Puppy Linux Discussion Forum Forum Index Puppy Linux Discussion Forum
Puppy HOME page : puppylinux.com
"THE" alternative forum : puppylinux.info
 
 FAQFAQ   SearchSearch   MemberlistMemberlist   UsergroupsUsergroups   RegisterRegister 
 ProfileProfile   Log in to check your private messagesLog in to check your private messages   Log inLog in 

The time now is Wed 22 Oct 2014, 18:08
All times are UTC - 4
 Forum index » Advanced Topics » Puppy Derivatives
Light-Debian-Core-Live-CD-Wheezy + Porteus-Wheezy
Moderators: Flash, JohnMurga
Post new topic   Reply to topic View previous topic :: View next topic
Page 207 of 253 [3790 Posts]   Goto page: Previous 1, 2, 3, ..., 205, 206, 207, 208, 209, ..., 251, 252, 253 Next
Author Message
mcewanw

Joined: 16 Aug 2007
Posts: 2346
Location: New Zealand

PostPosted: Fri 20 Jun 2014, 04:55    Post subject:  

Toni,

I take it your old computer with DebianDog developments, and your family and self haven't been in danger of being washed away by the floods over there in Varna and Burgas?

William

_________________
Non enim propter gloriam, diuicias aut honores pugnamus set propter libertatem solummodo quam Nemo bonus nisi simul cum vita amittit.
Back to top
View user's profile Send private message Visit poster's website 
saintless


Joined: 11 Jun 2011
Posts: 2566
Location: Bulgaria

PostPosted: Fri 20 Jun 2014, 05:31    Post subject:  

Hi, William.
I'm fine and my family also. We have small flat in Varna - Asparuhovo (where the tragedy happened) but we live 5 Km from there at the moment. Unfortunately official statement is at least eleven people died in the floods in Varna (including 2 children)... Hope there will not be more...

Toni

_________________
Farewell, Nooby, you will be missed...
Back to top
View user's profile Send private message MSN Messenger 
dancytron

Joined: 18 Jul 2012
Posts: 283

PostPosted: Fri 20 Jun 2014, 19:43    Post subject:  

Please consider added "rar" as a package. It is very small and the binary to uncompress rar files. In xfce version, it automatically worked with xarchiver and right click "extract to here" without needing any configuration.

Thanks,


Dan
Back to top
View user's profile Send private message 
saintless


Joined: 11 Jun 2011
Posts: 2566
Location: Bulgaria

PostPosted: Sat 21 Jun 2014, 09:44    Post subject:  

Sorry, Dan, rar (unrar) is non-free software and we can't include it installed in DebianDog:
https://packages.debian.org/wheezy/rar
We need to find alternative free version for linux that does the same job or to leave the user to install it with apt-get or Synaptic later.

Toni

_________________
Farewell, Nooby, you will be missed...
Back to top
View user's profile Send private message MSN Messenger 
dancytron

Joined: 18 Jul 2012
Posts: 283

PostPosted: Sat 21 Jun 2014, 12:08    Post subject:  

Sorry, didn't realize that.
Back to top
View user's profile Send private message 
fredx181

Joined: 11 Dec 2013
Posts: 842
Location: holland

PostPosted: Sun 22 Jun 2014, 07:11    Post subject:  

Hi Toni,
I think I have the hardest part done for porteus save file encryption: the loading at boot.
Here's initrd1.xz-crypt
https://drive.google.com/file/d/0ByBgCDlZZ8K5OFM3WjV6SlNpN1E/edit?usp=sharing
If it works for you also then I need only to modify the makepfile.sh script for supporting encryption.

Also attached make-changes script from original porteus, maybe it can be useful.

Fred
make-changes.tar.gz
Description  make-changes script from porteus inside archive
gz

 Download 
Filename  make-changes.tar.gz 
Filesize  7.99 KB 
Downloaded  23 Time(s) 
Back to top
View user's profile Send private message 
saintless


Joined: 11 Jun 2011
Posts: 2566
Location: Bulgaria

PostPosted: Sun 22 Jun 2014, 10:20    Post subject:  

fredx181 wrote:
Hi Toni,
I think I have the hardest part done for porteus save file encryption: the loading at boot.
Here's initrd1.xz-crypt
https://drive.google.com/file/d/0ByBgCDlZZ8K5OFM3WjV6SlNpN1E/edit?usp=sharing
If it works for you also then I need only to modify the makepfile.sh script for supporting encryption.

