NOTE TO computerconsultantsforum.com and forums.techcareerfubar.com USERS: This is the same site. Your login will work here. Use the "forgot password" function if you need help recovering your password.

Obvious fact: You're not logged in.

Therefore, you're only seeing the tip of the iceberg of great discussion threads on this site.

Get rid of this big black message box by joining here: http://mature-it.pro/register/

Who We Are: A collection of IT, engineering and sciences professionals, in a variety of current circumstances with a variety of career backgrounds. Including System admins, Developers and programmers, Freelancers and "gig" entrepreneurs, Contract, job shopping and FTE-employed contract house IT workers, Web developers, Inventors, and artists and writers with tech backgrounds.

We're smarter than the hive mind you've experienced on large tech discussion forums and groups. So register on the board - your email is NEVER sold or provided to third parties. Then LOGIN FREQUENTLY to see new stuff daily.

Join by Registering here: http://mature-it.pro/register/

Author Topic: VeraCrypt again  (Read 568 times)

Richardk

  • Global Moderator
  • Wise Sage
  • *****
  • Posts: 4278
Re: VeraCrypt again
« Reply #15 on: November 05, 2018, 03:43:14 pm »
I just tried p and it didn't unlock the volume.

First off, good for you. So everything still works. Secondly, it seems like this started with a specific distro but it cascaded into all the others as a knee jerk reaction. In the end it seems like some sloppy programming and bad assumptions led to the problem but I'd think it's nothing that can't be fixed. At least that's my gut feeling.

You can Goggle it if you really care but it goes on and on. To me it seems like people have abandoned it and moved on. I'm surprised they don't fix it but I'm not an expert in the field and maybe better options exist?

unix

  • Trusted Member
  • Wise Sage
  • ******
  • Posts: 4296
Re: VeraCrypt again
« Reply #16 on: November 05, 2018, 04:37:45 pm »
To be perfectly honest, I don't understand the internals of VeraCrypt. I think I do, but in reality I don't, not even on a moderately high-level. And that worries me. I have reservations about using a piece of software that I don't fully "get".

Of course you can counter that by saying that holds true for any piece of software, Unix included - none of the sysadmins know the "internals" on the code level. I think I've met one guy in my entire life who did and he wasn't really all that in depth.

The relevance of this is that if things screw up, you will need their help to unscrew them up. I had a terrifying experience in the summer of 2017. Thought I lost my data for sure. VC is not like Redhat with a huge support department you can call up anytime if you have a support agreement.

Don't put all your data in one bucket, or one volume, or even one computer. That's fundamental and yet I broke such a cardinal rule.


Brawndo. It's got what plants crave.

G0ddard B0lt

  • I absolutely DESPISE improvised sulfur-charcoal-salt peter cannons made out of hollow tree branches filled with diamonds as projectiles.
  • Trusted Member
  • Wise Sage
  • ******
  • Posts: 22672
  • Gorn Classic, user of Gornix
Re: VeraCrypt again
« Reply #17 on: November 05, 2018, 05:51:48 pm »
Ok guys. I'm not embracing Cryptkeeper as a tech religion icon or anything. I looked for lightweight file encryption system that would not bog down my PC and which did not have a single point of failure (like an all in one archive) and also one that would not make my system unstable (Veracrypt kept crashing my Mint box.)

I do see their f*ckup with the universal password:

https://www.bleepingcomputer.com/news/security/epic-fail-linux-encryption-app-cryptkeeper-has-universal-password-p/

I simply wanted encryption of certain files such that a grab-and-go thief who got hold of my hard drive would be very unlikely to be able to get into certain files.

In fact, even if the universal password IS "p", how likely is it a thief will known Linux, etc?

The system in question is never exposed to the internet at the command line.

I grabbed Cryptkeeper off of the package repository for Linux Mint. I didn't get it anywhere obscure. I wanted something lightweight, stable and reliable.

Cryptkeeper is just that.

Simple as all that.
Gornix is protected by the GPL. *

* Gorn Public License. Duplication by inferior sentient species prohibited.

