GET https://kbin.spritesserver.nl/index.php/m/guix@lemmy.ml/t/26622/How-to-luks-encrypt-raid-drive/newest

Security

Token

There is no security token.

Firewall

main Name
Security enabled
Stateless

Configuration

Key Value
provider security.user.provider.concrete.app_user_provider
context main
entry_point App\Security\KbinAuthenticator
user_checker App\Security\UserChecker
access_denied_handler (none)
access_denied_url (none)
authenticators
[
  "two_factor"
  "remember_me"
  "App\Security\KbinAuthenticator"
  "App\Security\FacebookAuthenticator"
  "App\Security\GoogleAuthenticator"
  "App\Security\GithubAuthenticator"
  "App\Security\KeycloakAuthenticator"
]

Listeners

Listener Duration Response
Symfony\Component\Security\Http\Firewall\ChannelListener {#723
  -map: Symfony\Component\Security\Http\AccessMap {#722 …}
  -logger: Monolog\Logger {#783 …}
  -httpPort: 80
  -httpsPort: 443
}
0.00 ms (none)
Symfony\Component\Security\Http\Firewall\ContextListener {#706
  -tokenStorage: Symfony\Component\Security\Core\Authentication\Token\Storage\TokenStorage {#1017 …}
  -sessionKey: "_security_main"
  -logger: Monolog\Logger {#783 …}
  -userProviders: Symfony\Component\DependencyInjection\Argument\RewindableGenerator {#705 …}
  -dispatcher: Symfony\Component\EventDispatcher\Debug\TraceableEventDispatcher {#747 …}
  -registered: false
  -trustResolver: Scheb\TwoFactorBundle\Security\Authentication\AuthenticationTrustResolver {#780 …}
  -sessionTrackerEnabler: Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage::enableUsageTracking(): void {#703 …}
}
1.83 ms (none)
Symfony\Component\Security\Http\Firewall\AuthenticatorManagerListener {#584
  -authenticatorManager: Symfony\Component\Security\Http\Authentication\AuthenticatorManager {#595 …}
}
0.00 ms (none)
Scheb\TwoFactorBundle\Security\Http\Firewall\TwoFactorAccessListener {#582
  -twoFactorFirewallConfig: Scheb\TwoFactorBundle\Security\TwoFactor\TwoFactorFirewallConfig {#842 …}
  -tokenStorage: Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage {#1018 …}
  -twoFactorAccessDecider: Scheb\TwoFactorBundle\Security\Authorization\TwoFactorAccessDecider {#581 …}
}
0.04 ms (none)
Symfony\Component\Security\Http\Firewall\AccessListener {#579
  -tokenStorage: Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage {#1018 …}
  -accessDecisionManager: Symfony\Component\Security\Core\Authorization\TraceableAccessDecisionManager {#937 …}
  -map: Symfony\Component\Security\Http\AccessMap {#722 …}
}
0.00 ms (none)
Symfony\Component\Security\Http\Firewall\LogoutListener {#786
  -tokenStorage: Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage {#1018 …}
  -options: [
    "csrf_parameter" => "_csrf_token"
    "csrf_token_id" => "logout"
    "logout_path" => "app_logout"
  ]
  -httpUtils: Symfony\Component\Security\Http\HttpUtils {#841 …}
  -csrfTokenManager: Symfony\Component\Security\Csrf\CsrfTokenManager {#1015 …}
  -eventDispatcher: Symfony\Component\EventDispatcher\Debug\TraceableEventDispatcher {#747 …}
}
0.00 ms (none)

Authenticators

No authenticators have been recorded. Check previous profiles on your authentication endpoint.

Access Decision

affirmative Strategy
# Voter class
1
"Symfony\Component\Security\Core\Authorization\Voter\AuthenticatedVoter"
2
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
3
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
4
"Symfony\Component\Security\Core\Authorization\Voter\ExpressionVoter"
5
"App\Security\Voter\EntryCommentVoter"
6
"App\Security\Voter\EntryVoter"
7
"App\Security\Voter\MagazineVoter"
8
"App\Security\Voter\MessageThreadVoter"
9
"App\Security\Voter\MessageVoter"
10
"App\Security\Voter\NotificationVoter"
11
"App\Security\Voter\OAuth2UserConsentVoter"
12
"App\Security\Voter\PostCommentVoter"
13
"App\Security\Voter\PostVoter"
14
"App\Security\Voter\UserVoter"

