ProFTPD
---------------------------------------------------------
sudo apt-get install proftpd
---------------------------------------------------------
nano /etc/proftpd/proftpd.conf
---------------------------------------------------------
ServerName "hostname/ip-adresse"
DisplayLogin "Ihre Anmeldung auf dem Debian-FTP-Server war erfolgreich!"
<Global>
RequireValidShell on
RootLogin off
DefaultRoot /home/david
</Global>
<Limit LOGIN>
DenyGroup !ftpuser
</Limit>
---------------------------------------------------------
DefaultRoot ~
---------------------------------------------------------
<Directory /home /user1>
Umask 022
AllowOverwrite off
<Limit LOGIN>
AllowUser user1
DenyAll
</Limit>
<Limit ALL>
AllowUser user1
DenyAll
</Limit>
</Directory>
---------------------------------------------------------
apt-get install openssl
---------------------------------------------------------
mkdir /etc/proftpd/ssl
---------------------------------------------------------
openssl req -new -x509 -days 365 -nodes -out /etc/proftpd/ssl/proftpd.cert.pem -keyout /etc/proftpd/ssl/proftpd.key.pem
---------------------------------------------------------
<IfModule mod_tls.c>
TLSEngine on
TLSLog /var/log/proftpd/tls.log
TLSProtocol TLSv1 TLSv1.1 TLSv1.2
TLSRSACertificateFile /etc/proftpd/ssl/proftpd.cert.pem
TLSRSACertificateKeyFile /etc/proftpd/ssl/proftpd.key.pem
TLSVerifyClient off
TLSRequired on
</IfModule>
---------------------------------------------------------
ProFTPd – 425 Unable to build data connection: Operation not permitted
---------------------------------------------------------
TLSOptions NoSessionReuseRequired
---------------------------------------------------------
---------------------------------------------------------
---------------------------------------------------------
LUKS
---------------------------------------------------------
1.) Zuerst den Anfang der zu verschlüsselnden Partition mit Zufallsbytes überschreiben:
sudo dd if=/dev/urandom bs=1M count=8 of=GERÄTEDATEI
---------------------------------------------------------
2.) Danach die Partition verschlüsseln:
sudo cryptsetup luksFormat -c aes-xts-plain64 -s 512 -h sha512 -y GERÄTEDATEI
---------------------------------------------------------
3.) Zuweisung der verschlüsselten Partition einem virtuellen Gerät (nach Passworteingabe wird eine Gerätedatei /dev/mapper/usb-crypt angelegt, über die der verschlüsselte Inhalt zugänglich ist):
sudo cryptsetup luksOpen GERÄTEDATEI usb-crypt
---------------------------------------------------------
4.) Die Partition steht jetzt unter dem virtuellen Gerät /dev/mapper/usb-crypt zur Verfügung und kann mit einem Dateisystem beschrieben werden (z.B. ext4):
sudo mkfs.ext4 /dev/mapper/usb-crypt
---------------------------------------------------------
---------------------------------------------------------
Informationen zu verschlüsselten Partitionen abfragen
Möchte man Informationen über eine verschlüsselte Partition, kann folgender Befehl verwendet werden:
sudo cryptsetup luksDump /dev/sde9
---------------------------------------------------------
Öffnen von LUKS-Geräten mit Passwortabfrage
Nach der Anmeldung kann man LUKS-Geräte über die Kommandozeile einhängen und aushängen, wie es oben beschrieben ist (luksOpen, mount, umount, luksClose). Beispiel: Ein per
sudo cryptsetup luksOpen /dev/sdXY mnt
---------------------------------------------------------
---------------------------------------------------------
---------------------------------------------------------
System verschlüsseln
---------------------------------------------------------
---------------------------------------------------------
sudo apt-get install lvm2
---------------------------------------------------------
cryptsetup luksFormat -c aes-xts-plain64 -s 512 -h sha512 /dev/sdX2
cryptsetup luksOpen /dev/sdX2 lukslvm
---------------------------------------------------------
pvcreate /dev/mapper/lukslvm
vgcreate vgubuntu /dev/mapper/lukslvm
---------------------------------------------------------
lvcreate -L 1300M -n swap vgubuntu
lvcreate -l 100%FREE -n root vgubuntu
---------------------------------------------------------
mkswap /dev/mapper/vgubuntu-swap -L swap
mkfs.ext4 /dev/mapper/vgubuntu-root -L root
---------------------------------------------------------
...
---------------------------------------------------------
---------------------------------------------------------
LUKS
---------------------------------------------------------
sudo apt-get install cryptsetup
---------------------------------------------------------
sudo modprobe dm-crypt
---------------------------------------------------------
---------------------------------------------------------
Verschlüsseln von Datenpartitionen mit LUKS
---------------------------------------------------------
apt-get install cryptsetup
---------------------------------------------------------
# fdisk -l
---------------------------------------------------------
/sbin/cryptsetup --iter-time 5000 --use-random luksFormat --type luks2 /dev/sdb
---------------------------------------------------------
/sbin/cryptsetup open /dev/sdb /local_storage
---------------------------------------------------------
/sbin/mkfs.ext4 /dev/mapper/local_storage
---------------------------------------------------------
mount /dev/mapper/local_storage /mnt
---------------------------------------------------------
---------------------------------------------------------
cryptsetup luksKillSlot <device> <slotnummer>
---------------------------------------------------------
cryptsetup luksRemoveKey <device> [<key file>]
---------------------------------------------------------
SHA-1
---------------------------------------------------------
cryptsetup luksDump /dev/sdc1
---------------------------------------------------------
cryptsetup luksKillSlot /dev/sdc1 1
---------------------------------------------------------
cryptsetup luksAddKey /dev/sdc1 /etc/.crypto/cr_crypto.keyfile
---------------------------------------------------------
apt-get install cryptsetup
cryptsetup --verify-passphrase -v luksFormat /dev/sdb
cryptsetup luksOpen /dev/sdb usb_stick_luks
ls -l /dev/mapper/usb_stick_luks
mkfs.ext4 /dev/mapper/usb_stick_luks
cryptsetup luksOpen --test-passphrase --key-slot 0 /dev/sda2 && echo correct
cryptsetup luksOpen --test-passphrase --key-slot 0 /dev/sda2 && echo correct
cryptsetup luksOpen --test-passphrase --key-slot 0 /dev/sda2 && echo correct
cryptsetup luksOpen --test-passphrase --key-slot 0 /dev/sda2 && echo correct
cryptsetup luksOpen --test-passphrase --key-slot 0 /dev/sda2 && echo correct
!!!!