When you are installing your system on a machine where several partitions already
exist, you can also decide to encrypt an existing partition during installation. In this
case follow the description in
Section 11.1.2, “Creating an Encrypted Partition on a
Running System”
(page 148) and be aware that this action destroys all data on the existing
partition to encrypt.
11.1.2 Creating an Encrypted Partition on a
Running System
WARNING: Activating Encryption on a Running System
It is also possible to create encrypted partitions on a running system. However,
encrypting an existing partition destroys all data on it and requires resizing and
restructuring of existing partitions.
On a running system, select System > Partitioning in the YaST Control Center. Click
Yes to proceed. In the Expert Partitioner, select the partition to encrypt and click Edit.
The rest of the procedure is the same as described in
Section 11.1.1, “Creating an En-
crypted Partition during Installation”
(page 147).
11.1.3 Creating an Encrypted File as a
Container
Instead of using a partition, it is possible to create an encrypted file of a certain size
that can then hold other files or folders containing confidential data. Such container
files are created from the YaST Expert Partitioner dialog. Select Crypt Files > Add
Crypt File and enter the full path to the file and its size. If YaST should create the
container file, activate the checkbox Create Loop File. Accept or change the proposed
formatting settings and the file system type. Specify the mount point and decide whether
the encrypted file system should be mounted at system boot. Make sure that the
checkbox Encrypt File System is activated.
The advantage of encrypted container files over encrypted partitions is that they can
be added without repartitioning the hard disk. They are mounted with the help of a loop
device and behave just like normal partitions.
148
Security Guide
Содержание LINUX ENTERPRISE DESKTOP 11
Страница 1: ...SUSE Linux Enterprise Server www novell com 11 March 17 2009 Security Guide...
Страница 9: ...32 7 Managing Audit Event Records Using Keys 433 33 Useful Resources 435...
Страница 10: ......
Страница 29: ...Part I Authentication...
Страница 30: ......
Страница 55: ...Figure 4 2 YaST LDAP Server Configuration LDAP A Directory Service 41...
Страница 126: ......
Страница 127: ...Part II Local Security...
Страница 128: ......
Страница 158: ......
Страница 173: ...Part III Network Security...
Страница 174: ......
Страница 194: ......
Страница 197: ...Figure 16 2 Scenario 2 Figure 16 3 Scenario 3 Configuring VPN Server 183...
Страница 210: ......
Страница 228: ......
Страница 229: ...Part IV Confining Privileges with Novell AppArmor...
Страница 230: ......
Страница 274: ......
Страница 300: ......
Страница 328: ......
Страница 340: ......
Страница 342: ......
Страница 386: ......
Страница 387: ...Part V The Linux Audit Framework...
Страница 388: ......