Access decision log

# Result Attributes Object
1 DENIED ROLE_USER
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
2 DENIED moderate
App\Entity\Entry {#2396
  +user: Proxies\__CG__\App\Entity\User {#1960 …}
  +magazine: App\Entity\Magazine {#261
    +icon: null
    +name: "guix@lemmy.ml"
    +title: "guix"
    +description: "Guix is an advanced distribution of the GNU operating system developed by the GNU Project"
    +rules: null
    +subscriptionsCount: 1
    +entryCount: 10
    +entryCommentCount: 8
    +postCount: 0
    +postCommentCount: 0
    +isAdult: false
    +customCss: null
    +lastActive: DateTime @1727743868 {#269
      date: 2024-10-01 02:51:08.0 +02:00
    }
    +markedForDeletionAt: null
    +tags: null
    +moderators: Doctrine\ORM\PersistentCollection {#248 …}
    +ownershipRequests: Doctrine\ORM\PersistentCollection {#244 …}
    +moderatorRequests: Doctrine\ORM\PersistentCollection {#233 …}
    +entries: Doctrine\ORM\PersistentCollection {#191 …}
    +posts: Doctrine\ORM\PersistentCollection {#149 …}
    +subscriptions: Doctrine\ORM\PersistentCollection {#211 …}
    +bans: Doctrine\ORM\PersistentCollection {#128 …}
    +reports: Doctrine\ORM\PersistentCollection {#114 …}
    +badges: Doctrine\ORM\PersistentCollection {#92 …}
    +logs: Doctrine\ORM\PersistentCollection {#82 …}
    +awards: Doctrine\ORM\PersistentCollection {#71 …}
    +categories: Doctrine\ORM\PersistentCollection {#1830 …}
    -id: 118
    +apId: "guix@lemmy.ml"
    +apProfileId: "https://lemmy.ml/c/guix"
    +apPublicUrl: "https://lemmy.ml/c/guix"
    +apFollowersUrl: "https://lemmy.ml/c/guix/followers"
    +apInboxUrl: "https://lemmy.ml/inbox"
    +apDomain: "lemmy.ml"
    +apPreferredUsername: "guix"
    +apDiscoverable: true
    +apManuallyApprovesFollowers: null
    +privateKey: null
    +publicKey: null
    +apFetchedAt: DateTime @1703436704 {#267
      date: 2023-12-24 17:51:44.0 +01:00
    }
    +apDeletedAt: null
    +apTimeoutAt: null
    +visibility: "visible             "
    +createdAt: DateTimeImmutable @1703436703 {#275
      date: 2023-12-24 17:51:43.0 +01:00
    }
  }
  +image: null
  +domain: Proxies\__CG__\App\Entity\Domain {#1876 …}
  +slug: "How-to-luks-encrypt-raid-drive"
  +title: "How to luks encrypt raid drive?"
  +url: null
  +body: """
    Edit: Turns out for what I’m trying to do (mount luks encrypted raid after start up) only needs the device mapping for the raid drive and not a file-system object.\n
    \n
    So I luks encrypted the raid and call a script to open the vault and mount it when I need to.\n
    \n
    ---\n
    \n
    In my system config file I added a raid drive like so:\n
    \n
    ```\n
    \n
    <span style="color:#323232;">(mapped-devices (list (mapped-device\n
    </span><span style="color:#323232;">                                     (source (uuid\n
    </span><span style="color:#323232;">                                                  "205e5caa-694f-4457-a2a1-8affa3536e75"))\n
    </span><span style="color:#323232;">                                     (target "guix")\n
    </span><span style="color:#323232;">                                     (type luks-device-mapping))\n
    </span><span style="color:#323232;">\n
    </span><span style="color:#323232;">                                  (mapped-device\n
    </span><span style="color:#323232;">                                     (source (list "/dev/sdb1" "/dev/sdc1"))\n
    </span><span style="color:#323232;">                                     (target "/dev/md0")\n
    </span><span style="color:#323232;">                                     (type raid-device-mapping))))\n
    </span><span style="color:#323232;">\n
    </span><span style="color:#323232;">(file-systems (cons* (file-system\n
    </span><span style="color:#323232;">                                  (mount-point "/")\n
    </span><span style="color:#323232;">                                  (device "/dev/mapper/guix")\n
    </span><span style="color:#323232;">                                  (type "ext4")\n
    </span><span style="color:#323232;">                                  (dependencies (list (list-ref mapped-devices 0))))\n
    </span><span style="color:#323232;">\n
    </span><span style="color:#323232;">                               (file-system\n
    </span><span style="color:#323232;">                                  (mount-point "/mnt/nas")\n
    </span><span style="color:#323232;">                                  (device "/dev/md0")\n
    </span><span style="color:#323232;">                                  (type "ext4")\n
    </span><span style="color:#323232;">                                  (mount? #f)\n
    </span><span style="color:#323232;">                                  (dependencies (list (list-ref mapped-devices 1)))) %base-file-systems)))\n
    </span>\n
    ```\n
    \n
    I’d now like to luks encrypt the raid drive but I’m not sure how to go about doing it. Do I simply make a another mapped-device object, specifying the raid drive uuid and “/dev/md0” as the target:\n
    \n
    ```\n
    \n
    <span style="color:#323232;">(mapped-device\n
    </span><span style="color:#323232;">   (source (uuid\n
    </span><span style="color:#323232;">                {raid uuid}))\n
    </span><span style="color:#323232;">                (target "/dev/md0")\n
    </span><span style="color:#323232;">                (type luks-device-mapping))\n
    </span>\n
    ```\n
    \n
    and then pass that as a dependency to the raid file system object?\n
    \n
    Thanks
    """
  +type: "article"
  +lang: "en"
  +isOc: false
  +hasEmbed: false
  +commentCount: 6
  +favouriteCount: 7
  +score: 0
  +isAdult: false
  +sticky: false
  +lastActive: DateTime @1711060515 {#1815
    date: 2024-03-21 23:35:15.0 +01:00
  }
  +ip: null
  +adaAmount: 0
  +tags: null
  +mentions: null
  +comments: Doctrine\ORM\PersistentCollection {#1916 …}
  +votes: Doctrine\ORM\PersistentCollection {#1974 …}
  +reports: Doctrine\ORM\PersistentCollection {#1837 …}
  +favourites: Doctrine\ORM\PersistentCollection {#1936 …}
  +notifications: Doctrine\ORM\PersistentCollection {#2429 …}
  +badges: Doctrine\ORM\PersistentCollection {#2424 …}
  +children: []
  -id: 26622
  -titleTs: "'drive':6 'encrypt':4 'luk':3 'raid':5"
  -bodyTs: "'/dev/mapper/guix':116 '/dev/md0':99,136,191,203 '/dev/sdb1':96 '/dev/sdc1':97 '/mnt/nas':134 '0':127 '1':149 '205e5':76 '4457':80 '694f':79 '8affa3536e75':83 'a2a1':82 'a2a1-8affa3536e75':81 'ad':61 'anoth':180 'base':151 'base-file-system':150 'caa':78 'caa-694f':77 'call':41 'con':108 'config':58 'd':155 'depend':119,141,215 'devic':21,69,73,89,93,103,115,126,135,148,183,197,207 'drive':26,64,163,188 'edit':1 'encrypt':13,37,160 'ext4':118,138 'f':140 'file':31,59,106,110,129,152,219 'file-system':30,105,109,128 'go':171 'guix':85 'like':65,157 'list':70,95,120,122,142,144 'list-ref':121,143 'luk':12,36,88,159,206 'luks-device-map':87,205 'm':7,166 'make':178 'map':22,68,72,90,92,104,125,147,182,196,208 'mapped-devic':67,71,91,124,146,181,195 'mount':11,49,113,132,139 'mount-point':112,131 'need':19,53 'object':33,184,221 'open':45 'pass':211 'point':114,133 'raid':14,25,39,63,102,162,187,200,218 'raid-device-map':101 'ref':123,145 'script':43 'simpli':177 'sourc':74,94,198 'specifi':185 'start':16 'sure':168 'system':32,57,107,111,130,153,220 'target':84,98,194,202 'thank':222 'tri':8 'turn':2 'type':86,100,117,137,204 'uuid':75,189,199,201 'vault':47"
  +cross: false
  +upVotes: 0
  +downVotes: 0
  +ranking: 1704181768
  +visibility: "visible             "
  +apId: "https://reddthat.com/post/11036859"
  +editedAt: DateTimeImmutable @1712607909 {#1813
    date: 2024-04-08 22:25:09.0 +02:00
  }
  +createdAt: DateTimeImmutable @1704144268 {#1802
    date: 2024-01-01 22:24:28.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS DENIED
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
3 DENIED edit
App\Entity\Entry {#2396
  +user: Proxies\__CG__\App\Entity\User {#1960 …}
  +magazine: App\Entity\Magazine {#261
    +icon: null
    +name: "guix@lemmy.ml"
    +title: "guix"
    +description: "Guix is an advanced distribution of the GNU operating system developed by the GNU Project"
    +rules: null
    +subscriptionsCount: 1
    +entryCount: 10
    +entryCommentCount: 8
    +postCount: 0
    +postCommentCount: 0
    +isAdult: false
    +customCss: null
    +lastActive: DateTime @1727743868 {#269
      date: 2024-10-01 02:51:08.0 +02:00
    }
    +markedForDeletionAt: null
    +tags: null
    +moderators: Doctrine\ORM\PersistentCollection {#248 …}
    +ownershipRequests: Doctrine\ORM\PersistentCollection {#244 …}
    +moderatorRequests: Doctrine\ORM\PersistentCollection {#233 …}
    +entries: Doctrine\ORM\PersistentCollection {#191 …}
    +posts: Doctrine\ORM\PersistentCollection {#149 …}
    +subscriptions: Doctrine\ORM\PersistentCollection {#211 …}
    +bans: Doctrine\ORM\PersistentCollection {#128 …}
    +reports: Doctrine\ORM\PersistentCollection {#114 …}
    +badges: Doctrine\ORM\PersistentCollection {#92 …}
    +logs: Doctrine\ORM\PersistentCollection {#82 …}
    +awards: Doctrine\ORM\PersistentCollection {#71 …}
    +categories: Doctrine\ORM\PersistentCollection {#1830 …}
    -id: 118
    +apId: "guix@lemmy.ml"
    +apProfileId: "https://lemmy.ml/c/guix"
    +apPublicUrl: "https://lemmy.ml/c/guix"
    +apFollowersUrl: "https://lemmy.ml/c/guix/followers"
    +apInboxUrl: "https://lemmy.ml/inbox"
    +apDomain: "lemmy.ml"
    +apPreferredUsername: "guix"
    +apDiscoverable: true
    +apManuallyApprovesFollowers: null
    +privateKey: null
    +publicKey: null
    +apFetchedAt: DateTime @1703436704 {#267
      date: 2023-12-24 17:51:44.0 +01:00
    }
    +apDeletedAt: null
    +apTimeoutAt: null
    +visibility: "visible             "
    +createdAt: DateTimeImmutable @1703436703 {#275
      date: 2023-12-24 17:51:43.0 +01:00
    }
  }
  +image: null
  +domain: Proxies\__CG__\App\Entity\Domain {#1876 …}
  +slug: "How-to-luks-encrypt-raid-drive"
  +title: "How to luks encrypt raid drive?"
  +url: null
  +body: """
    Edit: Turns out for what I’m trying to do (mount luks encrypted raid after start up) only needs the device mapping for the raid drive and not a file-system object.\n
    \n
    So I luks encrypted the raid and call a script to open the vault and mount it when I need to.\n
    \n
    ---\n
    \n
    In my system config file I added a raid drive like so:\n
    \n
    ```\n
    \n
    <span style="color:#323232;">(mapped-devices (list (mapped-device\n
    </span><span style="color:#323232;">                                     (source (uuid\n
    </span><span style="color:#323232;">                                                  "205e5caa-694f-4457-a2a1-8affa3536e75"))\n
    </span><span style="color:#323232;">                                     (target "guix")\n
    </span><span style="color:#323232;">                                     (type luks-device-mapping))\n
    </span><span style="color:#323232;">\n
    </span><span style="color:#323232;">                                  (mapped-device\n
    </span><span style="color:#323232;">                                     (source (list "/dev/sdb1" "/dev/sdc1"))\n
    </span><span style="color:#323232;">                                     (target "/dev/md0")\n
    </span><span style="color:#323232;">                                     (type raid-device-mapping))))\n
    </span><span style="color:#323232;">\n
    </span><span style="color:#323232;">(file-systems (cons* (file-system\n
    </span><span style="color:#323232;">                                  (mount-point "/")\n
    </span><span style="color:#323232;">                                  (device "/dev/mapper/guix")\n
    </span><span style="color:#323232;">                                  (type "ext4")\n
    </span><span style="color:#323232;">                                  (dependencies (list (list-ref mapped-devices 0))))\n
    </span><span style="color:#323232;">\n
    </span><span style="color:#323232;">                               (file-system\n
    </span><span style="color:#323232;">                                  (mount-point "/mnt/nas")\n
    </span><span style="color:#323232;">                                  (device "/dev/md0")\n
    </span><span style="color:#323232;">                                  (type "ext4")\n
    </span><span style="color:#323232;">                                  (mount? #f)\n
    </span><span style="color:#323232;">                                  (dependencies (list (list-ref mapped-devices 1)))) %base-file-systems)))\n
    </span>\n
    ```\n
    \n
    I’d now like to luks encrypt the raid drive but I’m not sure how to go about doing it. Do I simply make a another mapped-device object, specifying the raid drive uuid and “/dev/md0” as the target:\n
    \n
    ```\n
    \n
    <span style="color:#323232;">(mapped-device\n
    </span><span style="color:#323232;">   (source (uuid\n
    </span><span style="color:#323232;">                {raid uuid}))\n
    </span><span style="color:#323232;">                (target "/dev/md0")\n
    </span><span style="color:#323232;">                (type luks-device-mapping))\n
    </span>\n
    ```\n
    \n
    and then pass that as a dependency to the raid file system object?\n
    \n
    Thanks
    """
  +type: "article"
  +lang: "en"
  +isOc: false
  +hasEmbed: false
  +commentCount: 6
  +favouriteCount: 7
  +score: 0
  +isAdult: false
  +sticky: false
  +lastActive: DateTime @1711060515 {#1815
    date: 2024-03-21 23:35:15.0 +01:00
  }
  +ip: null
  +adaAmount: 0
  +tags: null
  +mentions: null
  +comments: Doctrine\ORM\PersistentCollection {#1916 …}
  +votes: Doctrine\ORM\PersistentCollection {#1974 …}
  +reports: Doctrine\ORM\PersistentCollection {#1837 …}
  +favourites: Doctrine\ORM\PersistentCollection {#1936 …}
  +notifications: Doctrine\ORM\PersistentCollection {#2429 …}
  +badges: Doctrine\ORM\PersistentCollection {#2424 …}
  +children: []
  -id: 26622
  -titleTs: "'drive':6 'encrypt':4 'luk':3 'raid':5"
  -bodyTs: "'/dev/mapper/guix':116 '/dev/md0':99,136,191,203 '/dev/sdb1':96 '/dev/sdc1':97 '/mnt/nas':134 '0':127 '1':149 '205e5':76 '4457':80 '694f':79 '8affa3536e75':83 'a2a1':82 'a2a1-8affa3536e75':81 'ad':61 'anoth':180 'base':151 'base-file-system':150 'caa':78 'caa-694f':77 'call':41 'con':108 'config':58 'd':155 'depend':119,141,215 'devic':21,69,73,89,93,103,115,126,135,148,183,197,207 'drive':26,64,163,188 'edit':1 'encrypt':13,37,160 'ext4':118,138 'f':140 'file':31,59,106,110,129,152,219 'file-system':30,105,109,128 'go':171 'guix':85 'like':65,157 'list':70,95,120,122,142,144 'list-ref':121,143 'luk':12,36,88,159,206 'luks-device-map':87,205 'm':7,166 'make':178 'map':22,68,72,90,92,104,125,147,182,196,208 'mapped-devic':67,71,91,124,146,181,195 'mount':11,49,113,132,139 'mount-point':112,131 'need':19,53 'object':33,184,221 'open':45 'pass':211 'point':114,133 'raid':14,25,39,63,102,162,187,200,218 'raid-device-map':101 'ref':123,145 'script':43 'simpli':177 'sourc':74,94,198 'specifi':185 'start':16 'sure':168 'system':32,57,107,111,130,153,220 'target':84,98,194,202 'thank':222 'tri':8 'turn':2 'type':86,100,117,137,204 'uuid':75,189,199,201 'vault':47"
  +cross: false
  +upVotes: 0
  +downVotes: 0
  +ranking: 1704181768
  +visibility: "visible             "
  +apId: "https://reddthat.com/post/11036859"
  +editedAt: DateTimeImmutable @1712607909 {#1813
    date: 2024-04-08 22:25:09.0 +02:00
  }
  +createdAt: DateTimeImmutable @1704144268 {#1802
    date: 2024-01-01 22:24:28.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS DENIED
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
4 DENIED moderate
App\Entity\Entry {#2396
  +user: Proxies\__CG__\App\Entity\User {#1960 …}
  +magazine: App\Entity\Magazine {#261
    +icon: null
    +name: "guix@lemmy.ml"
    +title: "guix"
    +description: "Guix is an advanced distribution of the GNU operating system developed by the GNU Project"
    +rules: null
    +subscriptionsCount: 1
    +entryCount: 10
    +entryCommentCount: 8
    +postCount: 0
    +postCommentCount: 0
    +isAdult: false
    +customCss: null
    +lastActive: DateTime @1727743868 {#269
      date: 2024-10-01 02:51:08.0 +02:00
    }
    +markedForDeletionAt: null
    +tags: null
    +moderators: Doctrine\ORM\PersistentCollection {#248 …}
    +ownershipRequests: Doctrine\ORM\PersistentCollection {#244 …}
    +moderatorRequests: Doctrine\ORM\PersistentCollection {#233 …}
    +entries: Doctrine\ORM\PersistentCollection {#191 …}
    +posts: Doctrine\ORM\PersistentCollection {#149 …}
    +subscriptions: Doctrine\ORM\PersistentCollection {#211 …}
    +bans: Doctrine\ORM\PersistentCollection {#128 …}
    +reports: Doctrine\ORM\PersistentCollection {#114 …}
    +badges: Doctrine\ORM\PersistentCollection {#92 …}
    +logs: Doctrine\ORM\PersistentCollection {#82 …}
    +awards: Doctrine\ORM\PersistentCollection {#71 …}
    +categories: Doctrine\ORM\PersistentCollection {#1830 …}
    -id: 118
    +apId: "guix@lemmy.ml"
    +apProfileId: "https://lemmy.ml/c/guix"
    +apPublicUrl: "https://lemmy.ml/c/guix"
    +apFollowersUrl: "https://lemmy.ml/c/guix/followers"
    +apInboxUrl: "https://lemmy.ml/inbox"
    +apDomain: "lemmy.ml"
    +apPreferredUsername: "guix"
    +apDiscoverable: true
    +apManuallyApprovesFollowers: null
    +privateKey: null
    +publicKey: null
    +apFetchedAt: DateTime @1703436704 {#267
      date: 2023-12-24 17:51:44.0 +01:00
    }
    +apDeletedAt: null
    +apTimeoutAt: null
    +visibility: "visible             "
    +createdAt: DateTimeImmutable @1703436703 {#275
      date: 2023-12-24 17:51:43.0 +01:00
    }
  }
  +image: null
  +domain: Proxies\__CG__\App\Entity\Domain {#1876 …}
  +slug: "How-to-luks-encrypt-raid-drive"
  +title: "How to luks encrypt raid drive?"
  +url: null
  +body: """
    Edit: Turns out for what I’m trying to do (mount luks encrypted raid after start up) only needs the device mapping for the raid drive and not a file-system object.\n
    \n
    So I luks encrypted the raid and call a script to open the vault and mount it when I need to.\n
    \n
    ---\n
    \n
    In my system config file I added a raid drive like so:\n
    \n
    ```\n
    \n
    <span style="color:#323232;">(mapped-devices (list (mapped-device\n
    </span><span style="color:#323232;">                                     (source (uuid\n
    </span><span style="color:#323232;">                                                  "205e5caa-694f-4457-a2a1-8affa3536e75"))\n
    </span><span style="color:#323232;">                                     (target "guix")\n
    </span><span style="color:#323232;">                                     (type luks-device-mapping))\n
    </span><span style="color:#323232;">\n
    </span><span style="color:#323232;">                                  (mapped-device\n
    </span><span style="color:#323232;">                                     (source (list "/dev/sdb1" "/dev/sdc1"))\n
    </span><span style="color:#323232;">                                     (target "/dev/md0")\n
    </span><span style="color:#323232;">                                     (type raid-device-mapping))))\n
    </span><span style="color:#323232;">\n
    </span><span style="color:#323232;">(file-systems (cons* (file-system\n
    </span><span style="color:#323232;">                                  (mount-point "/")\n
    </span><span style="color:#323232;">                                  (device "/dev/mapper/guix")\n
    </span><span style="color:#323232;">                                  (type "ext4")\n
    </span><span style="color:#323232;">                                  (dependencies (list (list-ref mapped-devices 0))))\n
    </span><span style="color:#323232;">\n
    </span><span style="color:#323232;">                               (file-system\n
    </span><span style="color:#323232;">                                  (mount-point "/mnt/nas")\n
    </span><span style="color:#323232;">                                  (device "/dev/md0")\n