Also attached make-changes script from original porteus, maybe it can be useful.

Fred

Hi, Fred.
Works fine with already encrypted persistence file renamed to changes.dat
Here is what we have to the moment:

Porteus-boot:
Saving changes inside encrypted save file (changes.dat or different named).
No changes in boot code needed.
initrd1.xz-crypt is only 0,3Mb bigger:
http://smokey01.com/saintless/DebianDog/System-modules/initrd1.xz-crypt

Live-boot-3x, thanks to Refracta initrd patch:
Saving changes inside encrypted persistence save file (with persistence.conf inside):
Saving changes inside partition labeled persistence (with persistence.conf inside).
Saving changes in non-encrypted persistence save file placed inside encrypted partition.
initrd1.img-crypt is 1,9Mb bigger:
http://smokey01.com/saintless/DebianDog/System-modules/initrd.img-crypt
Needs addition to boot code. This one will use encrypted persistence save file placed inside /live directory:
Code:
title DebianDog Wheezy live-boot-3 Persistence Encrypted
 uuid 25e43216-01b1-43eb-b02d-6350e970da2c
 kernel /live/vmlinuz1 boot=live config swapon noeject quickreboot autologin basemountmode=rw,noatime,umask=000 persistence persistence-path=/live/ persistence-encryption=none,luks
 initrd /live/initrd.img-crypt

swapon - this option works now to auto-mount swap partition on boot
basemountmode=rw,noatime,umask=000 (or basemountmode=rw) - this one will mount boot partition RW and now save file can be placed on boot partition. If it is missing boot partiition is mounted RO.
persistence-path=/live/ - this points the path to persistence save file.
persistence-encryption=none,luks - the system will search for non-encrypted or luks-encrypted save file/partition.

Live-boot-2x - still searching for solution but for the moment only live-sn (non-encrypted) and home-rw (non-encrypted) but placed inside encrypted partition works. I can't make live-rw from encrypted partition to work and also can't make encrypted save file work.

Fred, I think we should upload the initrd-crypt files for testing for some period of time. Replacing them inside the iso without proper testing from more people may bring more troubles later. Maybe wait more than a month for next updated iso?
We will also need to include aespipe and cryptsetup packages in the main module.
What do you think we should do?

Toni

_________________
Farewell, Nooby, you will be missed...
Back to top
View user's profile Send private message MSN Messenger 
fredx181

Joined: 11 Dec 2013
Posts: 842
Location: holland

PostPosted: Sun 22 Jun 2014, 15:52    Post subject:  

Hi Toni,
Quote:
Fred, I think we should upload the initrd-crypt files for testing for some period of time. Replacing them inside the iso without proper testing from more people may bring more troubles later. Maybe wait more than a month for next updated iso?
We will also need to include aespipe and cryptsetup packages in the main module.
What do you think we should do?

We don't have many testers these days, maybe we should hire some Smile
We could maybe replace the iso's with included cryptsetup and aespipe (where is that for?) and other changes and give the choice to download and use initrd crypt. I 'm not in a hurry though.
Btw, the porteus-boot encrypted savefile option should be ok I think, I tested it around 20 times.

Here's mk-save.gtkdlg and makepfile.sh with added checkbox for encryption support.
I added parts of the porteus "make-changes" script which is very solid IMO.

Attached: mk-save.tar.gz

EDIT: uploaded again with major correction in mk-save.gtkdlg script

Fred
mk-save.tar.gz
Description  mk-save.gtkdlg and makepfile.sh with encryption support
gz

 Download 
Filename  mk-save.tar.gz 
Filesize  4.26 KB 
Downloaded  27 Time(s) 
Back to top
View user's profile Send private message 
saintless


Joined: 11 Jun 2011
Posts: 2566
Location: Bulgaria

PostPosted: Sun 22 Jun 2014, 16:25    Post subject:  

fredx181 wrote:
Attached: mk-save.tar.gz

Thank you, Fred!
I will test porteus encrypted save file proper in the next days.
Live-boot-3x encrypted save is also tested many times by me last few days and I think it will work fine.
Live-boot-2x is the one making troubles for me but I think I will get it done in time.

