From owner-freebsd-questions@FreeBSD.ORG Thu Sep 6 20:28:56 2007 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 26E5616A420 for ; Thu, 6 Sep 2007 20:28:56 +0000 (UTC) (envelope-from wojtek@wojtek.tensor.gdynia.pl) Received: from wojtek.tensor.gdynia.pl (wojtek.tensor.gdynia.pl [IPv6:2001:4070:101:2::1]) by mx1.freebsd.org (Postfix) with ESMTP id 4FFA313C458 for ; Thu, 6 Sep 2007 20:28:54 +0000 (UTC) (envelope-from wojtek@wojtek.tensor.gdynia.pl) Received: from wojtek.tensor.gdynia.pl (localhost [IPv6:::1]) by wojtek.tensor.gdynia.pl (8.13.8/8.13.8) with ESMTP id l86KSkPs029133; Thu, 6 Sep 2007 22:28:46 +0200 (CEST) (envelope-from wojtek@wojtek.tensor.gdynia.pl) Received: from localhost (wojtek@localhost) by wojtek.tensor.gdynia.pl (8.13.8/8.13.8/Submit) with ESMTP id l86KSkpG029130; Thu, 6 Sep 2007 22:28:46 +0200 (CEST) (envelope-from wojtek@wojtek.tensor.gdynia.pl) Date: Thu, 6 Sep 2007 22:28:46 +0200 (CEST) From: Wojciech Puchar To: Thomas Hobbes In-Reply-To: Message-ID: <20070906222815.R29129@wojtek.tensor.gdynia.pl> References: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII; format=flowed Cc: freebsd-questions@freebsd.org Subject: Re: Encrypting mirrored device with geli fails X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 06 Sep 2007 20:28:56 -0000 > beastie_disable="YES" > geom_eli_load="YES" > geom_mirror_load="YES" > padlock_load="YES" > > Swap space is encrypted by appending '.eli' to /dev/mirror/gm0s1b in > /etc/fstab. According to the ouput of swapinfo that works fine. > > /dev/mirror/gm0s1a is mounted on / > /dev/mirror/gm0s1d is mounted on /var > /dev/mirror/gm0s1e is mounted on /usr > /dev/mirror/gm0s1f is mounted on /crypt > > I was trying to encrypt /dev/mirror/gm0s1f but a "MD5 mismatch" occurred: > # umount /crypt > # dd if=/dev/random of=/root/gm0s1f.key bs=64 count=1 > 1+0 records in > 1+0 records out > 64 bytes transferred in 0.000580 secs (110331 bytes/sec) longer.. 32k or so.