<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://www.chepkov.com/w/index.php?action=history&amp;feed=atom&amp;title=Encrypt_Fedora</id>
	<title>Encrypt Fedora - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://www.chepkov.com/w/index.php?action=history&amp;feed=atom&amp;title=Encrypt_Fedora"/>
	<link rel="alternate" type="text/html" href="https://www.chepkov.com/w/index.php?title=Encrypt_Fedora&amp;action=history"/>
	<updated>2026-04-28T17:13:31Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.43.6</generator>
	<entry>
		<id>https://www.chepkov.com/w/index.php?title=Encrypt_Fedora&amp;diff=230&amp;oldid=prev</id>
		<title>Dburdick: /* Create backup */</title>
		<link rel="alternate" type="text/html" href="https://www.chepkov.com/w/index.php?title=Encrypt_Fedora&amp;diff=230&amp;oldid=prev"/>
		<updated>2009-02-06T20:44:48Z</updated>

		<summary type="html">&lt;p&gt;&lt;span class=&quot;autocomment&quot;&gt;Create backup&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;This article will help you to encrypt your existing Fedora 10 installation&lt;br /&gt;
=== Where we begin ===&lt;br /&gt;
We have the following disk configuration:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# fdisk -l /dev/sda&lt;br /&gt;
&lt;br /&gt;
Disk /dev/sda: 40.0 GB, 40000000000 bytes&lt;br /&gt;
255 heads, 63 sectors/track, 4863 cylinders&lt;br /&gt;
Units = cylinders of 16065 * 512 = 8225280 bytes&lt;br /&gt;
Disk identifier: 0x000e6cc7&lt;br /&gt;
&lt;br /&gt;
   Device Boot      Start         End      Blocks   Id  System&lt;br /&gt;
/dev/sda1   *           1          13      104391   83  Linux&lt;br /&gt;
/dev/sda2              14        4863    38957625   8e  Linux LVM&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;/dev/sda1&amp;#039;&amp;#039;&amp;#039; is our &amp;#039;&amp;#039;&amp;#039;/boot&amp;#039;&amp;#039;&amp;#039; partition&lt;br /&gt;
* &amp;#039;&amp;#039;&amp;#039;/dev/sda2&amp;#039;&amp;#039;&amp;#039; is physical volume for existing volume group &amp;#039;&amp;#039;&amp;#039;vg0&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# cat /etc/fstab&lt;br /&gt;
/dev/vg0/root           /                       ext3    noatime         1 1&lt;br /&gt;
/dev/vg0/tmp            /tmp                    ext2    noatime         1 2&lt;br /&gt;
/dev/vg0/home           /home                   ext3    noatime         1 2&lt;br /&gt;
/dev/vg0/var            /var                    ext3    noatime         1 2&lt;br /&gt;
/dev/vg0/usr            /usr                    ext3    noatime         1 2&lt;br /&gt;
LABEL=boot              /boot                   ext2    noatime         1 2&lt;br /&gt;
tmpfs                   /dev/shm                tmpfs   defaults        0 0&lt;br /&gt;
devpts                  /dev/pts                devpts  gid=5,mode=620  0 0&lt;br /&gt;
sysfs                   /sys                    sysfs   defaults        0 0&lt;br /&gt;
proc                    /proc                   proc    defaults        0 0&lt;br /&gt;
/dev/vg0/swap           swap                    swap    defaults        0 0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Install required packages ===&lt;br /&gt;
* dump&lt;br /&gt;
* plymouth-system-plugin&lt;br /&gt;
* cryptsetup-luks&lt;br /&gt;
&lt;br /&gt;
 yum install dump plymouth-system-plugin cryptsetup-luks&lt;br /&gt;
&lt;br /&gt;
=== Create backup ===&lt;br /&gt;
Mount your external USB disk, for example, to /mnt and use dump to backup your current installation.&lt;br /&gt;
Make two copies, on two different disks, to be sure, &amp;#039;&amp;#039;&amp;#039;this is the most important step&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
dump -0 -f /mnt/root.dump /&lt;br /&gt;