Richardk

  • Global Moderator
  • Wise Sage
  • *****
  • Posts: 4278
Re: VeraCrypt again
« Reply #18 on: November 06, 2018, 06:54:22 pm »
The relevance of this is that if things screw up, you will need their help to unscrew them up. I had a terrifying experience in the summer of 2017. Thought I lost my data for sure. VC is not like Redhat with a huge support department you can call up anytime if you have a support agreement.

Even with a big company you need to be careful. I had one client that neglected their system and had a corrupt database. I called IBM and talked to them. No support agreement but I told them "name your price" and I'll pass it on to the client. They laughed and said that's over 2 years old and no one knows that system or has any "old" documentation.  I'm thinking 'really?' how much could it have changed?

In the end they said it's not about the money but rather no one is interested in an old system. They wished me well and said good luck.

I guess support means different things to different companies.


Richardk

  • Global Moderator
  • Wise Sage
  • *****
  • Posts: 4278
Re: VeraCrypt again
« Reply #19 on: November 06, 2018, 07:04:46 pm »
As to Gorn's point about Cryptkeeper and VeraCrypt, they work and do the advertised job.

I guess VeraCrypt is more stable on Windows than Linux but I bet people still use Truecrypt as well. And with Cryptkeeper, the bug first showed up after some update. I'm guessing that as long as you stay behind that point then it's still a secure tool to use.

And as he stated, the purpose is to stop an opportunistic thief not some government or large agency.

unix

  • Trusted Member
  • Wise Sage
  • ******
  • Posts: 4296
Re: VeraCrypt again
« Reply #20 on: November 07, 2018, 01:46:10 pm »
Supposedly they found a bunch of security flaws in TrueCrypt that VeraCrypt addressed, and even then they found a lot of bugs in the early version of VC.

I don't find VC very intuitive. Maybe the Windows version sucks. I need to get the Linux one.

Brawndo. It's got what plants crave.

Richardk

  • Global Moderator
  • Wise Sage
  • *****
  • Posts: 4278
Re: VeraCrypt again
« Reply #21 on: November 07, 2018, 02:30:03 pm »
Funny how I think VC under Windows is easy to use but I'm not some power user and certainly not encrypting an entire drive.

unix

  • Trusted Member
  • Wise Sage
  • ******
  • Posts: 4296
Re: VeraCrypt again
« Reply #22 on: November 07, 2018, 04:29:52 pm »

Well, yeah. I agree. Not all that hard. Create a container and mount/unmount it.  I would still rather do so with commands under Linux versus a GUI.
Brawndo. It's got what plants crave.

G0ddard B0lt

  • I absolutely DESPISE improvised sulfur-charcoal-salt peter cannons made out of hollow tree branches filled with diamonds as projectiles.
  • Trusted Member
  • Wise Sage
  • ******
  • Posts: 22672
  • Gorn Classic, user of Gornix
Re: VeraCrypt again
« Reply #23 on: November 07, 2018, 05:40:11 pm »
I've run Truecrypt on Windows and Linux and Veracrypt on Linux.


The UI for creating volumes and mounting volumes and performing utility functions is totally the same in both OSs for each utility and Veracrypt looks vera vera vera much like Truecrypt's UI. The volume files are portable between Linux and Windows, IE, one created and used in Windows can be readily opened and at least read in Linux.


There's nothing to even talk about here about program differences that I have experienced for normal usage, it's just so absolutely banal it's mind numbing.


Command line? Again absolutely nothing to discuss, no mystery or ambiguity. Yes there is one and it covers everything you'd do in the UI.


https://www.veracrypt.fr/en/Command%20Line%20Usage.html


I'm not even that good at traditional keep-end-users-running IT and I know these things, Easy to find, easy to test, Google is your friend here.

Just one more time, guys - the ultimate reason I got driven off of Veracrypt is because using it crashed my Mint Linux box - powered down and shutdown with no warning - almost every time I mounted a file-volume with it and started to work with it, even just reading it. On Linux I find Veracrypt to be an unstable P.O.S.

The crashes stopped when I stopped working with it, and indeed I have used Memtest86+ and tested my current memory overnight w/ no errors detected.

Your mileage may vary.
Gornix is protected by the GPL. *

* Gorn Public License. Duplication by inferior sentient species prohibited.

unix

  • Trusted Member
  • Wise Sage
  • ******
  • Posts: 4296
Re: VeraCrypt again
« Reply #24 on: November 07, 2018, 05:46:28 pm »

The only difference is you can script the command line stuff, in Perl perhaps.
Brawndo. It's got what plants crave.

Richardk

  • Global Moderator
  • Wise Sage
  • *****
  • Posts: 4278
Re: VeraCrypt again
« Reply #25 on: November 07, 2018, 05:51:29 pm »
Well, with that said, I'm surprised there isn't a well established procedure to do just that under Linux / Unix. I remember years ago processing data files from several partners at an insurance gig where everything was encrypted. If I recall this step was usually handled by the DBA but it worked seamlessly.

Why are we talking about which tool to use today? Why isn't this a no-brainer?

Richardk

  • Global Moderator
  • Wise Sage
  • *****
  • Posts: 4278
Re: VeraCrypt again
« Reply #26 on: November 07, 2018, 06:02:15 pm »
Gorn - we're not judging you, even though you keep bringing it up.  :) Personally under Windows I think VC works ok and thanks for the heads up with Mint Linux.

Doing a quick search, it seems that users can't even agree with themselves which encryption tool to use. But I don't think it's for a lack of tools but rather too many tools and how interchangeable the data needs to be. Maybe in the "old days" that I remember, you didn't have much of a choice?

G0ddard B0lt

  • I absolutely DESPISE improvised sulfur-charcoal-salt peter cannons made out of hollow tree branches filled with diamonds as projectiles.
  • Trusted Member
  • Wise Sage
  • ******
  • Posts: 22672
  • Gorn Classic, user of Gornix
Re: VeraCrypt again
« Reply #27 on: November 07, 2018, 06:20:36 pm »
I know you're not judging me.

I'm just incredibly cranky and I take offense at anything anyone says. It's my thing, my purpose.   ::)

A BIT more seriously - this "simple tools" discussion just seemed to spiral aimlessly a bit and I wasn't clear what the lack of mutual understanding really was about. 

For example, it was alluded no command line on Veracrypt. Whaaa? EVERTHING on Linux has a command line even if it has a GUI.

I was simply driving a stake in the ground - this is A, you find out B, C and D are cool, I use A because E and F.
Gornix is protected by the GPL. *

* Gorn Public License. Duplication by inferior sentient species prohibited.

unix

  • Trusted Member
  • Wise Sage
  • ******
  • Posts: 4296
Re: VeraCrypt again
« Reply #28 on: November 07, 2018, 06:33:38 pm »
I started the thread -I guess my chief complaint is that the software is not adequate to encrypt your entire machine, the bootloader and stuff. The containers, the files, etc. that's not a huge deal and a number of packages can do that.
Brawndo. It's got what plants crave.

G0ddard B0lt

  • I absolutely DESPISE improvised sulfur-charcoal-salt peter cannons made out of hollow tree branches filled with diamonds as projectiles.
  • Trusted Member
  • Wise Sage
  • ******
  • Posts: 22672
  • Gorn Classic, user of Gornix
Re: VeraCrypt again
« Reply #29 on: November 07, 2018, 06:58:05 pm »
I guess I would circle back to the ultimate question, again.

Why would you WANT to encrypt your ENTIRE drive?

It is much better to think of high level goals. What are you trying to accomplish?

Hide personal files? Don't need whole drive and boot loader encryptions.

The one time I used Windows' approved encryption on my hard drive, I almost couldn't restore the backup copy of the drive. I wrote about that here extensively at the time (2013.)
Gornix is protected by the GPL. *

* Gorn Public License. Duplication by inferior sentient species prohibited.