    </span><span style="color:#323232;">                                  (type "ext4")\n
    </span><span style="color:#323232;">                                  (mount? #f)\n
    </span><span style="color:#323232;">                                  (dependencies (list (list-ref mapped-devices 1)))) %base-file-systems)))\n
    </span>\n
    ```\n
    \n
    I’d now like to luks encrypt the raid drive but I’m not sure how to go about doing it. Do I simply make a another mapped-device object, specifying the raid drive uuid and “/dev/md0” as the target:\n
    \n
    ```\n
    \n
    <span style="color:#323232;">(mapped-device\n
    </span><span style="color:#323232;">   (source (uuid\n
    </span><span style="color:#323232;">                {raid uuid}))\n
    </span><span style="color:#323232;">                (target "/dev/md0")\n
    </span><span style="color:#323232;">                (type luks-device-mapping))\n
    </span>\n
    ```\n
    \n
    and then pass that as a dependency to the raid file system object?\n
    \n
    Thanks
    """
  +type: "article"
  +lang: "en"
  +isOc: false
  +hasEmbed: false
  +commentCount: 6
  +favouriteCount: 7
  +score: 0
  +isAdult: false
  +sticky: false
  +lastActive: DateTime @1711060515 {#1815
    date: 2024-03-21 23:35:15.0 +01:00
  }
  +ip: null
  +adaAmount: 0
  +tags: null
  +mentions: null
  +comments: Doctrine\ORM\PersistentCollection {#1916 …}
  +votes: Doctrine\ORM\PersistentCollection {#1974 …}
  +reports: Doctrine\ORM\PersistentCollection {#1837 …}
  +favourites: Doctrine\ORM\PersistentCollection {#1936 …}
  +notifications: Doctrine\ORM\PersistentCollection {#2429 …}
  +badges: Doctrine\ORM\PersistentCollection {#2424 …}
  +children: []
  -id: 26622
  -titleTs: "'drive':6 'encrypt':4 'luk':3 'raid':5"
  -bodyTs: "'/dev/mapper/guix':116 '/dev/md0':99,136,191,203 '/dev/sdb1':96 '/dev/sdc1':97 '/mnt/nas':134 '0':127 '1':149 '205e5':76 '4457':80 '694f':79 '8affa3536e75':83 'a2a1':82 'a2a1-8affa3536e75':81 'ad':61 'anoth':180 'base':151 'base-file-system':150 'caa':78 'caa-694f':77 'call':41 'con':108 'config':58 'd':155 'depend':119,141,215 'devic':21,69,73,89,93,103,115,126,135,148,183,197,207 'drive':26,64,163,188 'edit':1 'encrypt':13,37,160 'ext4':118,138 'f':140 'file':31,59,106,110,129,152,219 'file-system':30,105,109,128 'go':171 'guix':85 'like':65,157 'list':70,95,120,122,142,144 'list-ref':121,143 'luk':12,36,88,159,206 'luks-device-map':87,205 'm':7,166 'make':178 'map':22,68,72,90,92,104,125,147,182,196,208 'mapped-devic':67,71,91,124,146,181,195 'mount':11,49,113,132,139 'mount-point':112,131 'need':19,53 'object':33,184,221 'open':45 'pass':211 'point':114,133 'raid':14,25,39,63,102,162,187,200,218 'raid-device-map':101 'ref':123,145 'script':43 'simpli':177 'sourc':74,94,198 'specifi':185 'start':16 'sure':168 'system':32,57,107,111,130,153,220 'target':84,98,194,202 'thank':222 'tri':8 'turn':2 'type':86,100,117,137,204 'uuid':75,189,199,201 'vault':47"
  +cross: false
  +upVotes: 0
  +downVotes: 0
  +ranking: 1704181768
  +visibility: "visible             "
  +apId: "https://reddthat.com/post/11036859"
  +editedAt: DateTimeImmutable @1712607909 {#1813
    date: 2024-04-08 22:25:09.0 +02:00
  }
  +createdAt: DateTimeImmutable @1704144268 {#1802
    date: 2024-01-01 22:24:28.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS DENIED
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
5 DENIED ROLE_USER
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
6 DENIED moderate
App\Entity\EntryComment {#4032
  +user: App\Entity\User {#3980 …}
  +entry: App\Entity\Entry {#2396
    +user: Proxies\__CG__\App\Entity\User {#1960 …}
    +magazine: App\Entity\Magazine {#261
      +icon: null
      +name: "guix@lemmy.ml"
      +title: "guix"
      +description: "Guix is an advanced distribution of the GNU operating system developed by the GNU Project"
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 10
      +entryCommentCount: 8
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1727743868 {#269
        date: 2024-10-01 02:51:08.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#248 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#244 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#233 …}
      +entries: Doctrine\ORM\PersistentCollection {#191 …}
      +posts: Doctrine\ORM\PersistentCollection {#149 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#211 …}
      +bans: Doctrine\ORM\PersistentCollection {#128 …}
      +reports: Doctrine\ORM\PersistentCollection {#114 …}
      +badges: Doctrine\ORM\PersistentCollection {#92 …}
      +logs: Doctrine\ORM\PersistentCollection {#82 …}
      +awards: Doctrine\ORM\PersistentCollection {#71 …}
      +categories: Doctrine\ORM\PersistentCollection {#1830 …}
      -id: 118
      +apId: "guix@lemmy.ml"
      +apProfileId: "https://lemmy.ml/c/guix"
      +apPublicUrl: "https://lemmy.ml/c/guix"
      +apFollowersUrl: "https://lemmy.ml/c/guix/followers"
      +apInboxUrl: "https://lemmy.ml/inbox"
      +apDomain: "lemmy.ml"
      +apPreferredUsername: "guix"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703436704 {#267
        date: 2023-12-24 17:51:44.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703436703 {#275
        date: 2023-12-24 17:51:43.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1876 …}
    +slug: "How-to-luks-encrypt-raid-drive"
    +title: "How to luks encrypt raid drive?"
    +url: null
    +body: """
      Edit: Turns out for what I’m trying to do (mount luks encrypted raid after start up) only needs the device mapping for the raid drive and not a file-system object.\n
      \n
      So I luks encrypted the raid and call a script to open the vault and mount it when I need to.\n
      \n
      ---\n
      \n
      In my system config file I added a raid drive like so:\n
      \n
      ```\n
      \n
      <span style="color:#323232;">(mapped-devices (list (mapped-device\n
      </span><span style="color:#323232;">                                     (source (uuid\n
      </span><span style="color:#323232;">                                                  "205e5caa-694f-4457-a2a1-8affa3536e75"))\n
      </span><span style="color:#323232;">                                     (target "guix")\n
      </span><span style="color:#323232;">                                     (type luks-device-mapping))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">                                  (mapped-device\n
      </span><span style="color:#323232;">                                     (source (list "/dev/sdb1" "/dev/sdc1"))\n
      </span><span style="color:#323232;">                                     (target "/dev/md0")\n
      </span><span style="color:#323232;">                                     (type raid-device-mapping))))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">(file-systems (cons* (file-system\n
      </span><span style="color:#323232;">                                  (mount-point "/")\n
      </span><span style="color:#323232;">                                  (device "/dev/mapper/guix")\n
      </span><span style="color:#323232;">                                  (type "ext4")\n
      </span><span style="color:#323232;">                                  (dependencies (list (list-ref mapped-devices 0))))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">                               (file-system\n
      </span><span style="color:#323232;">                                  (mount-point "/mnt/nas")\n
      </span><span style="color:#323232;">                                  (device "/dev/md0")\n
      </span><span style="color:#323232;">                                  (type "ext4")\n
      </span><span style="color:#323232;">                                  (mount? #f)\n
      </span><span style="color:#323232;">                                  (dependencies (list (list-ref mapped-devices 1)))) %base-file-systems)))\n
      </span>\n
      ```\n
      \n
      I’d now like to luks encrypt the raid drive but I’m not sure how to go about doing it. Do I simply make a another mapped-device object, specifying the raid drive uuid and “/dev/md0” as the target:\n
      \n
      ```\n
      \n
      <span style="color:#323232;">(mapped-device\n
      </span><span style="color:#323232;">   (source (uuid\n
      </span><span style="color:#323232;">                {raid uuid}))\n
      </span><span style="color:#323232;">                (target "/dev/md0")\n
      </span><span style="color:#323232;">                (type luks-device-mapping))\n
      </span>\n
      ```\n
      \n
      and then pass that as a dependency to the raid file system object?\n
      \n
      Thanks
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 6
    +favouriteCount: 7
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1711060515 {#1815
      date: 2024-03-21 23:35:15.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1916 …}
    +votes: Doctrine\ORM\PersistentCollection {#1974 …}
    +reports: Doctrine\ORM\PersistentCollection {#1837 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1936 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2429 …}
    +badges: Doctrine\ORM\PersistentCollection {#2424 …}
    +children: []
    -id: 26622
    -titleTs: "'drive':6 'encrypt':4 'luk':3 'raid':5"
    -bodyTs: "'/dev/mapper/guix':116 '/dev/md0':99,136,191,203 '/dev/sdb1':96 '/dev/sdc1':97 '/mnt/nas':134 '0':127 '1':149 '205e5':76 '4457':80 '694f':79 '8affa3536e75':83 'a2a1':82 'a2a1-8affa3536e75':81 'ad':61 'anoth':180 'base':151 'base-file-system':150 'caa':78 'caa-694f':77 'call':41 'con':108 'config':58 'd':155 'depend':119,141,215 'devic':21,69,73,89,93,103,115,126,135,148,183,197,207 'drive':26,64,163,188 'edit':1 'encrypt':13,37,160 'ext4':118,138 'f':140 'file':31,59,106,110,129,152,219 'file-system':30,105,109,128 'go':171 'guix':85 'like':65,157 'list':70,95,120,122,142,144 'list-ref':121,143 'luk':12,36,88,159,206 'luks-device-map':87,205 'm':7,166 'make':178 'map':22,68,72,90,92,104,125,147,182,196,208 'mapped-devic':67,71,91,124,146,181,195 'mount':11,49,113,132,139 'mount-point':112,131 'need':19,53 'object':33,184,221 'open':45 'pass':211 'point':114,133 'raid':14,25,39,63,102,162,187,200,218 'raid-device-map':101 'ref':123,145 'script':43 'simpli':177 'sourc':74,94,198 'specifi':185 'start':16 'sure':168 'system':32,57,107,111,130,153,220 'target':84,98,194,202 'thank':222 'tri':8 'turn':2 'type':86,100,117,137,204 'uuid':75,189,199,201 'vault':47"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1704181768
    +visibility: "visible             "
    +apId: "https://reddthat.com/post/11036859"
    +editedAt: DateTimeImmutable @1712607909 {#1813
      date: 2024-04-08 22:25:09.0 +02:00
    }
    +createdAt: DateTimeImmutable @1704144268 {#1802
      date: 2024-01-01 22:24:28.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#261}
  +image: null
  +parent: null
  +root: null
  +body: "You sure you want to use LUKS? It has a specific format that can be probed for almost like a known plain text."
  +lang: "en"
  +isAdult: false
  +favouriteCount: 1
  +score: 0
  +lastActive: DateTime @1711060515 {#4041
    date: 2024-03-21 23:35:15.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@HulkSmashBurgers@reddthat.com"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4030 …}
  +nested: Doctrine\ORM\PersistentCollection {#4028 …}
  +votes: Doctrine\ORM\PersistentCollection {#4026 …}
  +reports: Doctrine\ORM\PersistentCollection {#4024 …}
  +favourites: Doctrine\ORM\PersistentCollection {#3992 …}
  +notifications: Doctrine\ORM\PersistentCollection {#3996 …}
  -id: 271876
  -bodyTs: "'almost':18 'format':12 'known':21 'like':19 'luk':7 'plain':22 'probe':16 'specif':11 'sure':2 'text':23 'use':6 'want':4"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://sh.itjust.works/comment/6990747"
  +editedAt: null
  +createdAt: DateTimeImmutable @1704145891 {#3977
    date: 2024-01-01 22:51:31.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
7 DENIED edit
App\Entity\EntryComment {#4032
  +user: App\Entity\User {#3980 …}
  +entry: App\Entity\Entry {#2396
    +user: Proxies\__CG__\App\Entity\User {#1960 …}
    +magazine: App\Entity\Magazine {#261
      +icon: null
      +name: "guix@lemmy.ml"
      +title: "guix"
      +description: "Guix is an advanced distribution of the GNU operating system developed by the GNU Project"
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 10
      +entryCommentCount: 8
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1727743868 {#269
        date: 2024-10-01 02:51:08.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#248 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#244 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#233 …}
      +entries: Doctrine\ORM\PersistentCollection {#191 …}
      +posts: Doctrine\ORM\PersistentCollection {#149 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#211 …}
      +bans: Doctrine\ORM\PersistentCollection {#128 …}
      +reports: Doctrine\ORM\PersistentCollection {#114 …}
      +badges: Doctrine\ORM\PersistentCollection {#92 …}
      +logs: Doctrine\ORM\PersistentCollection {#82 …}
      +awards: Doctrine\ORM\PersistentCollection {#71 …}
      +categories: Doctrine\ORM\PersistentCollection {#1830 …}
      -id: 118
      +apId: "guix@lemmy.ml"
      +apProfileId: "https://lemmy.ml/c/guix"
      +apPublicUrl: "https://lemmy.ml/c/guix"
      +apFollowersUrl: "https://lemmy.ml/c/guix/followers"
      +apInboxUrl: "https://lemmy.ml/inbox"
      +apDomain: "lemmy.ml"
      +apPreferredUsername: "guix"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703436704 {#267
        date: 2023-12-24 17:51:44.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703436703 {#275
        date: 2023-12-24 17:51:43.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1876 …}
    +slug: "How-to-luks-encrypt-raid-drive"
    +title: "How to luks encrypt raid drive?"
    +url: null
    +body: """
      Edit: Turns out for what I’m trying to do (mount luks encrypted raid after start up) only needs the device mapping for the raid drive and not a file-system object.\n
      \n
      So I luks encrypted the raid and call a script to open the vault and mount it when I need to.\n
      \n
      ---\n
      \n
      In my system config file I added a raid drive like so:\n
      \n
      ```\n
      \n
      <span style="color:#323232;">(mapped-devices (list (mapped-device\n
      </span><span style="color:#323232;">                                     (source (uuid\n
      </span><span style="color:#323232;">                                                  "205e5caa-694f-4457-a2a1-8affa3536e75"))\n
      </span><span style="color:#323232;">                                     (target "guix")\n
      </span><span style="color:#323232;">                                     (type luks-device-mapping))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">                                  (mapped-device\n
      </span><span style="color:#323232;">                                     (source (list "/dev/sdb1" "/dev/sdc1"))\n
      </span><span style="color:#323232;">                                     (target "/dev/md0")\n
      </span><span style="color:#323232;">                                     (type raid-device-mapping))))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">(file-systems (cons* (file-system\n
      </span><span style="color:#323232;">                                  (mount-point "/")\n
      </span><span style="color:#323232;">                                  (device "/dev/mapper/guix")\n
      </span><span style="color:#323232;">                                  (type "ext4")\n
      </span><span style="color:#323232;">                                  (dependencies (list (list-ref mapped-devices 0))))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">                               (file-system\n
      </span><span style="color:#323232;">                                  (mount-point "/mnt/nas")\n
      </span><span style="color:#323232;">                                  (device "/dev/md0")\n
      </span><span style="color:#323232;">                                  (type "ext4")\n
      </span><span style="color:#323232;">                                  (mount? #f)\n
      </span><span style="color:#323232;">                                  (dependencies (list (list-ref mapped-devices 1)))) %base-file-systems)))\n
      </span>\n
      ```\n
      \n
      I’d now like to luks encrypt the raid drive but I’m not sure how to go about doing it. Do I simply make a another mapped-device object, specifying the raid drive uuid and “/dev/md0” as the target:\n
      \n
      ```\n
      \n
      <span style="color:#323232;">(mapped-device\n
      </span><span style="color:#323232;">   (source (uuid\n
      </span><span style="color:#323232;">                {raid uuid}))\n
      </span><span style="color:#323232;">                (target "/dev/md0")\n
      </span><span style="color:#323232;">                (type luks-device-mapping))\n
      </span>\n
      ```\n
      \n
      and then pass that as a dependency to the raid file system object?\n
      \n
      Thanks
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 6
    +favouriteCount: 7
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1711060515 {#1815
      date: 2024-03-21 23:35:15.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1916 …}
    +votes: Doctrine\ORM\PersistentCollection {#1974 …}
    +reports: Doctrine\ORM\PersistentCollection {#1837 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1936 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2429 …}
    +badges: Doctrine\ORM\PersistentCollection {#2424 …}
    +children: []
    -id: 26622
    -titleTs: "'drive':6 'encrypt':4 'luk':3 'raid':5"
    -bodyTs: "'/dev/mapper/guix':116 '/dev/md0':99,136,191,203 '/dev/sdb1':96 '/dev/sdc1':97 '/mnt/nas':134 '0':127 '1':149 '205e5':76 '4457':80 '694f':79 '8affa3536e75':83 'a2a1':82 'a2a1-8affa3536e75':81 'ad':61 'anoth':180 'base':151 'base-file-system':150 'caa':78 'caa-694f':77 'call':41 'con':108 'config':58 'd':155 'depend':119,141,215 'devic':21,69,73,89,93,103,115,126,135,148,183,197,207 'drive':26,64,163,188 'edit':1 'encrypt':13,37,160 'ext4':118,138 'f':140 'file':31,59,106,110,129,152,219 'file-system':30,105,109,128 'go':171 'guix':85 'like':65,157 'list':70,95,120,122,142,144 'list-ref':121,143 'luk':12,36,88,159,206 'luks-device-map':87,205 'm':7,166 'make':178 'map':22,68,72,90,92,104,125,147,182,196,208 'mapped-devic':67,71,91,124,146,181,195 'mount':11,49,113,132,139 'mount-point':112,131 'need':19,53 'object':33,184,221 'open':45 'pass':211 'point':114,133 'raid':14,25,39,63,102,162,187,200,218 'raid-device-map':101 'ref':123,145 'script':43 'simpli':177 'sourc':74,94,198 'specifi':185 'start':16 'sure':168 'system':32,57,107,111,130,153,220 'target':84,98,194,202 'thank':222 'tri':8 'turn':2 'type':86,100,117,137,204 'uuid':75,189,199,201 'vault':47"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1704181768
    +visibility: "visible             "
    +apId: "https://reddthat.com/post/11036859"
    +editedAt: DateTimeImmutable @1712607909 {#1813
      date: 2024-04-08 22:25:09.0 +02:00
    }
    +createdAt: DateTimeImmutable @1704144268 {#1802
      date: 2024-01-01 22:24:28.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#261}
  +image: null
  +parent: null
  +root: null
  +body: "You sure you want to use LUKS? It has a specific format that can be probed for almost like a known plain text."
  +lang: "en"
  +isAdult: false
  +favouriteCount: 1
  +score: 0
  +lastActive: DateTime @1711060515 {#4041
    date: 2024-03-21 23:35:15.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@HulkSmashBurgers@reddthat.com"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4030 …}
  +nested: Doctrine\ORM\PersistentCollection {#4028 …}
  +votes: Doctrine\ORM\PersistentCollection {#4026 …}
