SecuringBareMetal icon indicating copy to clipboard operation
SecuringBareMetal copied to clipboard

error creating encrypted volume

Open displague opened this issue 2 years ago • 0 comments

metal_device.fcs[1] (remote-exec): Creating new encrypted volume.
metal_device.fcs[1] (remote-exec): Please choose from one of the following options:
metal_device.fcs[1] (remote-exec):  enter "x" for expert configuration mode,
metal_device.fcs[1] (remote-exec):  enter "p" for pre-configured paranoia mode,
metal_device.fcs[1] (remote-exec):  anything else, or an empty line will select standard mode.
metal_device.fcs[1] (remote-exec): ?>
metal_device.fcs[1] (remote-exec): Standard configuration selected.

metal_device.fcs[1] (remote-exec): Configuration finished.  The filesystem to be created has
metal_device.fcs[1] (remote-exec): the following properties:
metal_device.fcs[1] (remote-exec): Filesystem cipher: "ssl/aes", version 3:0:2
metal_device.fcs[1] (remote-exec): Filename encoding: "nameio/block", version 4:0:2
metal_device.fcs[1] (remote-exec): Key Size: 192 bits
metal_device.fcs[1] (remote-exec): Block Size: 1024 bytes
metal_device.fcs[1] (remote-exec): Each file contains 8 byte header with unique IV data.
metal_device.fcs[1] (remote-exec): Filenames encoded using IV chaining mode.
metal_device.fcs[1] (remote-exec): File holes passed through to ciphertext.

metal_device.fcs[1] (remote-exec): Now you will need to enter a password for your filesystem.
metal_device.fcs[1] (remote-exec): You will need to remember this password, as there is absolutely
metal_device.fcs[1] (remote-exec): no recovery mechanism.  However, the password can be changed
metal_device.fcs[1] (remote-exec): later using encfsctl.

metal_device.fcs[1] (remote-exec): fatal: zero-length passwords are not allowed

displague avatar Jan 04 '22 21:01 displague