I think the best way to go is to add cryptsetup and aespipe (older aes encryption support for cryptsetup) in the main module and to replace only porteus initrd1.xz with the new one. The iso size will stay almost the same and we have encryption save file option for porteus boot. But this is for later.
initrd1.img-crypt and initrd.img-crypt will be available for download from the site (both will add 4Mb to the iso size and I see nobody else but me using live-boot-2x and live-boot-3x).

I will keep testing the encryption changes in the next days and get back with results.

Quote:
We don't have many testers these days, maybe we should hire some

Much easier for us this way, Fred Smile

Toni

_________________
Farewell, Nooby, you will be missed...
Back to top
View user's profile Send private message MSN Messenger 
dancytron

Joined: 18 Jul 2012
Posts: 283

PostPosted: Sun 22 Jun 2014, 17:05    Post subject:  

fredx181 wrote:
Hi Toni,
*stuff deleted
We don't have many testers these days, maybe we should hire some Smile
*stuff deleted


I think you guys should consider trying to get a wider pool of users by posting it on some Debian message boards or maybe the Porteus ones.

I have had some trouble getting Google Earth to recognize my display card, which is showing direct rendering and works for xbmc. I'll try to write up the issue sometime this week.
Back to top
View user's profile Send private message 
saintless


Joined: 11 Jun 2011
Posts: 2566
Location: Bulgaria

PostPosted: Mon 23 Jun 2014, 04:02    Post subject:  

Hi, Dan.
Just confirm when you have the time to post details if you are using this GoogleEarth.squashfs or different install GoogleEarth method.
http://murga-linux.com/puppy/viewtopic.php?p=782676#782676

About DebianDog testing:
saintless wrote:
...do not expect too much for DebianDog. It does not aim to replace puppy or windows. lets keep work on it mostly for our fun and for our needs.

My view hasn't change last months. It works perfectly for me and I learn a lot about linux working on DebianDog.

Toni

_________________
Farewell, Nooby, you will be missed...
Back to top
View user's profile Send private message MSN Messenger 
saintless


Joined: 11 Jun 2011
Posts: 2566
Location: Bulgaria

PostPosted: Mon 23 Jun 2014, 10:12    Post subject:  

From the instruction here compiled cryptoloop for debian kernel 3.2 series:
http://fob.po8.org/node/493
Uploaded here with Readme.txt included:
http://smokey01.com/saintless/Fredx181/cryptoloop-wheezy-kernel-3.2.tar.gz
Maybe it will be useful for backward compatibility sometimes.


Edit: Adding also for next version:
Code:
apt-get install patch

Needed for patching initrd.img for example. The package is small and useful. Better to have it available inside main module.
Back to top
View user's profile Send private message MSN Messenger 
saintless


Joined: 11 Jun 2011
Posts: 2566
Location: Bulgaria

PostPosted: Tue 24 Jun 2014, 07:00    Post subject:  

Hi, Fred.

Can you check if changes.dat encrypted save file works for you if it is less than 500Mb? I get fsck error and the save file is not in use after that. With 500Mb and more it works fine.

Toni

_________________
Farewell, Nooby, you will be missed...
Back to top
View user's profile Send private message MSN Messenger 
fredx181

Joined: 11 Dec 2013
Posts: 842
Location: holland

PostPosted: Tue 24 Jun 2014, 10:40    Post subject:  

Hi Toni,
Quote:
Can you check if changes.dat encrypted save file works for you if it is less than 500Mb? I get fsck error and the save file is not in use after that. With 500Mb and more it works fine.