  +reports: Doctrine\ORM\PersistentCollection {#4024 …}
  +favourites: Doctrine\ORM\PersistentCollection {#3992 …}
  +notifications: Doctrine\ORM\PersistentCollection {#3996 …}
  -id: 271876
  -bodyTs: "'almost':18 'format':12 'known':21 'like':19 'luk':7 'plain':22 'probe':16 'specif':11 'sure':2 'text':23 'use':6 'want':4"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://sh.itjust.works/comment/6990747"
  +editedAt: null
  +createdAt: DateTimeImmutable @1704145891 {#3977
    date: 2024-01-01 22:51:31.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
8 DENIED moderate
App\Entity\EntryComment {#4032
  +user: App\Entity\User {#3980 …}
  +entry: App\Entity\Entry {#2396
    +user: Proxies\__CG__\App\Entity\User {#1960 …}
    +magazine: App\Entity\Magazine {#261
      +icon: null
      +name: "guix@lemmy.ml"
      +title: "guix"
      +description: "Guix is an advanced distribution of the GNU operating system developed by the GNU Project"
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 10
      +entryCommentCount: 8
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1727743868 {#269
        date: 2024-10-01 02:51:08.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#248 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#244 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#233 …}
      +entries: Doctrine\ORM\PersistentCollection {#191 …}
      +posts: Doctrine\ORM\PersistentCollection {#149 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#211 …}
      +bans: Doctrine\ORM\PersistentCollection {#128 …}
      +reports: Doctrine\ORM\PersistentCollection {#114 …}
      +badges: Doctrine\ORM\PersistentCollection {#92 …}
      +logs: Doctrine\ORM\PersistentCollection {#82 …}
      +awards: Doctrine\ORM\PersistentCollection {#71 …}
      +categories: Doctrine\ORM\PersistentCollection {#1830 …}
      -id: 118
      +apId: "guix@lemmy.ml"
      +apProfileId: "https://lemmy.ml/c/guix"
      +apPublicUrl: "https://lemmy.ml/c/guix"
      +apFollowersUrl: "https://lemmy.ml/c/guix/followers"
      +apInboxUrl: "https://lemmy.ml/inbox"
      +apDomain: "lemmy.ml"
      +apPreferredUsername: "guix"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703436704 {#267
        date: 2023-12-24 17:51:44.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703436703 {#275
        date: 2023-12-24 17:51:43.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1876 …}
    +slug: "How-to-luks-encrypt-raid-drive"
    +title: "How to luks encrypt raid drive?"
    +url: null
    +body: """
      Edit: Turns out for what I’m trying to do (mount luks encrypted raid after start up) only needs the device mapping for the raid drive and not a file-system object.\n
      \n
      So I luks encrypted the raid and call a script to open the vault and mount it when I need to.\n
      \n
      ---\n
      \n
      In my system config file I added a raid drive like so:\n
      \n
      ```\n
      \n
      <span style="color:#323232;">(mapped-devices (list (mapped-device\n
      </span><span style="color:#323232;">                                     (source (uuid\n
      </span><span style="color:#323232;">                                                  "205e5caa-694f-4457-a2a1-8affa3536e75"))\n
      </span><span style="color:#323232;">                                     (target "guix")\n
      </span><span style="color:#323232;">                                     (type luks-device-mapping))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">                                  (mapped-device\n
      </span><span style="color:#323232;">                                     (source (list "/dev/sdb1" "/dev/sdc1"))\n
      </span><span style="color:#323232;">                                     (target "/dev/md0")\n
      </span><span style="color:#323232;">                                     (type raid-device-mapping))))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">(file-systems (cons* (file-system\n
      </span><span style="color:#323232;">                                  (mount-point "/")\n
      </span><span style="color:#323232;">                                  (device "/dev/mapper/guix")\n
      </span><span style="color:#323232;">                                  (type "ext4")\n
      </span><span style="color:#323232;">                                  (dependencies (list (list-ref mapped-devices 0))))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">                               (file-system\n
      </span><span style="color:#323232;">                                  (mount-point "/mnt/nas")\n
      </span><span style="color:#323232;">                                  (device "/dev/md0")\n
      </span><span style="color:#323232;">                                  (type "ext4")\n
      </span><span style="color:#323232;">                                  (mount? #f)\n
      </span><span style="color:#323232;">                                  (dependencies (list (list-ref mapped-devices 1)))) %base-file-systems)))\n
      </span>\n
      ```\n
      \n
      I’d now like to luks encrypt the raid drive but I’m not sure how to go about doing it. Do I simply make a another mapped-device object, specifying the raid drive uuid and “/dev/md0” as the target:\n
      \n
      ```\n
      \n
      <span style="color:#323232;">(mapped-device\n
      </span><span style="color:#323232;">   (source (uuid\n
      </span><span style="color:#323232;">                {raid uuid}))\n
      </span><span style="color:#323232;">                (target "/dev/md0")\n
      </span><span style="color:#323232;">                (type luks-device-mapping))\n
      </span>\n
      ```\n
      \n
      and then pass that as a dependency to the raid file system object?\n
      \n
      Thanks
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 6
    +favouriteCount: 7
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1711060515 {#1815
      date: 2024-03-21 23:35:15.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1916 …}
    +votes: Doctrine\ORM\PersistentCollection {#1974 …}
    +reports: Doctrine\ORM\PersistentCollection {#1837 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1936 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2429 …}
    +badges: Doctrine\ORM\PersistentCollection {#2424 …}
    +children: []
    -id: 26622
    -titleTs: "'drive':6 'encrypt':4 'luk':3 'raid':5"
    -bodyTs: "'/dev/mapper/guix':116 '/dev/md0':99,136,191,203 '/dev/sdb1':96 '/dev/sdc1':97 '/mnt/nas':134 '0':127 '1':149 '205e5':76 '4457':80 '694f':79 '8affa3536e75':83 'a2a1':82 'a2a1-8affa3536e75':81 'ad':61 'anoth':180 'base':151 'base-file-system':150 'caa':78 'caa-694f':77 'call':41 'con':108 'config':58 'd':155 'depend':119,141,215 'devic':21,69,73,89,93,103,115,126,135,148,183,197,207 'drive':26,64,163,188 'edit':1 'encrypt':13,37,160 'ext4':118,138 'f':140 'file':31,59,106,110,129,152,219 'file-system':30,105,109,128 'go':171 'guix':85 'like':65,157 'list':70,95,120,122,142,144 'list-ref':121,143 'luk':12,36,88,159,206 'luks-device-map':87,205 'm':7,166 'make':178 'map':22,68,72,90,92,104,125,147,182,196,208 'mapped-devic':67,71,91,124,146,181,195 'mount':11,49,113,132,139 'mount-point':112,131 'need':19,53 'object':33,184,221 'open':45 'pass':211 'point':114,133 'raid':14,25,39,63,102,162,187,200,218 'raid-device-map':101 'ref':123,145 'script':43 'simpli':177 'sourc':74,94,198 'specifi':185 'start':16 'sure':168 'system':32,57,107,111,130,153,220 'target':84,98,194,202 'thank':222 'tri':8 'turn':2 'type':86,100,117,137,204 'uuid':75,189,199,201 'vault':47"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1704181768
    +visibility: "visible             "
    +apId: "https://reddthat.com/post/11036859"
    +editedAt: DateTimeImmutable @1712607909 {#1813
      date: 2024-04-08 22:25:09.0 +02:00
    }
    +createdAt: DateTimeImmutable @1704144268 {#1802
      date: 2024-01-01 22:24:28.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#261}
  +image: null
  +parent: null
  +root: null
  +body: "You sure you want to use LUKS? It has a specific format that can be probed for almost like a known plain text."
  +lang: "en"
  +isAdult: false
  +favouriteCount: 1
  +score: 0
  +lastActive: DateTime @1711060515 {#4041
    date: 2024-03-21 23:35:15.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@HulkSmashBurgers@reddthat.com"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4030 …}
  +nested: Doctrine\ORM\PersistentCollection {#4028 …}
  +votes: Doctrine\ORM\PersistentCollection {#4026 …}
  +reports: Doctrine\ORM\PersistentCollection {#4024 …}
  +favourites: Doctrine\ORM\PersistentCollection {#3992 …}
  +notifications: Doctrine\ORM\PersistentCollection {#3996 …}
  -id: 271876
  -bodyTs: "'almost':18 'format':12 'known':21 'like':19 'luk':7 'plain':22 'probe':16 'specif':11 'sure':2 'text':23 'use':6 'want':4"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://sh.itjust.works/comment/6990747"
  +editedAt: null
  +createdAt: DateTimeImmutable @1704145891 {#3977
    date: 2024-01-01 22:51:31.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
9 DENIED ROLE_USER
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
10 DENIED moderate
App\Entity\EntryComment {#4050
  +user: Proxies\__CG__\App\Entity\User {#1960 …}
  +entry: App\Entity\Entry {#2396
    +user: Proxies\__CG__\App\Entity\User {#1960 …}
    +magazine: App\Entity\Magazine {#261
      +icon: null
      +name: "guix@lemmy.ml"
      +title: "guix"
      +description: "Guix is an advanced distribution of the GNU operating system developed by the GNU Project"
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 10
      +entryCommentCount: 8
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1727743868 {#269
        date: 2024-10-01 02:51:08.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#248 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#244 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#233 …}
      +entries: Doctrine\ORM\PersistentCollection {#191 …}
      +posts: Doctrine\ORM\PersistentCollection {#149 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#211 …}
      +bans: Doctrine\ORM\PersistentCollection {#128 …}
      +reports: Doctrine\ORM\PersistentCollection {#114 …}
      +badges: Doctrine\ORM\PersistentCollection {#92 …}
      +logs: Doctrine\ORM\PersistentCollection {#82 …}
      +awards: Doctrine\ORM\PersistentCollection {#71 …}
      +categories: Doctrine\ORM\PersistentCollection {#1830 …}
      -id: 118
      +apId: "guix@lemmy.ml"
      +apProfileId: "https://lemmy.ml/c/guix"
      +apPublicUrl: "https://lemmy.ml/c/guix"
      +apFollowersUrl: "https://lemmy.ml/c/guix/followers"
      +apInboxUrl: "https://lemmy.ml/inbox"
      +apDomain: "lemmy.ml"
      +apPreferredUsername: "guix"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703436704 {#267
        date: 2023-12-24 17:51:44.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703436703 {#275
        date: 2023-12-24 17:51:43.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1876 …}
    +slug: "How-to-luks-encrypt-raid-drive"
    +title: "How to luks encrypt raid drive?"
    +url: null
    +body: """
      Edit: Turns out for what I’m trying to do (mount luks encrypted raid after start up) only needs the device mapping for the raid drive and not a file-system object.\n
      \n
      So I luks encrypted the raid and call a script to open the vault and mount it when I need to.\n
      \n
      ---\n
      \n
      In my system config file I added a raid drive like so:\n
      \n
      ```\n
      \n
      <span style="color:#323232;">(mapped-devices (list (mapped-device\n
      </span><span style="color:#323232;">                                     (source (uuid\n
      </span><span style="color:#323232;">                                                  "205e5caa-694f-4457-a2a1-8affa3536e75"))\n
      </span><span style="color:#323232;">                                     (target "guix")\n
      </span><span style="color:#323232;">                                     (type luks-device-mapping))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">                                  (mapped-device\n
      </span><span style="color:#323232;">                                     (source (list "/dev/sdb1" "/dev/sdc1"))\n
      </span><span style="color:#323232;">                                     (target "/dev/md0")\n
      </span><span style="color:#323232;">                                     (type raid-device-mapping))))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">(file-systems (cons* (file-system\n
      </span><span style="color:#323232;">                                  (mount-point "/")\n
      </span><span style="color:#323232;">                                  (device "/dev/mapper/guix")\n
      </span><span style="color:#323232;">                                  (type "ext4")\n
      </span><span style="color:#323232;">                                  (dependencies (list (list-ref mapped-devices 0))))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">                               (file-system\n
      </span><span style="color:#323232;">                                  (mount-point "/mnt/nas")\n
      </span><span style="color:#323232;">                                  (device "/dev/md0")\n
      </span><span style="color:#323232;">                                  (type "ext4")\n
      </span><span style="color:#323232;">                                  (mount? #f)\n
      </span><span style="color:#323232;">                                  (dependencies (list (list-ref mapped-devices 1)))) %base-file-systems)))\n
      </span>\n
      ```\n
      \n
      I’d now like to luks encrypt the raid drive but I’m not sure how to go about doing it. Do I simply make a another mapped-device object, specifying the raid drive uuid and “/dev/md0” as the target:\n
      \n
      ```\n
      \n
      <span style="color:#323232;">(mapped-device\n
      </span><span style="color:#323232;">   (source (uuid\n
      </span><span style="color:#323232;">                {raid uuid}))\n
      </span><span style="color:#323232;">                (target "/dev/md0")\n
      </span><span style="color:#323232;">                (type luks-device-mapping))\n
      </span>\n
      ```\n
      \n
      and then pass that as a dependency to the raid file system object?\n
      \n
      Thanks
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 6
    +favouriteCount: 7
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1711060515 {#1815
      date: 2024-03-21 23:35:15.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1916 …}
    +votes: Doctrine\ORM\PersistentCollection {#1974 …}
    +reports: Doctrine\ORM\PersistentCollection {#1837 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1936 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2429 …}
    +badges: Doctrine\ORM\PersistentCollection {#2424 …}
    +children: []
    -id: 26622
    -titleTs: "'drive':6 'encrypt':4 'luk':3 'raid':5"
    -bodyTs: "'/dev/mapper/guix':116 '/dev/md0':99,136,191,203 '/dev/sdb1':96 '/dev/sdc1':97 '/mnt/nas':134 '0':127 '1':149 '205e5':76 '4457':80 '694f':79 '8affa3536e75':83 'a2a1':82 'a2a1-8affa3536e75':81 'ad':61 'anoth':180 'base':151 'base-file-system':150 'caa':78 'caa-694f':77 'call':41 'con':108 'config':58 'd':155 'depend':119,141,215 'devic':21,69,73,89,93,103,115,126,135,148,183,197,207 'drive':26,64,163,188 'edit':1 'encrypt':13,37,160 'ext4':118,138 'f':140 'file':31,59,106,110,129,152,219 'file-system':30,105,109,128 'go':171 'guix':85 'like':65,157 'list':70,95,120,122,142,144 'list-ref':121,143 'luk':12,36,88,159,206 'luks-device-map':87,205 'm':7,166 'make':178 'map':22,68,72,90,92,104,125,147,182,196,208 'mapped-devic':67,71,91,124,146,181,195 'mount':11,49,113,132,139 'mount-point':112,131 'need':19,53 'object':33,184,221 'open':45 'pass':211 'point':114,133 'raid':14,25,39,63,102,162,187,200,218 'raid-device-map':101 'ref':123,145 'script':43 'simpli':177 'sourc':74,94,198 'specifi':185 'start':16 'sure':168 'system':32,57,107,111,130,153,220 'target':84,98,194,202 'thank':222 'tri':8 'turn':2 'type':86,100,117,137,204 'uuid':75,189,199,201 'vault':47"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1704181768
    +visibility: "visible             "
    +apId: "https://reddthat.com/post/11036859"
    +editedAt: DateTimeImmutable @1712607909 {#1813
      date: 2024-04-08 22:25:09.0 +02:00
    }
    +createdAt: DateTimeImmutable @1704144268 {#1802
      date: 2024-01-01 22:24:28.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#261}
  +image: null
  +parent: App\Entity\EntryComment {#4032
    +user: App\Entity\User {#3980 …}
    +entry: App\Entity\Entry {#2396}
    +magazine: App\Entity\Magazine {#261}
    +image: null
    +parent: null
    +root: null
    +body: "You sure you want to use LUKS? It has a specific format that can be probed for almost like a known plain text."
    +lang: "en"
    +isAdult: false
    +favouriteCount: 1
    +score: 0
    +lastActive: DateTime @1711060515 {#4041
      date: 2024-03-21 23:35:15.0 +01:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@HulkSmashBurgers@reddthat.com"
    ]
    +children: Doctrine\ORM\PersistentCollection {#4030 …}
    +nested: Doctrine\ORM\PersistentCollection {#4028 …}
    +votes: Doctrine\ORM\PersistentCollection {#4026 …}
    +reports: Doctrine\ORM\PersistentCollection {#4024 …}
    +favourites: Doctrine\ORM\PersistentCollection {#3992 …}
    +notifications: Doctrine\ORM\PersistentCollection {#3996 …}
    -id: 271876
    -bodyTs: "'almost':18 'format':12 'known':21 'like':19 'luk':7 'plain':22 'probe':16 'specif':11 'sure':2 'text':23 'use':6 'want':4"
    +ranking: 0
    +commentCount: 0
    +upVotes: 0
    +downVotes: 0
    +visibility: "visible             "
    +apId: "https://sh.itjust.works/comment/6990747"
    +editedAt: null
    +createdAt: DateTimeImmutable @1704145891 {#3977
      date: 2024-01-01 22:51:31.0 +01:00
    }
  }
  +root: App\Entity\EntryComment {#4032}
  +body: "I’m not opposed to using something other than luks, it’s just what I’m familiar with. Is there some other better approach you could recommend?"
  +lang: "en"
  +isAdult: false
  +favouriteCount: 1
  +score: 0
  +lastActive: DateTime @1704158356 {#4055
    date: 2024-01-02 02:19:16.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@HulkSmashBurgers@reddthat.com"
    "@lurch@sh.itjust.works"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4060 …}
  +nested: Doctrine\ORM\PersistentCollection {#4059 …}
  +votes: Doctrine\ORM\PersistentCollection {#4068 …}
  +reports: Doctrine\ORM\PersistentCollection {#4049 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4047 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4045 …}
  -id: 272079
  -bodyTs: "'approach':24 'better':23 'could':26 'familiar':17 'luk':10 'm':2,16 'oppos':4 'recommend':27 'someth':7 'use':6"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://reddthat.com/comment/6004757"
  +editedAt: null
  +createdAt: DateTimeImmutable @1704158356 {#4052
    date: 2024-01-02 02:19:16.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
11 DENIED edit
App\Entity\EntryComment {#4050
  +user: Proxies\__CG__\App\Entity\User {#1960 …}
  +entry: App\Entity\Entry {#2396
    +user: Proxies\__CG__\App\Entity\User {#1960 …}
    +magazine: App\Entity\Magazine {#261
      +icon: null
      +name: "guix@lemmy.ml"
      +title: "guix"
      +description: "Guix is an advanced distribution of the GNU operating system developed by the GNU Project"
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 10
      +entryCommentCount: 8
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1727743868 {#269
        date: 2024-10-01 02:51:08.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#248 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#244 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#233 …}
      +entries: Doctrine\ORM\PersistentCollection {#191 …}
