graphical user interface for LUKS encryption with "vault"-file
Posted: Thu Jul 27, 2017 5:45 am
Hi fellow Mint users,
In my introduction, told you I have a script that might be useful to other Mint users. What the script does:
Lazyluks.sh is a graphical-front-end (GUI) for using Mint-native LUKS-encryption with a "vault"-file.
Creates/opens/closes "vault"-files that linux Mint will treat as opened encrypted ext4 drives, with "normal" user owning drive (rwx access).
Mint will even show "drive-with-opened-padlock" icon on desktop and in file manager.
When closed, it's just a root-owned file filled with random bytes.
You can have up to 8 of these "vault"-files/drives open at the same time.
Vault-file can be encrypted using passphrase or a file as key.
Pure standard LUKS, so compatible with other programs or cryptsetup /LUKS terminal commands.
Built the script purely for my own use, adapted it a bit to make it useable for others, wrote readme.1st "manual" including troubleshooting section. Tested script on 2 laptops, one desktop. On both Mint 17.3/18.1 and several Knoppix versions. It was also tested by a friend-of-a-friend it-professional on linuxmint vdi from osboxes.org in virtualbox. Thank you Jasper, for your encouraging comments.
Script depends on packages:
zenity For graphical user interface
awk For data manipulation (like having a mini-C in bash).
gksu For gksudo command needed in launcher
cryptsetup For actual en-/decryption
For linux Mint-users, it is quite likely that only zenity will be missing. Install manually through package manager.
Would ask you, forum members to take a look at script, give it a try. And would like feedback.
- did I do stupid things?
- do you think script introduces new "points of failure" or decrease LUKS-security ?
- suggestions for improving?
I hope this script will help even people who are new to linux and do not use the terminal (much), to be able to use strong encryption. Feel that it is a necessary precaution in a world that is full of hacks, theft of laptops, loss of USB-sticks with important data.
If you're interested, you can download the small tarball from: <no longer available, see latest post>
Looking forward to your opinions / comments,
Robert
In my introduction, told you I have a script that might be useful to other Mint users. What the script does:
Lazyluks.sh is a graphical-front-end (GUI) for using Mint-native LUKS-encryption with a "vault"-file.
Creates/opens/closes "vault"-files that linux Mint will treat as opened encrypted ext4 drives, with "normal" user owning drive (rwx access).
Mint will even show "drive-with-opened-padlock" icon on desktop and in file manager.
When closed, it's just a root-owned file filled with random bytes.
You can have up to 8 of these "vault"-files/drives open at the same time.
Vault-file can be encrypted using passphrase or a file as key.
Pure standard LUKS, so compatible with other programs or cryptsetup /LUKS terminal commands.
Built the script purely for my own use, adapted it a bit to make it useable for others, wrote readme.1st "manual" including troubleshooting section. Tested script on 2 laptops, one desktop. On both Mint 17.3/18.1 and several Knoppix versions. It was also tested by a friend-of-a-friend it-professional on linuxmint vdi from osboxes.org in virtualbox. Thank you Jasper, for your encouraging comments.
Script depends on packages:
zenity For graphical user interface
awk For data manipulation (like having a mini-C in bash).
gksu For gksudo command needed in launcher
cryptsetup For actual en-/decryption
For linux Mint-users, it is quite likely that only zenity will be missing. Install manually through package manager.
Would ask you, forum members to take a look at script, give it a try. And would like feedback.
- did I do stupid things?
- do you think script introduces new "points of failure" or decrease LUKS-security ?
- suggestions for improving?
I hope this script will help even people who are new to linux and do not use the terminal (much), to be able to use strong encryption. Feel that it is a necessary precaution in a world that is full of hacks, theft of laptops, loss of USB-sticks with important data.
If you're interested, you can download the small tarball from: <no longer available, see latest post>
Looking forward to your opinions / comments,
Robert