Strange, I did all my previous tests with a savefile smaller than 500Mb, no such problems.
Also just tried on Jwm version (which isn't remastered yet with cryptsetup installed), using initrd1.xz-crypt, also no problem.
Can you give more details of how you made the encrypted savefile and what your kernel commandline is.?
I can do do exactly the same and see how it works for me then.

Fred
Back to top
View user's profile Send private message 
saintless


Joined: 11 Jun 2011
Posts: 2566
Location: Bulgaria

PostPosted: Tue 24 Jun 2014, 11:01    Post subject:  

Hi, Fred.
I use new mk-save scripts from you with checbox for encryption.
Tested on both Openbox and Jwm version.
Boot code:
Code:
title DebianDog-Porteus changes=/live/changes.dat
root (hd0,0)
kernel (hd0,0)/live/vmlinuz1 noauto from=/ changes=/live/changes.dat
initrd (hd0,0)/live/initrd1.xz-crypt


Also tested manually encryption this way with 200 Mb save file that works:
Code:
root@debian:~# dd if=/dev/zero of=/live/image/persistence bs=1M count=200
200+0 records in
200+0 records out
209715200 bytes (210 MB) copied, 6.64379 s, 31.6 MB/s
root@debian:~# losetup -f
/dev/loop1
root@debian:~# losetup /dev/loop1 /live/image/persistence
root@debian:~# cryptsetup luksFormat /dev/loop1

WARNING!
========
This will overwrite data on /dev/loop1 irrevocably.

Are you sure? (Type uppercase yes): YES
Enter LUKS passphrase:
Verify passphrase:
device-mapper: remove ioctl on temporary-cryptsetup-2824 failed: Device or resource busy
root@debian:~# cryptsetup luksOpen /dev/loop1 crypt
Enter passphrase for /dev/loop1:
device-mapper: remove ioctl on temporary-cryptsetup-2850 failed: Device or resource busy
root@debian:~# mkfs.ext2 /dev/mapper/crypt
mke2fs 1.42.5 (29-Jul-2012)
Filesystem label=
OS type: Linux
Block size=1024 (log=0)
Fragment size=1024 (log=0)
Stride=0 blocks, Stripe width=0 blocks
50800 inodes, 202752 blocks
10137 blocks (5.00%) reserved for the super user
First data block=1
Maximum filesystem blocks=67371008
25 block groups
8192 blocks per group, 8192 fragments per group
2032 inodes per group
Superblock backups stored on blocks:
        8193, 24577, 40961, 57345, 73729

Allocating group tables: done                           
Writing inode tables: done                           
Writing superblocks and filesystem accounting information: done                 
root@debian:~# e2fsck -f /dev/mapper/crypt
e2fsck 1.42.5 (29-Jul-2012)
Pass 1: Checking inodes, blocks, and sizes
Pass 2: Checking directory structure
Pass 3: Checking directory connectivity
Pass 4: Checking reference counts
Pass 5: Checking group summary information
/dev/mapper/crypt: 11/50800 files (0.0% non-contiguous), 7963/202752 blocks
root@debian:~# mount /dev/mapper/crypt /mnt

# Creating manually persistence.conf with content / union inside /mnt

root@debian:~# umount /mnt

Works with porteus-boot (the same boot code after renaming to changes.dat) and for live-boot-3x persistence.

And one quick question only if you know the answer without serching:
Do you know what icon name and place is needed to show encrypted drive proper?


Edit: Forgot to add I use 02-cryptsetup-aespipe.squashfs inside /live.



Toni

_________________
Farewell, Nooby, you will be missed...
Back to top
View user's profile Send private message MSN Messenger 
Display posts from previous:   Sort by:   
Page 207 of 253 [3790 Posts]   Goto page: Previous 1, 2, 3, ..., 205, 206, 207, 208, 209, ..., 251, 252, 253 Next
Post new topic   Reply to topic View previous topic :: View next topic
 Forum index » Advanced Topics » Puppy Derivatives
Jump to:  

You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
You cannot attach files in this forum
You can download files in this forum


Powered by phpBB © 2001, 2005 phpBB Group
[ Time: 0.1411s ][ Queries: 12 (0.0440s) ][ GZIP on ]