      +posts: Doctrine\ORM\PersistentCollection {#149 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#211 …}
      +bans: Doctrine\ORM\PersistentCollection {#128 …}
      +reports: Doctrine\ORM\PersistentCollection {#114 …}
      +badges: Doctrine\ORM\PersistentCollection {#92 …}
      +logs: Doctrine\ORM\PersistentCollection {#82 …}
      +awards: Doctrine\ORM\PersistentCollection {#71 …}
      +categories: Doctrine\ORM\PersistentCollection {#1830 …}
      -id: 118
      +apId: "guix@lemmy.ml"
      +apProfileId: "https://lemmy.ml/c/guix"
      +apPublicUrl: "https://lemmy.ml/c/guix"
      +apFollowersUrl: "https://lemmy.ml/c/guix/followers"
      +apInboxUrl: "https://lemmy.ml/inbox"
      +apDomain: "lemmy.ml"
      +apPreferredUsername: "guix"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703436704 {#267
        date: 2023-12-24 17:51:44.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703436703 {#275
        date: 2023-12-24 17:51:43.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1876 …}
    +slug: "How-to-luks-encrypt-raid-drive"
    +title: "How to luks encrypt raid drive?"
    +url: null
    +body: """
      Edit: Turns out for what I’m trying to do (mount luks encrypted raid after start up) only needs the device mapping for the raid drive and not a file-system object.\n
      \n
      So I luks encrypted the raid and call a script to open the vault and mount it when I need to.\n
      \n
      ---\n
      \n
      In my system config file I added a raid drive like so:\n
      \n
      ```\n
      \n
      <span style="color:#323232;">(mapped-devices (list (mapped-device\n
      </span><span style="color:#323232;">                                     (source (uuid\n
      </span><span style="color:#323232;">                                                  "205e5caa-694f-4457-a2a1-8affa3536e75"))\n
      </span><span style="color:#323232;">                                     (target "guix")\n
      </span><span style="color:#323232;">                                     (type luks-device-mapping))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">                                  (mapped-device\n
      </span><span style="color:#323232;">                                     (source (list "/dev/sdb1" "/dev/sdc1"))\n
      </span><span style="color:#323232;">                                     (target "/dev/md0")\n
      </span><span style="color:#323232;">                                     (type raid-device-mapping))))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">(file-systems (cons* (file-system\n
      </span><span style="color:#323232;">                                  (mount-point "/")\n
      </span><span style="color:#323232;">                                  (device "/dev/mapper/guix")\n
      </span><span style="color:#323232;">                                  (type "ext4")\n
      </span><span style="color:#323232;">                                  (dependencies (list (list-ref mapped-devices 0))))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">                               (file-system\n
      </span><span style="color:#323232;">                                  (mount-point "/mnt/nas")\n
      </span><span style="color:#323232;">                                  (device "/dev/md0")\n
      </span><span style="color:#323232;">                                  (type "ext4")\n
      </span><span style="color:#323232;">                                  (mount? #f)\n
      </span><span style="color:#323232;">                                  (dependencies (list (list-ref mapped-devices 1)))) %base-file-systems)))\n
      </span>\n
      ```\n
      \n
      I’d now like to luks encrypt the raid drive but I’m not sure how to go about doing it. Do I simply make a another mapped-device object, specifying the raid drive uuid and “/dev/md0” as the target:\n
      \n
      ```\n
      \n
      <span style="color:#323232;">(mapped-device\n
      </span><span style="color:#323232;">   (source (uuid\n
      </span><span style="color:#323232;">                {raid uuid}))\n
      </span><span style="color:#323232;">                (target "/dev/md0")\n
      </span><span style="color:#323232;">                (type luks-device-mapping))\n
      </span>\n
      ```\n
      \n
      and then pass that as a dependency to the raid file system object?\n
      \n
      Thanks
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 6
    +favouriteCount: 7
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1711060515 {#1815
      date: 2024-03-21 23:35:15.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1916 …}
    +votes: Doctrine\ORM\PersistentCollection {#1974 …}
    +reports: Doctrine\ORM\PersistentCollection {#1837 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1936 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2429 …}
    +badges: Doctrine\ORM\PersistentCollection {#2424 …}
    +children: []
    -id: 26622
    -titleTs: "'drive':6 'encrypt':4 'luk':3 'raid':5"
    -bodyTs: "'/dev/mapper/guix':116 '/dev/md0':99,136,191,203 '/dev/sdb1':96 '/dev/sdc1':97 '/mnt/nas':134 '0':127 '1':149 '205e5':76 '4457':80 '694f':79 '8affa3536e75':83 'a2a1':82 'a2a1-8affa3536e75':81 'ad':61 'anoth':180 'base':151 'base-file-system':150 'caa':78 'caa-694f':77 'call':41 'con':108 'config':58 'd':155 'depend':119,141,215 'devic':21,69,73,89,93,103,115,126,135,148,183,197,207 'drive':26,64,163,188 'edit':1 'encrypt':13,37,160 'ext4':118,138 'f':140 'file':31,59,106,110,129,152,219 'file-system':30,105,109,128 'go':171 'guix':85 'like':65,157 'list':70,95,120,122,142,144 'list-ref':121,143 'luk':12,36,88,159,206 'luks-device-map':87,205 'm':7,166 'make':178 'map':22,68,72,90,92,104,125,147,182,196,208 'mapped-devic':67,71,91,124,146,181,195 'mount':11,49,113,132,139 'mount-point':112,131 'need':19,53 'object':33,184,221 'open':45 'pass':211 'point':114,133 'raid':14,25,39,63,102,162,187,200,218 'raid-device-map':101 'ref':123,145 'script':43 'simpli':177 'sourc':74,94,198 'specifi':185 'start':16 'sure':168 'system':32,57,107,111,130,153,220 'target':84,98,194,202 'thank':222 'tri':8 'turn':2 'type':86,100,117,137,204 'uuid':75,189,199,201 'vault':47"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1704181768
    +visibility: "visible             "
    +apId: "https://reddthat.com/post/11036859"
    +editedAt: DateTimeImmutable @1712607909 {#1813
      date: 2024-04-08 22:25:09.0 +02:00
    }
    +createdAt: DateTimeImmutable @1704144268 {#1802
      date: 2024-01-01 22:24:28.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#261}
  +image: null
  +parent: App\Entity\EntryComment {#4032
    +user: App\Entity\User {#3980 …}
    +entry: App\Entity\Entry {#2396}
    +magazine: App\Entity\Magazine {#261}
    +image: null
    +parent: null
    +root: null
    +body: "You sure you want to use LUKS? It has a specific format that can be probed for almost like a known plain text."
    +lang: "en"
    +isAdult: false
    +favouriteCount: 1
    +score: 0
    +lastActive: DateTime @1711060515 {#4041
      date: 2024-03-21 23:35:15.0 +01:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@HulkSmashBurgers@reddthat.com"
    ]
    +children: Doctrine\ORM\PersistentCollection {#4030 …}
    +nested: Doctrine\ORM\PersistentCollection {#4028 …}
    +votes: Doctrine\ORM\PersistentCollection {#4026 …}
    +reports: Doctrine\ORM\PersistentCollection {#4024 …}
    +favourites: Doctrine\ORM\PersistentCollection {#3992 …}
    +notifications: Doctrine\ORM\PersistentCollection {#3996 …}
    -id: 271876
    -bodyTs: "'almost':18 'format':12 'known':21 'like':19 'luk':7 'plain':22 'probe':16 'specif':11 'sure':2 'text':23 'use':6 'want':4"
    +ranking: 0
    +commentCount: 0
    +upVotes: 0
    +downVotes: 0
    +visibility: "visible             "
    +apId: "https://sh.itjust.works/comment/6990747"
    +editedAt: null
    +createdAt: DateTimeImmutable @1704145891 {#3977
      date: 2024-01-01 22:51:31.0 +01:00
    }
  }
  +root: App\Entity\EntryComment {#4032}
  +body: "I’m not opposed to using something other than luks, it’s just what I’m familiar with. Is there some other better approach you could recommend?"
  +lang: "en"
  +isAdult: false
  +favouriteCount: 1
  +score: 0
  +lastActive: DateTime @1704158356 {#4055
    date: 2024-01-02 02:19:16.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@HulkSmashBurgers@reddthat.com"
    "@lurch@sh.itjust.works"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4060 …}
  +nested: Doctrine\ORM\PersistentCollection {#4059 …}
  +votes: Doctrine\ORM\PersistentCollection {#4068 …}
  +reports: Doctrine\ORM\PersistentCollection {#4049 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4047 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4045 …}
  -id: 272079
  -bodyTs: "'approach':24 'better':23 'could':26 'familiar':17 'luk':10 'm':2,16 'oppos':4 'recommend':27 'someth':7 'use':6"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://reddthat.com/comment/6004757"
  +editedAt: null
  +createdAt: DateTimeImmutable @1704158356 {#4052
    date: 2024-01-02 02:19:16.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
12 DENIED moderate
App\Entity\EntryComment {#4050
  +user: Proxies\__CG__\App\Entity\User {#1960 …}
  +entry: App\Entity\Entry {#2396
    +user: Proxies\__CG__\App\Entity\User {#1960 …}
    +magazine: App\Entity\Magazine {#261
      +icon: null
      +name: "guix@lemmy.ml"
      +title: "guix"
      +description: "Guix is an advanced distribution of the GNU operating system developed by the GNU Project"
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 10
      +entryCommentCount: 8
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1727743868 {#269
        date: 2024-10-01 02:51:08.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#248 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#244 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#233 …}
      +entries: Doctrine\ORM\PersistentCollection {#191 …}
      +posts: Doctrine\ORM\PersistentCollection {#149 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#211 …}
      +bans: Doctrine\ORM\PersistentCollection {#128 …}
      +reports: Doctrine\ORM\PersistentCollection {#114 …}
      +badges: Doctrine\ORM\PersistentCollection {#92 …}
      +logs: Doctrine\ORM\PersistentCollection {#82 …}
      +awards: Doctrine\ORM\PersistentCollection {#71 …}
      +categories: Doctrine\ORM\PersistentCollection {#1830 …}
      -id: 118
      +apId: "guix@lemmy.ml"
      +apProfileId: "https://lemmy.ml/c/guix"
      +apPublicUrl: "https://lemmy.ml/c/guix"
      +apFollowersUrl: "https://lemmy.ml/c/guix/followers"
      +apInboxUrl: "https://lemmy.ml/inbox"
      +apDomain: "lemmy.ml"
      +apPreferredUsername: "guix"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703436704 {#267
        date: 2023-12-24 17:51:44.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703436703 {#275
        date: 2023-12-24 17:51:43.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1876 …}
    +slug: "How-to-luks-encrypt-raid-drive"
    +title: "How to luks encrypt raid drive?"
    +url: null
    +body: """
      Edit: Turns out for what I’m trying to do (mount luks encrypted raid after start up) only needs the device mapping for the raid drive and not a file-system object.\n
      \n
      So I luks encrypted the raid and call a script to open the vault and mount it when I need to.\n
      \n
      ---\n
      \n
      In my system config file I added a raid drive like so:\n
      \n
      ```\n
      \n
      <span style="color:#323232;">(mapped-devices (list (mapped-device\n
      </span><span style="color:#323232;">                                     (source (uuid\n
      </span><span style="color:#323232;">                                                  "205e5caa-694f-4457-a2a1-8affa3536e75"))\n
      </span><span style="color:#323232;">                                     (target "guix")\n
      </span><span style="color:#323232;">                                     (type luks-device-mapping))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">                                  (mapped-device\n
      </span><span style="color:#323232;">                                     (source (list "/dev/sdb1" "/dev/sdc1"))\n
      </span><span style="color:#323232;">                                     (target "/dev/md0")\n
      </span><span style="color:#323232;">                                     (type raid-device-mapping))))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">(file-systems (cons* (file-system\n
      </span><span style="color:#323232;">                                  (mount-point "/")\n
      </span><span style="color:#323232;">                                  (device "/dev/mapper/guix")\n
      </span><span style="color:#323232;">                                  (type "ext4")\n
      </span><span style="color:#323232;">                                  (dependencies (list (list-ref mapped-devices 0))))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">                               (file-system\n
      </span><span style="color:#323232;">                                  (mount-point "/mnt/nas")\n
      </span><span style="color:#323232;">                                  (device "/dev/md0")\n
      </span><span style="color:#323232;">                                  (type "ext4")\n
      </span><span style="color:#323232;">                                  (mount? #f)\n
      </span><span style="color:#323232;">                                  (dependencies (list (list-ref mapped-devices 1)))) %base-file-systems)))\n
      </span>\n
      ```\n
      \n
      I’d now like to luks encrypt the raid drive but I’m not sure how to go about doing it. Do I simply make a another mapped-device object, specifying the raid drive uuid and “/dev/md0” as the target:\n
      \n
      ```\n
      \n
      <span style="color:#323232;">(mapped-device\n
      </span><span style="color:#323232;">   (source (uuid\n
      </span><span style="color:#323232;">                {raid uuid}))\n
      </span><span style="color:#323232;">                (target "/dev/md0")\n
      </span><span style="color:#323232;">                (type luks-device-mapping))\n
      </span>\n
      ```\n
      \n
      and then pass that as a dependency to the raid file system object?\n
      \n
      Thanks
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 6
    +favouriteCount: 7
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1711060515 {#1815
      date: 2024-03-21 23:35:15.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1916 …}
    +votes: Doctrine\ORM\PersistentCollection {#1974 …}
    +reports: Doctrine\ORM\PersistentCollection {#1837 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1936 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2429 …}
    +badges: Doctrine\ORM\PersistentCollection {#2424 …}
    +children: []
    -id: 26622
    -titleTs: "'drive':6 'encrypt':4 'luk':3 'raid':5"
    -bodyTs: "'/dev/mapper/guix':116 '/dev/md0':99,136,191,203 '/dev/sdb1':96 '/dev/sdc1':97 '/mnt/nas':134 '0':127 '1':149 '205e5':76 '4457':80 '694f':79 '8affa3536e75':83 'a2a1':82 'a2a1-8affa3536e75':81 'ad':61 'anoth':180 'base':151 'base-file-system':150 'caa':78 'caa-694f':77 'call':41 'con':108 'config':58 'd':155 'depend':119,141,215 'devic':21,69,73,89,93,103,115,126,135,148,183,197,207 'drive':26,64,163,188 'edit':1 'encrypt':13,37,160 'ext4':118,138 'f':140 'file':31,59,106,110,129,152,219 'file-system':30,105,109,128 'go':171 'guix':85 'like':65,157 'list':70,95,120,122,142,144 'list-ref':121,143 'luk':12,36,88,159,206 'luks-device-map':87,205 'm':7,166 'make':178 'map':22,68,72,90,92,104,125,147,182,196,208 'mapped-devic':67,71,91,124,146,181,195 'mount':11,49,113,132,139 'mount-point':112,131 'need':19,53 'object':33,184,221 'open':45 'pass':211 'point':114,133 'raid':14,25,39,63,102,162,187,200,218 'raid-device-map':101 'ref':123,145 'script':43 'simpli':177 'sourc':74,94,198 'specifi':185 'start':16 'sure':168 'system':32,57,107,111,130,153,220 'target':84,98,194,202 'thank':222 'tri':8 'turn':2 'type':86,100,117,137,204 'uuid':75,189,199,201 'vault':47"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1704181768
    +visibility: "visible             "
    +apId: "https://reddthat.com/post/11036859"
    +editedAt: DateTimeImmutable @1712607909 {#1813
      date: 2024-04-08 22:25:09.0 +02:00
    }
    +createdAt: DateTimeImmutable @1704144268 {#1802
      date: 2024-01-01 22:24:28.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#261}
  +image: null
  +parent: App\Entity\EntryComment {#4032
    +user: App\Entity\User {#3980 …}
    +entry: App\Entity\Entry {#2396}
    +magazine: App\Entity\Magazine {#261}
    +image: null
    +parent: null
    +root: null
    +body: "You sure you want to use LUKS? It has a specific format that can be probed for almost like a known plain text."
    +lang: "en"
    +isAdult: false
    +favouriteCount: 1
    +score: 0
    +lastActive: DateTime @1711060515 {#4041
      date: 2024-03-21 23:35:15.0 +01:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@HulkSmashBurgers@reddthat.com"
    ]
    +children: Doctrine\ORM\PersistentCollection {#4030 …}
    +nested: Doctrine\ORM\PersistentCollection {#4028 …}
    +votes: Doctrine\ORM\PersistentCollection {#4026 …}
    +reports: Doctrine\ORM\PersistentCollection {#4024 …}
    +favourites: Doctrine\ORM\PersistentCollection {#3992 …}
    +notifications: Doctrine\ORM\PersistentCollection {#3996 …}
    -id: 271876
    -bodyTs: "'almost':18 'format':12 'known':21 'like':19 'luk':7 'plain':22 'probe':16 'specif':11 'sure':2 'text':23 'use':6 'want':4"
    +ranking: 0
    +commentCount: 0
    +upVotes: 0
    +downVotes: 0
    +visibility: "visible             "
    +apId: "https://sh.itjust.works/comment/6990747"
    +editedAt: null
    +createdAt: DateTimeImmutable @1704145891 {#3977
      date: 2024-01-01 22:51:31.0 +01:00
    }
  }
  +root: App\Entity\EntryComment {#4032}
  +body: "I’m not opposed to using something other than luks, it’s just what I’m familiar with. Is there some other better approach you could recommend?"
  +lang: "en"
  +isAdult: false
  +favouriteCount: 1
  +score: 0
  +lastActive: DateTime @1704158356 {#4055
    date: 2024-01-02 02:19:16.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@HulkSmashBurgers@reddthat.com"
    "@lurch@sh.itjust.works"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4060 …}
  +nested: Doctrine\ORM\PersistentCollection {#4059 …}
  +votes: Doctrine\ORM\PersistentCollection {#4068 …}
  +reports: Doctrine\ORM\PersistentCollection {#4049 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4047 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4045 …}
  -id: 272079
  -bodyTs: "'approach':24 'better':23 'could':26 'familiar':17 'luk':10 'm':2,16 'oppos':4 'recommend':27 'someth':7 'use':6"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://reddthat.com/comment/6004757"
  +editedAt: null
  +createdAt: DateTimeImmutable @1704158356 {#4052
    date: 2024-01-02 02:19:16.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
13 DENIED ROLE_USER
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
14 DENIED moderate
App\Entity\EntryComment {#4102
  +user: Proxies\__CG__\App\Entity\User {#4101 …}
  +entry: App\Entity\Entry {#2396
    +user: Proxies\__CG__\App\Entity\User {#1960 …}
    +magazine: App\Entity\Magazine {#261
      +icon: null
      +name: "guix@lemmy.ml"
      +title: "guix"
      +description: "Guix is an advanced distribution of the GNU operating system developed by the GNU Project"
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 10
      +entryCommentCount: 8
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1727743868 {#269
        date: 2024-10-01 02:51:08.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#248 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#244 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#233 …}
      +entries: Doctrine\ORM\PersistentCollection {#191 …}
