Sponsored Content
Full Discussion: SuSe Linux Mount
Top Forums UNIX for Advanced & Expert Users SuSe Linux Mount Post 302181077 by craigp84 on Wednesday 2nd of April 2008 04:27:52 AM
Old 04-02-2008
Hi Viper81,

You can do this very easily with the pam_mount facility which is installed as standard on SuSE.

This is configured via the /etc/security/pam_mount.conf file. See "man pam_mount" for details. There's also a ton of guides on the net, have a google for "pam_mount suse".

Hope this helps,

-c
 

4 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

Suse Linux mount problems ?

We are experiencing several startup problems at boot time. In our /etc/rc.d/boot script we have "swapon -a -v &> /dev/null/' (without the quotes). We have also added echo statements to make it visible on the HMC during IPL. The echo statements are seen but there no messages for the swapon... (1 Reply)
Discussion started by: darthur
1 Replies

2. UNIX for Dummies Questions & Answers

Floppy will not mount on SUSE

I have installed SUSE 10 on a laptop that has a swappable CDROM/Floppy drive. When I was installing the OS my CDROM was connected. Later I tried to swap it with the Floppy and mount it but no success. Here is what I get: dell:/dev # mount -t msdos /dev/fd0 /mnt /dev/fd0: Invalid argument ... (0 Replies)
Discussion started by: reedcat
0 Replies

3. OS X (Apple)

howto mount mac volume on suse 11

as the title states, i cant mount suse of apple volumes on either box. have tryed afpfs-ng but no love. anyone have a suggestion than samba (because i dislike MS) and NFS because i don't know jack about it..... yet thanks in advance julz (4 Replies)
Discussion started by: biorhythm
4 Replies

4. Linux

SUSE Linux

i'm new linux ... after reboot ...... my keyboard is notworking automatically boot ..... after few mins Waiting for mandatory devices: eth-id-00:10:a7:08:cb:4b 12 11 9 8 7 5 4 3 1 0 eth0 interface could not be set up failed Setting up service network . . . . . . . . . . . . . ... (2 Replies)
Discussion started by: coolboys
2 Replies
mount.crypt(8)							     pam_mount							    mount.crypt(8)

Name
       mount.crypt - mount a dm-crypt encrypted volume

Syntax
       mount.crypt [-nrv] [-o options] device directory

Options
       -o options
	      Set further mount options. mount.crypt will take out its own options it recognizes and passes any remaining options on to the under-
	      lying mount program. See below for possible options.

       -n     Do not update /etc/mtab. Note that this makes it impossible to unmount the volume by naming the container - you will  have  to  pass
	      the mountpoint to umount.crypt.

       -r     Set  up  the loop device (if necessary) and crypto device in read-only mode.  (The mount itself will necessarily also be read-only.)
	      Note that doing a remount using `mount /mnt -o remount,rw` will not make the mount readwrite. The crypto and loop devices will  have
	      to be disassociated first.

       -v     Turn on debugging and be a bit more verbose.

Mount options
       cipher The  cryptsetup  cipher used for the encrypted volume. This option is mandatory for PLAIN (non-LUKS) volumes. pmt-ehd(8) defaults to
	      creating volumes with "aes-cbc-essiv:sha256" as a cipher.

       crypto_name
	      Select the name for the crypto device (optional). This option is currently only usable with dm-crypt systems.

       fsck   Run fsck on the container before mounting it.

       fsk_cipher
	      The OpenSSL cipher used for the filesystem key. The special keyword "none" can be used to bypass decryption and pass the	file  con-
	      tents directly to libcryptsetup.

       fsk_hash
	      The OpenSSL hash used for producing key and IV.

       fstype The exact type of filesystem in the encrypted container. The default is to let the kernel autodetect.

       hash   The  cryptsetup  hash  used for the encrypted volume. This defaults to no hashing, because pam_mount assumes EHD volumes with strong
	      and simple fskey generation.

       keyfile
	      The path to the key file. This option is mandatory for "normal" crypto volumes and should not be used for LUKS volumes.

       remount
	      Causes the filesystem to be remounted with new options. Note that mount.crypt cannot switch the underlying loop device (if  applies)
	      or the crypto device between read-only and read-write once it is created; only the actual filesystem mount can be changed, with lim-
	      its. If the loop device is read-only, the crypto device will be read-only, and changing the mount to read-write is impossible.  Sim-
	      ilarly,  going from rw to ro will only mark the mount read-only, but not the crypto or loop device, thus making it impossible to set
	      the filesystem the crypto container is located on to read-only.

       ro     Same as the -r option.

       verbose
	      Same as the -v option.

Obsolete mount options
       This section is provided for reference.

       loop   This option used to set up a loop device, because cryptsetup(8) expects a block device. The option is  ignored  because  mount.crypt
	      can figure this out on its own.

pam_mount							    2011-12-15							    mount.crypt(8)
All times are GMT -4. The time now is 09:42 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy