_volume_file.txt /mnt/tc
    
  12. Dismount the outer volume:
    truecrypt -d
    
  13. Mount either volume (ex: /dev/sdb1 on /mnt/tc) and enjoy:
    truecrypt /dev/sdb1 /mnt/tc # (use the password relevant to the volume you want to mount)