      +posts: Doctrine\ORM\PersistentCollection {#149 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#211 …}
      +bans: Doctrine\ORM\PersistentCollection {#128 …}
      +reports: Doctrine\ORM\PersistentCollection {#114 …}
      +badges: Doctrine\ORM\PersistentCollection {#92 …}
      +logs: Doctrine\ORM\PersistentCollection {#82 …}
      +awards: Doctrine\ORM\PersistentCollection {#71 …}
      +categories: Doctrine\ORM\PersistentCollection {#1830 …}
      -id: 118
      +apId: "guix@lemmy.ml"
      +apProfileId: "https://lemmy.ml/c/guix"
      +apPublicUrl: "https://lemmy.ml/c/guix"
      +apFollowersUrl: "https://lemmy.ml/c/guix/followers"
      +apInboxUrl: "https://lemmy.ml/inbox"
      +apDomain: "lemmy.ml"
      +apPreferredUsername: "guix"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703436704 {#267
        date: 2023-12-24 17:51:44.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703436703 {#275
        date: 2023-12-24 17:51:43.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1876 …}
    +slug: "How-to-luks-encrypt-raid-drive"
    +title: "How to luks encrypt raid drive?"
    +url: null
    +body: """
      Edit: Turns out for what I’m trying to do (mount luks encrypted raid after start up) only needs the device mapping for the raid drive and not a file-system object.\n
      \n
      So I luks encrypted the raid and call a script to open the vault and mount it when I need to.\n
      \n
      ---\n
      \n
      In my system config file I added a raid drive like so:\n
      \n
      ```\n
      \n
      <span style="color:#323232;">(mapped-devices (list (mapped-device\n
      </span><span style="color:#323232;">                                     (source (uuid\n
      </span><span style="color:#323232;">                                                  "205e5caa-694f-4457-a2a1-8affa3536e75"))\n
      </span><span style="color:#323232;">                                     (target "guix")\n
      </span><span style="color:#323232;">                                     (type luks-device-mapping))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">                                  (mapped-device\n
      </span><span style="color:#323232;">                                     (source (list "/dev/sdb1" "/dev/sdc1"))\n
      </span><span style="color:#323232;">                                     (target "/dev/md0")\n
      </span><span style="color:#323232;">                                     (type raid-device-mapping))))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">(file-systems (cons* (file-system\n
      </span><span style="color:#323232;">                                  (mount-point "/")\n
      </span><span style="color:#323232;">                                  (device "/dev/mapper/guix")\n
      </span><span style="color:#323232;">                                  (type "ext4")\n
      </span><span style="color:#323232;">                                  (dependencies (list (list-ref mapped-devices 0))))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">                               (file-system\n
      </span><span style="color:#323232;">                                  (mount-point "/mnt/nas")\n
      </span><span style="color:#323232;">                                  (device "/dev/md0")\n
      </span><span style="color:#323232;">                                  (type "ext4")\n
      </span><span style="color:#323232;">                                  (mount? #f)\n
      </span><span style="color:#323232;">                                  (dependencies (list (list-ref mapped-devices 1)))) %base-file-systems)))\n
      </span>\n
      ```\n
      \n
      I’d now like to luks encrypt the raid drive but I’m not sure how to go about doing it. Do I simply make a another mapped-device object, specifying the raid drive uuid and “/dev/md0” as the target:\n
      \n
      ```\n
      \n
      <span style="color:#323232;">(mapped-device\n
      </span><span style="color:#323232;">   (source (uuid\n
      </span><span style="color:#323232;">                {raid uuid}))\n
      </span><span style="color:#323232;">                (target "/dev/md0")\n
      </span><span style="color:#323232;">                (type luks-device-mapping))\n
      </span>\n
      ```\n
      \n
      and then pass that as a dependency to the raid file system object?\n
      \n
      Thanks
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 6
    +favouriteCount: 7
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1711060515 {#1815
      date: 2024-03-21 23:35:15.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1916 …}
    +votes: Doctrine\ORM\PersistentCollection {#1974 …}
    +reports: Doctrine\ORM\PersistentCollection {#1837 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1936 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2429 …}
    +badges: Doctrine\ORM\PersistentCollection {#2424 …}
    +children: []
    -id: 26622
    -titleTs: "'drive':6 'encrypt':4 'luk':3 'raid':5"
    -bodyTs: "'/dev/mapper/guix':116 '/dev/md0':99,136,191,203 '/dev/sdb1':96 '/dev/sdc1':97 '/mnt/nas':134 '0':127 '1':149 '205e5':76 '4457':80 '694f':79 '8affa3536e75':83 'a2a1':82 'a2a1-8affa3536e75':81 'ad':61 'anoth':180 'base':151 'base-file-system':150 'caa':78 'caa-694f':77 'call':41 'con':108 'config':58 'd':155 'depend':119,141,215 'devic':21,69,73,89,93,103,115,126,135,148,183,197,207 'drive':26,64,163,188 'edit':1 'encrypt':13,37,160 'ext4':118,138 'f':140 'file':31,59,106,110,129,152,219 'file-system':30,105,109,128 'go':171 'guix':85 'like':65,157 'list':70,95,120,122,142,144 'list-ref':121,143 'luk':12,36,88,159,206 'luks-device-map':87,205 'm':7,166 'make':178 'map':22,68,72,90,92,104,125,147,182,196,208 'mapped-devic':67,71,91,124,146,181,195 'mount':11,49,113,132,139 'mount-point':112,131 'need':19,53 'object':33,184,221 'open':45 'pass':211 'point':114,133 'raid':14,25,39,63,102,162,187,200,218 'raid-device-map':101 'ref':123,145 'script':43 'simpli':177 'sourc':74,94,198 'specifi':185 'start':16 'sure':168 'system':32,57,107,111,130,153,220 'target':84,98,194,202 'thank':222 'tri':8 'turn':2 'type':86,100,117,137,204 'uuid':75,189,199,201 'vault':47"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1704181768
    +visibility: "visible             "
    +apId: "https://reddthat.com/post/11036859"
    +editedAt: DateTimeImmutable @1712607909 {#1813
      date: 2024-04-08 22:25:09.0 +02:00
    }
    +createdAt: DateTimeImmutable @1704144268 {#1802
      date: 2024-01-01 22:24:28.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#261}
  +image: null
  +parent: App\Entity\EntryComment {#4032
    +user: App\Entity\User {#3980 …}
    +entry: App\Entity\Entry {#2396}
    +magazine: App\Entity\Magazine {#261}
    +image: null
    +parent: null
    +root: null
    +body: "You sure you want to use LUKS? It has a specific format that can be probed for almost like a known plain text."
    +lang: "en"
    +isAdult: false
    +favouriteCount: 1
    +score: 0
    +lastActive: DateTime @1711060515 {#4041
      date: 2024-03-21 23:35:15.0 +01:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@HulkSmashBurgers@reddthat.com"
    ]
    +children: Doctrine\ORM\PersistentCollection {#4030 …}
    +nested: Doctrine\ORM\PersistentCollection {#4028 …}
    +votes: Doctrine\ORM\PersistentCollection {#4026 …}
    +reports: Doctrine\ORM\PersistentCollection {#4024 …}
    +favourites: Doctrine\ORM\PersistentCollection {#3992 …}
    +notifications: Doctrine\ORM\PersistentCollection {#3996 …}
    -id: 271876
    -bodyTs: "'almost':18 'format':12 'known':21 'like':19 'luk':7 'plain':22 'probe':16 'specif':11 'sure':2 'text':23 'use':6 'want':4"
    +ranking: 0
    +commentCount: 0
    +upVotes: 0
    +downVotes: 0
    +visibility: "visible             "
    +apId: "https://sh.itjust.works/comment/6990747"
    +editedAt: null
    +createdAt: DateTimeImmutable @1704145891 {#3977
      date: 2024-01-01 22:51:31.0 +01:00
    }
  }
  +root: App\Entity\EntryComment {#4032}
  +body: "[devicetests.com/secure-luks-encryption](https://devicetests.com/secure-luks-encryption) had to Google that, if you want to brute force your way into a modern like setup you either need a weak password or a very powerful computer and time/money… or do you mean something else?"
  +lang: "en"
  +isAdult: false
  +favouriteCount: 1
  +score: 0
  +lastActive: DateTime @1704183585 {#4043
    date: 2024-01-02 09:19:45.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@HulkSmashBurgers@reddthat.com"
    "@lurch@sh.itjust.works"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4103 …}
  +nested: Doctrine\ORM\PersistentCollection {#4105 …}
  +votes: Doctrine\ORM\PersistentCollection {#4107 …}
  +reports: Doctrine\ORM\PersistentCollection {#4109 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4111 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4113 …}
  -id: 272678
  -bodyTs: "'/secure-luks-encryption](https://devicetests.com/secure-luks-encryption)':3 'brute':12 'comput':31 'devicetests.com':2 'devicetests.com/secure-luks-encryption](https://devicetests.com/secure-luks-encryption)':1 'either':22 'els':39 'forc':13 'googl':6 'like':19 'mean':37 'modern':18 'need':23 'password':26 'power':30 'setup':20 'someth':38 'time/money':33 'want':10 'way':15 'weak':25"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.ml/comment/7006739"
  +editedAt: null
  +createdAt: DateTimeImmutable @1704183585 {#4042
    date: 2024-01-02 09:19:45.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
15 DENIED edit
App\Entity\EntryComment {#4102
  +user: Proxies\__CG__\App\Entity\User {#4101 …}
  +entry: App\Entity\Entry {#2396
    +user: Proxies\__CG__\App\Entity\User {#1960 …}
    +magazine: App\Entity\Magazine {#261
      +icon: null
      +name: "guix@lemmy.ml"
      +title: "guix"
      +description: "Guix is an advanced distribution of the GNU operating system developed by the GNU Project"
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 10
      +entryCommentCount: 8
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1727743868 {#269
        date: 2024-10-01 02:51:08.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#248 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#244 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#233 …}
      +entries: Doctrine\ORM\PersistentCollection {#191 …}
      +posts: Doctrine\ORM\PersistentCollection {#149 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#211 …}
      +bans: Doctrine\ORM\PersistentCollection {#128 …}
      +reports: Doctrine\ORM\PersistentCollection {#114 …}
      +badges: Doctrine\ORM\PersistentCollection {#92 …}
      +logs: Doctrine\ORM\PersistentCollection {#82 …}
      +awards: Doctrine\ORM\PersistentCollection {#71 …}
      +categories: Doctrine\ORM\PersistentCollection {#1830 …}
      -id: 118
      +apId: "guix@lemmy.ml"
      +apProfileId: "https://lemmy.ml/c/guix"
      +apPublicUrl: "https://lemmy.ml/c/guix"
      +apFollowersUrl: "https://lemmy.ml/c/guix/followers"
      +apInboxUrl: "https://lemmy.ml/inbox"
      +apDomain: "lemmy.ml"
      +apPreferredUsername: "guix"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703436704 {#267
        date: 2023-12-24 17:51:44.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703436703 {#275
        date: 2023-12-24 17:51:43.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1876 …}
    +slug: "How-to-luks-encrypt-raid-drive"
    +title: "How to luks encrypt raid drive?"
    +url: null
    +body: """
      Edit: Turns out for what I’m trying to do (mount luks encrypted raid after start up) only needs the device mapping for the raid drive and not a file-system object.\n
      \n
      So I luks encrypted the raid and call a script to open the vault and mount it when I need to.\n
      \n
      ---\n
      \n
      In my system config file I added a raid drive like so:\n
      \n
      ```\n
      \n
      <span style="color:#323232;">(mapped-devices (list (mapped-device\n
      </span><span style="color:#323232;">                                     (source (uuid\n
      </span><span style="color:#323232;">                                                  "205e5caa-694f-4457-a2a1-8affa3536e75"))\n
      </span><span style="color:#323232;">                                     (target "guix")\n
      </span><span style="color:#323232;">                                     (type luks-device-mapping))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">                                  (mapped-device\n
      </span><span style="color:#323232;">                                     (source (list "/dev/sdb1" "/dev/sdc1"))\n
      </span><span style="color:#323232;">                                     (target "/dev/md0")\n
      </span><span style="color:#323232;">                                     (type raid-device-mapping))))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">(file-systems (cons* (file-system\n
      </span><span style="color:#323232;">                                  (mount-point "/")\n
      </span><span style="color:#323232;">                                  (device "/dev/mapper/guix")\n
      </span><span style="color:#323232;">                                  (type "ext4")\n
      </span><span style="color:#323232;">                                  (dependencies (list (list-ref mapped-devices 0))))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">                               (file-system\n
      </span><span style="color:#323232;">                                  (mount-point "/mnt/nas")\n
      </span><span style="color:#323232;">                                  (device "/dev/md0")\n
      </span><span style="color:#323232;">                                  (type "ext4")\n
      </span><span style="color:#323232;">                                  (mount? #f)\n
      </span><span style="color:#323232;">                                  (dependencies (list (list-ref mapped-devices 1)))) %base-file-systems)))\n
      </span>\n
      ```\n
      \n
      I’d now like to luks encrypt the raid drive but I’m not sure how to go about doing it. Do I simply make a another mapped-device object, specifying the raid drive uuid and “/dev/md0” as the target:\n
      \n
      ```\n
      \n
      <span style="color:#323232;">(mapped-device\n
      </span><span style="color:#323232;">   (source (uuid\n
      </span><span style="color:#323232;">                {raid uuid}))\n
      </span><span style="color:#323232;">                (target "/dev/md0")\n
      </span><span style="color:#323232;">                (type luks-device-mapping))\n
      </span>\n
      ```\n
      \n
      and then pass that as a dependency to the raid file system object?\n
      \n
      Thanks
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 6
    +favouriteCount: 7
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1711060515 {#1815
      date: 2024-03-21 23:35:15.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1916 …}
    +votes: Doctrine\ORM\PersistentCollection {#1974 …}
    +reports: Doctrine\ORM\PersistentCollection {#1837 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1936 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2429 …}
    +badges: Doctrine\ORM\PersistentCollection {#2424 …}
    +children: []
    -id: 26622
    -titleTs: "'drive':6 'encrypt':4 'luk':3 'raid':5"
    -bodyTs: "'/dev/mapper/guix':116 '/dev/md0':99,136,191,203 '/dev/sdb1':96 '/dev/sdc1':97 '/mnt/nas':134 '0':127 '1':149 '205e5':76 '4457':80 '694f':79 '8affa3536e75':83 'a2a1':82 'a2a1-8affa3536e75':81 'ad':61 'anoth':180 'base':151 'base-file-system':150 'caa':78 'caa-694f':77 'call':41 'con':108 'config':58 'd':155 'depend':119,141,215 'devic':21,69,73,89,93,103,115,126,135,148,183,197,207 'drive':26,64,163,188 'edit':1 'encrypt':13,37,160 'ext4':118,138 'f':140 'file':31,59,106,110,129,152,219 'file-system':30,105,109,128 'go':171 'guix':85 'like':65,157 'list':70,95,120,122,142,144 'list-ref':121,143 'luk':12,36,88,159,206 'luks-device-map':87,205 'm':7,166 'make':178 'map':22,68,72,90,92,104,125,147,182,196,208 'mapped-devic':67,71,91,124,146,181,195 'mount':11,49,113,132,139 'mount-point':112,131 'need':19,53 'object':33,184,221 'open':45 'pass':211 'point':114,133 'raid':14,25,39,63,102,162,187,200,218 'raid-device-map':101 'ref':123,145 'script':43 'simpli':177 'sourc':74,94,198 'specifi':185 'start':16 'sure':168 'system':32,57,107,111,130,153,220 'target':84,98,194,202 'thank':222 'tri':8 'turn':2 'type':86,100,117,137,204 'uuid':75,189,199,201 'vault':47"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1704181768
    +visibility: "visible             "
    +apId: "https://reddthat.com/post/11036859"
    +editedAt: DateTimeImmutable @1712607909 {#1813
      date: 2024-04-08 22:25:09.0 +02:00
    }
    +createdAt: DateTimeImmutable @1704144268 {#1802
      date: 2024-01-01 22:24:28.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#261}
  +image: null
  +parent: App\Entity\EntryComment {#4032
    +user: App\Entity\User {#3980 …}
    +entry: App\Entity\Entry {#2396}
    +magazine: App\Entity\Magazine {#261}
    +image: null
    +parent: null
    +root: null
    +body: "You sure you want to use LUKS? It has a specific format that can be probed for almost like a known plain text."
    +lang: "en"
    +isAdult: false
    +favouriteCount: 1
    +score: 0
    +lastActive: DateTime @1711060515 {#4041
      date: 2024-03-21 23:35:15.0 +01:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@HulkSmashBurgers@reddthat.com"
    ]
    +children: Doctrine\ORM\PersistentCollection {#4030 …}
    +nested: Doctrine\ORM\PersistentCollection {#4028 …}
    +votes: Doctrine\ORM\PersistentCollection {#4026 …}
    +reports: Doctrine\ORM\PersistentCollection {#4024 …}
    +favourites: Doctrine\ORM\PersistentCollection {#3992 …}
    +notifications: Doctrine\ORM\PersistentCollection {#3996 …}
    -id: 271876
    -bodyTs: "'almost':18 'format':12 'known':21 'like':19 'luk':7 'plain':22 'probe':16 'specif':11 'sure':2 'text':23 'use':6 'want':4"
    +ranking: 0
    +commentCount: 0
    +upVotes: 0
    +downVotes: 0
    +visibility: "visible             "
    +apId: "https://sh.itjust.works/comment/6990747"
    +editedAt: null
    +createdAt: DateTimeImmutable @1704145891 {#3977
      date: 2024-01-01 22:51:31.0 +01:00
    }
  }
  +root: App\Entity\EntryComment {#4032}
  +body: "[devicetests.com/secure-luks-encryption](https://devicetests.com/secure-luks-encryption) had to Google that, if you want to brute force your way into a modern like setup you either need a weak password or a very powerful computer and time/money… or do you mean something else?"
  +lang: "en"
  +isAdult: false
  +favouriteCount: 1
  +score: 0
  +lastActive: DateTime @1704183585 {#4043
    date: 2024-01-02 09:19:45.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@HulkSmashBurgers@reddthat.com"
    "@lurch@sh.itjust.works"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4103 …}
  +nested: Doctrine\ORM\PersistentCollection {#4105 …}
  +votes: Doctrine\ORM\PersistentCollection {#4107 …}
  +reports: Doctrine\ORM\PersistentCollection {#4109 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4111 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4113 …}
  -id: 272678
  -bodyTs: "'/secure-luks-encryption](https://devicetests.com/secure-luks-encryption)':3 'brute':12 'comput':31 'devicetests.com':2 'devicetests.com/secure-luks-encryption](https://devicetests.com/secure-luks-encryption)':1 'either':22 'els':39 'forc':13 'googl':6 'like':19 'mean':37 'modern':18 'need':23 'password':26 'power':30 'setup':20 'someth':38 'time/money':33 'want':10 'way':15 'weak':25"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.ml/comment/7006739"
  +editedAt: null
  +createdAt: DateTimeImmutable @1704183585 {#4042
    date: 2024-01-02 09:19:45.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
16 DENIED moderate
App\Entity\EntryComment {#4102
  +user: Proxies\__CG__\App\Entity\User {#4101 …}
  +entry: App\Entity\Entry {#2396