dump -0 -f /mnt/usr.dump /usr&lt;br /&gt;
dump -0 -f /mnt/var.dump /var&lt;br /&gt;
dump -0 -f /mnt/home.dump /home&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Boot in rescue mode ===&lt;br /&gt;
Skip mounting existing installation, we are going to destroy it in the next step&lt;br /&gt;
* Make the existing data unrecoverable&lt;br /&gt;
 shred -v -n 1 -z /dev/sda2&lt;br /&gt;
&lt;br /&gt;
* Create new encrypted physical volume&lt;br /&gt;
 cryptsetup --verify-passphrase luksFormat --cipher aes-cbc-essiv:sha256 --key-size 256 /dev/sda2&lt;br /&gt;
 cryptsetup --verbose luksOpen /dev/sda2 cryptpv&lt;br /&gt;
&lt;br /&gt;
* recreate volume group and logical volumes&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
lvm pvcreate /dev/mapper/cryptpv&lt;br /&gt;
lvm vgcreate -s 32M vg0 /dev/mapper/cryptpv&lt;br /&gt;
lvm lvcreate --size 512 --name root vg0&lt;br /&gt;
lvm lvcreate --size 2G  --name swap vg0&lt;br /&gt;
lvm lvcreate --size 4G  --name usr  vg0&lt;br /&gt;
lvm lvcreate --size 1G  --name var  vg0&lt;br /&gt;
lvm lvcreate --size 1G  --name home vg0&lt;br /&gt;
lvm lvcreate --size 256 --name tmp  vg0&lt;br /&gt;
mke2fs -j -L root /dev/vg0/root&lt;br /&gt;
mkswap -L swap /dev/vg0/swap&lt;br /&gt;
mke2fs -j -L usr /dev/vg0/usr&lt;br /&gt;
mke2fs -j -L var /dev/vg0/var&lt;br /&gt;
mke2fs -j -L home /dev/vg0/home&lt;br /&gt;
mke2fs -L tmp /dev/vg0/tmp&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* remount backup and root&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
mkdir /tmp/root&lt;br /&gt;
mkdir /tmp/mnt&lt;br /&gt;
mount /dev/sdb1 /tmp/mnt&lt;br /&gt;
mount -t ext3 /dev/vg0/root /tmp/root&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* restore root&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
cd /tmp/root&lt;br /&gt;
restore -r -f /tmp/mnt/root.dump&lt;br /&gt;
rm restoresymtable&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* mount and restore remaining file systems&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
mount -t ext3 -o noatime /dev/vg0/usr /tmp/root/usr &lt;br /&gt;
cd /tmp/root/usr&lt;br /&gt;
restore -r -f /tmp/mnt/usr.dump&lt;br /&gt;
rm restoresymtable&lt;br /&gt;
mount -t ext3 -o noatime /dev/vg0/var /tmp/root/var &lt;br /&gt;
cd /tmp/root/var&lt;br /&gt;
restore -r -f /tmp/mnt/var.dump&lt;br /&gt;
rm restoresymtable&lt;br /&gt;
mount -t ext3 -o noatime /dev/vg0/home /tmp/root/home &lt;br /&gt;
cd /tmp/root/home&lt;br /&gt;
restore -r -f /tmp/mnt/home.dump&lt;br /&gt;
rm restoresymtable&lt;br /&gt;
mount -t ext2 -o noatime /dev/vg0/tmp /tmp/root/tmp&lt;br /&gt;
chmod 1777 /tmp/root/tmp&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* unmount backup, create all device nodes for chrooted environment&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
umount /tmp/mnt&lt;br /&gt;
cp -ax /dev/* /tmp/root/dev&lt;br /&gt;
mkdir /tmp/root/dev/shm&lt;br /&gt;
mount -t proc proc /tmp/root/proc&lt;br /&gt;
mount -t sysfs sysfs /tmp/root/sys&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* chroot into restored system&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
chroot /tmp/root&lt;br /&gt;
mount -a&lt;br /&gt;
swapon -a&lt;br /&gt;
vgcfgbackup&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* recreate initrd image&lt;br /&gt;
 cd /boot&lt;br /&gt;
 mkinitrd -v -f `ls initrd*` `ls /lib/modules`&lt;br /&gt;
&lt;br /&gt;
* force fsck check and selinux relabeling of the new system&lt;br /&gt;
 touch /.autofsck /.autorelabel&lt;br /&gt;
&lt;br /&gt;
=== You are done ===&lt;br /&gt;
 exit&lt;br /&gt;
 reboot&lt;br /&gt;
&lt;br /&gt;
[[Category:Linux]]&lt;/div&gt;</summary>
		<author><name>Dburdick</name></author>
	</entry>
</feed>