    +user: Proxies\__CG__\App\Entity\User {#1960 …}
    +magazine: App\Entity\Magazine {#261
      +icon: null
      +name: "guix@lemmy.ml"
      +title: "guix"
      +description: "Guix is an advanced distribution of the GNU operating system developed by the GNU Project"
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 10
      +entryCommentCount: 8
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1727743868 {#269
        date: 2024-10-01 02:51:08.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#248 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#244 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#233 …}
      +entries: Doctrine\ORM\PersistentCollection {#191 …}
      +posts: Doctrine\ORM\PersistentCollection {#149 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#211 …}
      +bans: Doctrine\ORM\PersistentCollection {#128 …}
      +reports: Doctrine\ORM\PersistentCollection {#114 …}
      +badges: Doctrine\ORM\PersistentCollection {#92 …}
      +logs: Doctrine\ORM\PersistentCollection {#82 …}
      +awards: Doctrine\ORM\PersistentCollection {#71 …}
      +categories: Doctrine\ORM\PersistentCollection {#1830 …}
      -id: 118
      +apId: "guix@lemmy.ml"
      +apProfileId: "https://lemmy.ml/c/guix"
      +apPublicUrl: "https://lemmy.ml/c/guix"
      +apFollowersUrl: "https://lemmy.ml/c/guix/followers"
      +apInboxUrl: "https://lemmy.ml/inbox"
      +apDomain: "lemmy.ml"
      +apPreferredUsername: "guix"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703436704 {#267
        date: 2023-12-24 17:51:44.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703436703 {#275
        date: 2023-12-24 17:51:43.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1876 …}
    +slug: "How-to-luks-encrypt-raid-drive"
    +title: "How to luks encrypt raid drive?"
    +url: null
    +body: """
      Edit: Turns out for what I’m trying to do (mount luks encrypted raid after start up) only needs the device mapping for the raid drive and not a file-system object.\n
      \n
      So I luks encrypted the raid and call a script to open the vault and mount it when I need to.\n
      \n
      ---\n
      \n
      In my system config file I added a raid drive like so:\n
      \n
      ```\n
      \n
      <span style="color:#323232;">(mapped-devices (list (mapped-device\n
      </span><span style="color:#323232;">                                     (source (uuid\n
      </span><span style="color:#323232;">                                                  "205e5caa-694f-4457-a2a1-8affa3536e75"))\n
      </span><span style="color:#323232;">                                     (target "guix")\n
      </span><span style="color:#323232;">                                     (type luks-device-mapping))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">                                  (mapped-device\n
      </span><span style="color:#323232;">                                     (source (list "/dev/sdb1" "/dev/sdc1"))\n
      </span><span style="color:#323232;">                                     (target "/dev/md0")\n
      </span><span style="color:#323232;">                                     (type raid-device-mapping))))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">(file-systems (cons* (file-system\n
      </span><span style="color:#323232;">                                  (mount-point "/")\n
      </span><span style="color:#323232;">                                  (device "/dev/mapper/guix")\n
      </span><span style="color:#323232;">                                  (type "ext4")\n
      </span><span style="color:#323232;">                                  (dependencies (list (list-ref mapped-devices 0))))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">                               (file-system\n
      </span><span style="color:#323232;">                                  (mount-point "/mnt/nas")\n
      </span><span style="color:#323232;">                                  (device "/dev/md0")\n
      </span><span style="color:#323232;">                                  (type "ext4")\n
      </span><span style="color:#323232;">                                  (mount? #f)\n
      </span><span style="color:#323232;">                                  (dependencies (list (list-ref mapped-devices 1)))) %base-file-systems)))\n
      </span>\n
      ```\n
      \n
      I’d now like to luks encrypt the raid drive but I’m not sure how to go about doing it. Do I simply make a another mapped-device object, specifying the raid drive uuid and “/dev/md0” as the target:\n
      \n
      ```\n
      \n
      <span style="color:#323232;">(mapped-device\n
      </span><span style="color:#323232;">   (source (uuid\n
      </span><span style="color:#323232;">                {raid uuid}))\n
      </span><span style="color:#323232;">                (target "/dev/md0")\n
      </span><span style="color:#323232;">                (type luks-device-mapping))\n
      </span>\n
      ```\n
      \n
      and then pass that as a dependency to the raid file system object?\n
      \n
      Thanks
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 6
    +favouriteCount: 7
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1711060515 {#1815
      date: 2024-03-21 23:35:15.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1916 …}
    +votes: Doctrine\ORM\PersistentCollection {#1974 …}
    +reports: Doctrine\ORM\PersistentCollection {#1837 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1936 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2429 …}
    +badges: Doctrine\ORM\PersistentCollection {#2424 …}
    +children: []
    -id: 26622
    -titleTs: "'drive':6 'encrypt':4 'luk':3 'raid':5"
    -bodyTs: "'/dev/mapper/guix':116 '/dev/md0':99,136,191,203 '/dev/sdb1':96 '/dev/sdc1':97 '/mnt/nas':134 '0':127 '1':149 '205e5':76 '4457':80 '694f':79 '8affa3536e75':83 'a2a1':82 'a2a1-8affa3536e75':81 'ad':61 'anoth':180 'base':151 'base-file-system':150 'caa':78 'caa-694f':77 'call':41 'con':108 'config':58 'd':155 'depend':119,141,215 'devic':21,69,73,89,93,103,115,126,135,148,183,197,207 'drive':26,64,163,188 'edit':1 'encrypt':13,37,160 'ext4':118,138 'f':140 'file':31,59,106,110,129,152,219 'file-system':30,105,109,128 'go':171 'guix':85 'like':65,157 'list':70,95,120,122,142,144 'list-ref':121,143 'luk':12,36,88,159,206 'luks-device-map':87,205 'm':7,166 'make':178 'map':22,68,72,90,92,104,125,147,182,196,208 'mapped-devic':67,71,91,124,146,181,195 'mount':11,49,113,132,139 'mount-point':112,131 'need':19,53 'object':33,184,221 'open':45 'pass':211 'point':114,133 'raid':14,25,39,63,102,162,187,200,218 'raid-device-map':101 'ref':123,145 'script':43 'simpli':177 'sourc':74,94,198 'specifi':185 'start':16 'sure':168 'system':32,57,107,111,130,153,220 'target':84,98,194,202 'thank':222 'tri':8 'turn':2 'type':86,100,117,137,204 'uuid':75,189,199,201 'vault':47"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1704181768
    +visibility: "visible             "
    +apId: "https://reddthat.com/post/11036859"
    +editedAt: DateTimeImmutable @1712607909 {#1813
      date: 2024-04-08 22:25:09.0 +02:00
    }
    +createdAt: DateTimeImmutable @1704144268 {#1802
      date: 2024-01-01 22:24:28.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#261}
  +image: null
  +parent: App\Entity\EntryComment {#4032
    +user: App\Entity\User {#3980 …}
    +entry: App\Entity\Entry {#2396}
    +magazine: App\Entity\Magazine {#261}
    +image: null
    +parent: null
    +root: null
    +body: "You sure you want to use LUKS? It has a specific format that can be probed for almost like a known plain text."
    +lang: "en"
    +isAdult: false
    +favouriteCount: 1
    +score: 0
    +lastActive: DateTime @1711060515 {#4041
      date: 2024-03-21 23:35:15.0 +01:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@HulkSmashBurgers@reddthat.com"
    ]
    +children: Doctrine\ORM\PersistentCollection {#4030 …}
    +nested: Doctrine\ORM\PersistentCollection {#4028 …}
    +votes: Doctrine\ORM\PersistentCollection {#4026 …}
    +reports: Doctrine\ORM\PersistentCollection {#4024 …}
    +favourites: Doctrine\ORM\PersistentCollection {#3992 …}
    +notifications: Doctrine\ORM\PersistentCollection {#3996 …}
    -id: 271876
    -bodyTs: "'almost':18 'format':12 'known':21 'like':19 'luk':7 'plain':22 'probe':16 'specif':11 'sure':2 'text':23 'use':6 'want':4"
    +ranking: 0
    +commentCount: 0
    +upVotes: 0
    +downVotes: 0
    +visibility: "visible             "
    +apId: "https://sh.itjust.works/comment/6990747"
    +editedAt: null
    +createdAt: DateTimeImmutable @1704145891 {#3977
      date: 2024-01-01 22:51:31.0 +01:00
    }
  }
  +root: App\Entity\EntryComment {#4032}
  +body: "[devicetests.com/secure-luks-encryption](https://devicetests.com/secure-luks-encryption) had to Google that, if you want to brute force your way into a modern like setup you either need a weak password or a very powerful computer and time/money… or do you mean something else?"
  +lang: "en"
  +isAdult: false
  +favouriteCount: 1
  +score: 0
  +lastActive: DateTime @1704183585 {#4043
    date: 2024-01-02 09:19:45.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@HulkSmashBurgers@reddthat.com"
    "@lurch@sh.itjust.works"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4103 …}
  +nested: Doctrine\ORM\PersistentCollection {#4105 …}
  +votes: Doctrine\ORM\PersistentCollection {#4107 …}
  +reports: Doctrine\ORM\PersistentCollection {#4109 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4111 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4113 …}
  -id: 272678
  -bodyTs: "'/secure-luks-encryption](https://devicetests.com/secure-luks-encryption)':3 'brute':12 'comput':31 'devicetests.com':2 'devicetests.com/secure-luks-encryption](https://devicetests.com/secure-luks-encryption)':1 'either':22 'els':39 'forc':13 'googl':6 'like':19 'mean':37 'modern':18 'need':23 'password':26 'power':30 'setup':20 'someth':38 'time/money':33 'want':10 'way':15 'weak':25"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.ml/comment/7006739"
  +editedAt: null
  +createdAt: DateTimeImmutable @1704183585 {#4042
    date: 2024-01-02 09:19:45.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
17 DENIED ROLE_USER
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
18 DENIED moderate
App\Entity\EntryComment {#4124
  +user: App\Entity\User {#3980 …}
  +entry: App\Entity\Entry {#2396
    +user: Proxies\__CG__\App\Entity\User {#1960 …}
    +magazine: App\Entity\Magazine {#261
      +icon: null
      +name: "guix@lemmy.ml"
      +title: "guix"
      +description: "Guix is an advanced distribution of the GNU operating system developed by the GNU Project"
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 10
      +entryCommentCount: 8
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1727743868 {#269
        date: 2024-10-01 02:51:08.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#248 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#244 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#233 …}
      +entries: Doctrine\ORM\PersistentCollection {#191 …}
      +posts: Doctrine\ORM\PersistentCollection {#149 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#211 …}
      +bans: Doctrine\ORM\PersistentCollection {#128 …}
      +reports: Doctrine\ORM\PersistentCollection {#114 …}
      +badges: Doctrine\ORM\PersistentCollection {#92 …}
      +logs: Doctrine\ORM\PersistentCollection {#82 …}
      +awards: Doctrine\ORM\PersistentCollection {#71 …}
      +categories: Doctrine\ORM\PersistentCollection {#1830 …}
      -id: 118
      +apId: "guix@lemmy.ml"
      +apProfileId: "https://lemmy.ml/c/guix"
      +apPublicUrl: "https://lemmy.ml/c/guix"
      +apFollowersUrl: "https://lemmy.ml/c/guix/followers"
      +apInboxUrl: "https://lemmy.ml/inbox"
      +apDomain: "lemmy.ml"
      +apPreferredUsername: "guix"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703436704 {#267
        date: 2023-12-24 17:51:44.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703436703 {#275
        date: 2023-12-24 17:51:43.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1876 …}
    +slug: "How-to-luks-encrypt-raid-drive"
    +title: "How to luks encrypt raid drive?"
    +url: null
    +body: """
      Edit: Turns out for what I’m trying to do (mount luks encrypted raid after start up) only needs the device mapping for the raid drive and not a file-system object.\n
      \n
      So I luks encrypted the raid and call a script to open the vault and mount it when I need to.\n
      \n
      ---\n
      \n
      In my system config file I added a raid drive like so:\n
      \n
      ```\n
      \n
      <span style="color:#323232;">(mapped-devices (list (mapped-device\n
      </span><span style="color:#323232;">                                     (source (uuid\n
      </span><span style="color:#323232;">                                                  "205e5caa-694f-4457-a2a1-8affa3536e75"))\n
      </span><span style="color:#323232;">                                     (target "guix")\n
      </span><span style="color:#323232;">                                     (type luks-device-mapping))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">                                  (mapped-device\n
      </span><span style="color:#323232;">                                     (source (list "/dev/sdb1" "/dev/sdc1"))\n
      </span><span style="color:#323232;">                                     (target "/dev/md0")\n
      </span><span style="color:#323232;">                                     (type raid-device-mapping))))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">(file-systems (cons* (file-system\n
      </span><span style="color:#323232;">                                  (mount-point "/")\n
      </span><span style="color:#323232;">                                  (device "/dev/mapper/guix")\n
      </span><span style="color:#323232;">                                  (type "ext4")\n
      </span><span style="color:#323232;">                                  (dependencies (list (list-ref mapped-devices 0))))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">                               (file-system\n
      </span><span style="color:#323232;">                                  (mount-point "/mnt/nas")\n
      </span><span style="color:#323232;">                                  (device "/dev/md0")\n
      </span><span style="color:#323232;">                                  (type "ext4")\n
      </span><span style="color:#323232;">                                  (mount? #f)\n
      </span><span style="color:#323232;">                                  (dependencies (list (list-ref mapped-devices 1)))) %base-file-systems)))\n
      </span>\n
      ```\n
      \n
      I’d now like to luks encrypt the raid drive but I’m not sure how to go about doing it. Do I simply make a another mapped-device object, specifying the raid drive uuid and “/dev/md0” as the target:\n
      \n
      ```\n
      \n
      <span style="color:#323232;">(mapped-device\n
      </span><span style="color:#323232;">   (source (uuid\n
      </span><span style="color:#323232;">                {raid uuid}))\n
      </span><span style="color:#323232;">                (target "/dev/md0")\n
      </span><span style="color:#323232;">                (type luks-device-mapping))\n
      </span>\n
      ```\n
      \n
      and then pass that as a dependency to the raid file system object?\n
      \n
      Thanks
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 6
    +favouriteCount: 7
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1711060515 {#1815
      date: 2024-03-21 23:35:15.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1916 …}
    +votes: Doctrine\ORM\PersistentCollection {#1974 …}
    +reports: Doctrine\ORM\PersistentCollection {#1837 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1936 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2429 …}
    +badges: Doctrine\ORM\PersistentCollection {#2424 …}
    +children: []
    -id: 26622
    -titleTs: "'drive':6 'encrypt':4 'luk':3 'raid':5"
    -bodyTs: "'/dev/mapper/guix':116 '/dev/md0':99,136,191,203 '/dev/sdb1':96 '/dev/sdc1':97 '/mnt/nas':134 '0':127 '1':149 '205e5':76 '4457':80 '694f':79 '8affa3536e75':83 'a2a1':82 'a2a1-8affa3536e75':81 'ad':61 'anoth':180 'base':151 'base-file-system':150 'caa':78 'caa-694f':77 'call':41 'con':108 'config':58 'd':155 'depend':119,141,215 'devic':21,69,73,89,93,103,115,126,135,148,183,197,207 'drive':26,64,163,188 'edit':1 'encrypt':13,37,160 'ext4':118,138 'f':140 'file':31,59,106,110,129,152,219 'file-system':30,105,109,128 'go':171 'guix':85 'like':65,157 'list':70,95,120,122,142,144 'list-ref':121,143 'luk':12,36,88,159,206 'luks-device-map':87,205 'm':7,166 'make':178 'map':22,68,72,90,92,104,125,147,182,196,208 'mapped-devic':67,71,91,124,146,181,195 'mount':11,49,113,132,139 'mount-point':112,131 'need':19,53 'object':33,184,221 'open':45 'pass':211 'point':114,133 'raid':14,25,39,63,102,162,187,200,218 'raid-device-map':101 'ref':123,145 'script':43 'simpli':177 'sourc':74,94,198 'specifi':185 'start':16 'sure':168 'system':32,57,107,111,130,153,220 'target':84,98,194,202 'thank':222 'tri':8 'turn':2 'type':86,100,117,137,204 'uuid':75,189,199,201 'vault':47"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1704181768
    +visibility: "visible             "
    +apId: "https://reddthat.com/post/11036859"
    +editedAt: DateTimeImmutable @1712607909 {#1813
      date: 2024-04-08 22:25:09.0 +02:00
    }
    +createdAt: DateTimeImmutable @1704144268 {#1802
      date: 2024-01-01 22:24:28.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#261}
  +image: null
  +parent: App\Entity\EntryComment {#4102
    +user: Proxies\__CG__\App\Entity\User {#4101 …}
    +entry: App\Entity\Entry {#2396}
    +magazine: App\Entity\Magazine {#261}
    +image: null
    +parent: App\Entity\EntryComment {#4032
      +user: App\Entity\User {#3980 …}
      +entry: App\Entity\Entry {#2396}
      +magazine: App\Entity\Magazine {#261}
      +image: null
      +parent: null
      +root: null
      +body: "You sure you want to use LUKS? It has a specific format that can be probed for almost like a known plain text."
      +lang: "en"
      +isAdult: false
      +favouriteCount: 1
      +score: 0
      +lastActive: DateTime @1711060515 {#4041
        date: 2024-03-21 23:35:15.0 +01:00
      }
      +ip: null
      +tags: null
      +mentions: [
        "@HulkSmashBurgers@reddthat.com"
      ]
      +children: Doctrine\ORM\PersistentCollection {#4030 …}
      +nested: Doctrine\ORM\PersistentCollection {#4028 …}
      +votes: Doctrine\ORM\PersistentCollection {#4026 …}
      +reports: Doctrine\ORM\PersistentCollection {#4024 …}
      +favourites: Doctrine\ORM\PersistentCollection {#3992 …}
      +notifications: Doctrine\ORM\PersistentCollection {#3996 …}
      -id: 271876
      -bodyTs: "'almost':18 'format':12 'known':21 'like':19 'luk':7 'plain':22 'probe':16 'specif':11 'sure':2 'text':23 'use':6 'want':4"
      +ranking: 0
      +commentCount: 0
      +upVotes: 0
      +downVotes: 0
      +visibility: "visible             "
      +apId: "https://sh.itjust.works/comment/6990747"
      +editedAt: null
      +createdAt: DateTimeImmutable @1704145891 {#3977
        date: 2024-01-01 22:51:31.0 +01:00
      }
    }
    +root: App\Entity\EntryComment {#4032}
    +body: "[devicetests.com/secure-luks-encryption](https://devicetests.com/secure-luks-encryption) had to Google that, if you want to brute force your way into a modern like setup you either need a weak password or a very powerful computer and time/money… or do you mean something else?"
    +lang: "en"
    +isAdult: false
    +favouriteCount: 1
    +score: 0
    +lastActive: DateTime @1704183585 {#4043
      date: 2024-01-02 09:19:45.0 +01:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@HulkSmashBurgers@reddthat.com"
      "@lurch@sh.itjust.works"
    ]
    +children: Doctrine\ORM\PersistentCollection {#4103 …}
    +nested: Doctrine\ORM\PersistentCollection {#4105 …}
    +votes: Doctrine\ORM\PersistentCollection {#4107 …}
    +reports: Doctrine\ORM\PersistentCollection {#4109 …}
    +favourites: Doctrine\ORM\PersistentCollection {#4111 …}
    +notifications: Doctrine\ORM\PersistentCollection {#4113 …}
    -id: 272678
    -bodyTs: "'/secure-luks-encryption](https://devicetests.com/secure-luks-encryption)':3 'brute':12 'comput':31 'devicetests.com':2 'devicetests.com/secure-luks-encryption](https://devicetests.com/secure-luks-encryption)':1 'either':22 'els':39 'forc':13 'googl':6 'like':19 'mean':37 'modern':18 'need':23 'password':26 'power':30 'setup':20 'someth':38 'time/money':33 'want':10 'way':15 'weak':25"
    +ranking: 0
    +commentCount: 0
    +upVotes: 0
    +downVotes: 0
    +visibility: "visible             "
    +apId: "https://lemmy.ml/comment/7006739"
    +editedAt: null
    +createdAt: DateTimeImmutable @1704183585 {#4042
      date: 2024-01-02 09:19:45.0 +01:00
    }
  }
  +root: App\Entity\EntryComment {#4032}
  +body: """
    I mean that any attack gets more easy when you know, after it’s decrypted there are the bytes A, B and C at the locations X, Y and Z. It helps with brute force as well as hybrid attacks to find the master key.\n
    \n
    LUKS does exactly have those specific Bytes at specific locations PLUS it has a marker that basically says “I am in this format and encrypted with this algorythm”.
    """
  +lang: "en"
  +isAdult: false
  +favouriteCount: 0
  +score: 0
  +lastActive: DateTime @1704205462 {#4121
    date: 2024-01-02 15:24:22.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@HulkSmashBurgers@reddthat.com"
    "@lurch@sh.itjust.works"
    "@LoveSausage@lemmy.ml"
    "@HulkSmashBurgers@reddthat.com"
    "@lurch@sh.itjust.works"
    "@LoveSausage@lemmy.ml"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4127 …}
  +nested: Doctrine\ORM\PersistentCollection {#4129 …}
  +votes: Doctrine\ORM\PersistentCollection {#4125 …}
  +reports: Doctrine\ORM\PersistentCollection {#4132 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4134 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4136 …}
  -id: 273514
  -bodyTs: "'algorythm':73 'attack':5,40 'b':21 'basic':62 'brute':34 'byte':19,52 'c':23 'decrypt':15 'easi':8 'encrypt':70 'exact':48 'find':42 'forc':35 'format':68 'get':6 'help':32 'hybrid':39 'key':45 'know':11 'locat':26,55 'luk':46 'marker':60 'master':44 'mean':2 'plus':56 'say':63 'specif':51,54 'well':37 'x':27 'y':28 'z':30"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://sh.itjust.works/comment/7005338"
  +editedAt: DateTimeImmutable @1710914600 {#4118
    date: 2024-03-20 07:03:20.0 +01:00
  }
  +createdAt: DateTimeImmutable @1704205462 {#4116
    date: 2024-01-02 15:24:22.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
19 DENIED edit
App\Entity\EntryComment {#4124
  +user: App\Entity\User {#3980 …}
  +entry: App\Entity\Entry {#2396
    +user: Proxies\__CG__\App\Entity\User {#1960 …}
    +magazine: App\Entity\Magazine {#261
      +icon: null
      +name: "guix@lemmy.ml"
      +title: "guix"
      +description: "Guix is an advanced distribution of the GNU operating system developed by the GNU Project"
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 10
      +entryCommentCount: 8
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1727743868 {#269
        date: 2024-10-01 02:51:08.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#248 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#244 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#233 …}
      +entries: Doctrine\ORM\PersistentCollection {#191 …}
      +posts: Doctrine\ORM\PersistentCollection {#149 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#211 …}
      +bans: Doctrine\ORM\PersistentCollection {#128 …}
      +reports: Doctrine\ORM\PersistentCollection {#114 …}
      +badges: Doctrine\ORM\PersistentCollection {#92 …}
      +logs: Doctrine\ORM\PersistentCollection {#82 …}
      +awards: Doctrine\ORM\PersistentCollection {#71 …}
      +categories: Doctrine\ORM\PersistentCollection {#1830 …}
      -id: 118
      +apId: "guix@lemmy.ml"
      +apProfileId: "https://lemmy.ml/c/guix"
      +apPublicUrl: "https://lemmy.ml/c/guix"
      +apFollowersUrl: "https://lemmy.ml/c/guix/followers"
      +apInboxUrl: "https://lemmy.ml/inbox"
      +apDomain: "lemmy.ml"
      +apPreferredUsername: "guix"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703436704 {#267
        date: 2023-12-24 17:51:44.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703436703 {#275
        date: 2023-12-24 17:51:43.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1876 …}
    +slug: "How-to-luks-encrypt-raid-drive"
    +title: "How to luks encrypt raid drive?"
    +url: null
    +body: """
      Edit: Turns out for what I’m trying to do (mount luks encrypted raid after start up) only needs the device mapping for the raid drive and not a file-system object.\n
      \n
      So I luks encrypted the raid and call a script to open the vault and mount it when I need to.\n
      \n
      ---\n
      \n
      In my system config file I added a raid drive like so:\n
      \n
      ```\n
      \n
      <span style="color:#323232;">(mapped-devices (list (mapped-device\n
      </span><span style="color:#323232;">                                     (source (uuid\n
      </span><span style="color:#323232;">                                                  "205e5caa-694f-4457-a2a1-8affa3536e75"))\n
      </span><span style="color:#323232;">                                     (target "guix")\n
      </span><span style="color:#323232;">                                     (type luks-device-mapping))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">                                  (mapped-device\n
      </span><span style="color:#323232;">                                     (source (list "/dev/sdb1" "/dev/sdc1"))\n
      </span><span style="color:#323232;">                                     (target "/dev/md0")\n
      </span><span style="color:#323232;">                                     (type raid-device-mapping))))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">(file-systems (cons* (file-system\n
      </span><span style="color:#323232;">                                  (mount-point "/")\n
      </span><span style="color:#323232;">                                  (device "/dev/mapper/guix")\n
      </span><span style="color:#323232;">                                  (type "ext4")\n
      </span><span style="color:#323232;">                                  (dependencies (list (list-ref mapped-devices 0))))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">                               (file-system\n
      </span><span style="color:#323232;">                                  (mount-point "/mnt/nas")\n
      </span><span style="color:#323232;">                                  (device "/dev/md0")\n
      </span><span style="color:#323232;">                                  (type "ext4")\n
      </span><span style="color:#323232;">                                  (mount? #f)\n
      </span><span style="color:#323232;">                                  (dependencies (list (list-ref mapped-devices 1)))) %base-file-systems)))\n
      </span>\n
      ```\n
      \n
      I’d now like to luks encrypt the raid drive but I’m not sure how to go about doing it. Do I simply make a another mapped-device object, specifying the raid drive uuid and “/dev/md0” as the target:\n
      \n
      ```\n
      \n
      <span style="color:#323232;">(mapped-device\n
      </span><span style="color:#323232;">   (source (uuid\n
      </span><span style="color:#323232;">                {raid uuid}))\n
      </span><span style="color:#323232;">                (target "/dev/md0")\n
      </span><span style="color:#323232;">                (type luks-device-mapping))\n
      </span>\n
      ```\n
      \n
      and then pass that as a dependency to the raid file system object?\n
      \n
      Thanks
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 6
    +favouriteCount: 7
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1711060515 {#1815
      date: 2024-03-21 23:35:15.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1916 …}
    +votes: Doctrine\ORM\PersistentCollection {#1974 …}
    +reports: Doctrine\ORM\PersistentCollection {#1837 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1936 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2429 …}
    +badges: Doctrine\ORM\PersistentCollection {#2424 …}
    +children: []
    -id: 26622
    -titleTs: "'drive':6 'encrypt':4 'luk':3 'raid':5"
    -bodyTs: "'/dev/mapper/guix':116 '/dev/md0':99,136,191,203 '/dev/sdb1':96 '/dev/sdc1':97 '/mnt/nas':134 '0':127 '1':149 '205e5':76 '4457':80 '694f':79 '8affa3536e75':83 'a2a1':82 'a2a1-8affa3536e75':81 'ad':61 'anoth':180 'base':151 'base-file-system':150 'caa':78 'caa-694f':77 'call':41 'con':108 'config':58 'd':155 'depend':119,141,215 'devic':21,69,73,89,93,103,115,126,135,148,183,197,207 'drive':26,64,163,188 'edit':1 'encrypt':13,37,160 'ext4':118,138 'f':140 'file':31,59,106,110,129,152,219 'file-system':30,105,109,128 'go':171 'guix':85 'like':65,157 'list':70,95,120,122,142,144 'list-ref':121,143 'luk':12,36,88,159,206 'luks-device-map':87,205 'm':7,166 'make':178 'map':22,68,72,90,92,104,125,147,182,196,208 'mapped-devic':67,71,91,124,146,181,195 'mount':11,49,113,132,139 'mount-point':112,131 'need':19,53 'object':33,184,221 'open':45 'pass':211 'point':114,133 'raid':14,25,39,63,102,162,187,200,218 'raid-device-map':101 'ref':123,145 'script':43 'simpli':177 'sourc':74,94,198 'specifi':185 'start':16 'sure':168 'system':32,57,107,111,130,153,220 'target':84,98,194,202 'thank':222 'tri':8 'turn':2 'type':86,100,117,137,204 'uuid':75,189,199,201 'vault':47"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1704181768
    +visibility: "visible             "
    +apId: "https://reddthat.com/post/11036859"
    +editedAt: DateTimeImmutable @1712607909 {#1813
      date: 2024-04-08 22:25:09.0 +02:00
    }
    +createdAt: DateTimeImmutable @1704144268 {#1802
      date: 2024-01-01 22:24:28.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#261}
  +image: null
  +parent: App\Entity\EntryComment {#4102
    +user: Proxies\__CG__\App\Entity\User {#4101 …}
    +entry: App\Entity\Entry {#2396}
    +magazine: App\Entity\Magazine {#261}
    +image: null
    +parent: App\Entity\EntryComment {#4032
      +user: App\Entity\User {#3980 …}
      +entry: App\Entity\Entry {#2396}
      +magazine: App\Entity\Magazine {#261}
      +image: null
      +parent: null
      +root: null
      +body: "You sure you want to use LUKS? It has a specific format that can be probed for almost like a known plain text."
      +lang: "en"
      +isAdult: false
      +favouriteCount: 1
      +score: 0
      +lastActive: DateTime @1711060515 {#4041
        date: 2024-03-21 23:35:15.0 +01:00
      }
      +ip: null
      +tags: null
      +mentions: [
        "@HulkSmashBurgers@reddthat.com"
      ]
      +children: Doctrine\ORM\PersistentCollection {#4030 …}
      +nested: Doctrine\ORM\PersistentCollection {#4028 …}
      +votes: Doctrine\ORM\PersistentCollection {#4026 …}
      +reports: Doctrine\ORM\PersistentCollection {#4024 …}
      +favourites: Doctrine\ORM\PersistentCollection {#3992 …}
      +notifications: Doctrine\ORM\PersistentCollection {#3996 …}
      -id: 271876
      -bodyTs: "'almost':18 'format':12 'known':21 'like':19 'luk':7 'plain':22 'probe':16 'specif':11 'sure':2 'text':23 'use':6 'want':4"
      +ranking: 0
      +commentCount: 0
      +upVotes: 0
      +downVotes: 0
      +visibility: "visible             "
      +apId: "https://sh.itjust.works/comment/6990747"
      +editedAt: null
      +createdAt: DateTimeImmutable @1704145891 {#3977
        date: 2024-01-01 22:51:31.0 +01:00
      }
    }
    +root: App\Entity\EntryComment {#4032}
    +body: "[devicetests.com/secure-luks-encryption](https://devicetests.com/secure-luks-encryption) had to Google that, if you want to brute force your way into a modern like setup you either need a weak password or a very powerful computer and time/money… or do you mean something else?"
    +lang: "en"
    +isAdult: false
    +favouriteCount: 1
    +score: 0
    +lastActive: DateTime @1704183585 {#4043
      date: 2024-01-02 09:19:45.0 +01:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@HulkSmashBurgers@reddthat.com"
      "@lurch@sh.itjust.works"
    ]
    +children: Doctrine\ORM\PersistentCollection {#4103 …}
    +nested: Doctrine\ORM\PersistentCollection {#4105 …}
    +votes: Doctrine\ORM\PersistentCollection {#4107 …}
    +reports: Doctrine\ORM\PersistentCollection {#4109 …}
    +favourites: Doctrine\ORM\PersistentCollection {#4111 …}
    +notifications: Doctrine\ORM\PersistentCollection {#4113 …}
    -id: 272678
    -bodyTs: "'/secure-luks-encryption](https://devicetests.com/secure-luks-encryption)':3 'brute':12 'comput':31 'devicetests.com':2 'devicetests.com/secure-luks-encryption](https://devicetests.com/secure-luks-encryption)':1 'either':22 'els':39 'forc':13 'googl':6 'like':19 'mean':37 'modern':18 'need':23 'password':26 'power':30 'setup':20 'someth':38 'time/money':33 'want':10 'way':15 'weak':25"
    +ranking: 0
    +commentCount: 0
    +upVotes: 0
    +downVotes: 0
    +visibility: "visible             "
    +apId: "https://lemmy.ml/comment/7006739"
    +editedAt: null
    +createdAt: DateTimeImmutable @1704183585 {#4042
      date: 2024-01-02 09:19:45.0 +01:00
    }
  }
  +root: App\Entity\EntryComment {#4032}
  +body: """
    I mean that any attack gets more easy when you know, after it’s decrypted there are the bytes A, B and C at the locations X, Y and Z. It helps with brute force as well as hybrid attacks to find the master key.\n
    \n
    LUKS does exactly have those specific Bytes at specific locations PLUS it has a marker that basically says “I am in this format and encrypted with this algorythm”.
    """
  +lang: "en"
  +isAdult: false
  +favouriteCount: 0
  +score: 0
  +lastActive: DateTime @1704205462 {#4121
    date: 2024-01-02 15:24:22.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@HulkSmashBurgers@reddthat.com"
    "@lurch@sh.itjust.works"
    "@LoveSausage@lemmy.ml"
    "@HulkSmashBurgers@reddthat.com"
    "@lurch@sh.itjust.works"
    "@LoveSausage@lemmy.ml"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4127 …}
  +nested: Doctrine\ORM\PersistentCollection {#4129 …}
  +votes: Doctrine\ORM\PersistentCollection {#4125 …}
  +reports: Doctrine\ORM\PersistentCollection {#4132 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4134 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4136 …}
  -id: 273514
  -bodyTs: "'algorythm':73 'attack':5,40 'b':21 'basic':62 'brute':34 'byte':19,52 'c':23 'decrypt':15 'easi':8 'encrypt':70 'exact':48 'find':42 'forc':35 'format':68 'get':6 'help':32 'hybrid':39 'key':45 'know':11 'locat':26,55 'luk':46 'marker':60 'master':44 'mean':2 'plus':56 'say':63 'specif':51,54 'well':37 'x':27 'y':28 'z':30"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://sh.itjust.works/comment/7005338"
  +editedAt: DateTimeImmutable @1710914600 {#4118
    date: 2024-03-20 07:03:20.0 +01:00
  }
  +createdAt: DateTimeImmutable @1704205462 {#4116
    date: 2024-01-02 15:24:22.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
20 DENIED moderate
App\Entity\EntryComment {#4124
  +user: App\Entity\User {#3980 …}
  +entry: App\Entity\Entry {#2396
    +user: Proxies\__CG__\App\Entity\User {#1960 …}
    +magazine: App\Entity\Magazine {#261
      +icon: null
      +name: "guix@lemmy.ml"
      +title: "guix"
      +description: "Guix is an advanced distribution of the GNU operating system developed by the GNU Project"
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 10
      +entryCommentCount: 8
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1727743868 {#269
        date: 2024-10-01 02:51:08.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#248 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#244 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#233 …}
      +entries: Doctrine\ORM\PersistentCollection {#191 …}
      +posts: Doctrine\ORM\PersistentCollection {#149 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#211 …}
      +bans: Doctrine\ORM\PersistentCollection {#128 …}
      +reports: Doctrine\ORM\PersistentCollection {#114 …}
      +badges: Doctrine\ORM\PersistentCollection {#92 …}
      +logs: Doctrine\ORM\PersistentCollection {#82 …}
      +awards: Doctrine\ORM\PersistentCollection {#71 …}
      +categories: Doctrine\ORM\PersistentCollection {#1830 …}
      -id: 118
      +apId: "guix@lemmy.ml"
      +apProfileId: "https://lemmy.ml/c/guix"
      +apPublicUrl: "https://lemmy.ml/c/guix"
      +apFollowersUrl: "https://lemmy.ml/c/guix/followers"
      +apInboxUrl: "https://lemmy.ml/inbox"
      +apDomain: "lemmy.ml"
      +apPreferredUsername: "guix"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703436704 {#267
        date: 2023-12-24 17:51:44.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703436703 {#275
        date: 2023-12-24 17:51:43.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1876 …}
    +slug: "How-to-luks-encrypt-raid-drive"
    +title: "How to luks encrypt raid drive?"
    +url: null
    +body: """
      Edit: Turns out for what I’m trying to do (mount luks encrypted raid after start up) only needs the device mapping for the raid drive and not a file-system object.\n
      \n
      So I luks encrypted the raid and call a script to open the vault and mount it when I need to.\n
      \n
      ---\n
      \n
      In my system config file I added a raid drive like so:\n
      \n
      ```\n
      \n
      <span style="color:#323232;">(mapped-devices (list (mapped-device\n
      </span><span style="color:#323232;">                                     (source (uuid\n
      </span><span style="color:#323232;">                                                  "205e5caa-694f-4457-a2a1-8affa3536e75"))\n
      </span><span style="color:#323232;">                                     (target "guix")\n
      </span><span style="color:#323232;">                                     (type luks-device-mapping))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">                                  (mapped-device\n
      </span><span style="color:#323232;">                                     (source (list "/dev/sdb1" "/dev/sdc1"))\n
      </span><span style="color:#323232;">                                     (target "/dev/md0")\n
      </span><span style="color:#323232;">                                     (type raid-device-mapping))))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">(file-systems (cons* (file-system\n
      </span><span style="color:#323232;">                                  (mount-point "/")\n
      </span><span style="color:#323232;">                                  (device "/dev/mapper/guix")\n
      </span><span style="color:#323232;">                                  (type "ext4")\n
      </span><span style="color:#323232;">                                  (dependencies (list (list-ref mapped-devices 0))))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">                               (file-system\n
      </span><span style="color:#323232;">                                  (mount-point "/mnt/nas")\n
      </span><span style="color:#323232;">                                  (device "/dev/md0")\n
      </span><span style="color:#323232;">                                  (type "ext4")\n
      </span><span style="color:#323232;">                                  (mount? #f)\n
      </span><span style="color:#323232;">                                  (dependencies (list (list-ref mapped-devices 1)))) %base-file-systems)))\n
      </span>\n
      ```\n
      \n
      I’d now like to luks encrypt the raid drive but I’m not sure how to go about doing it. Do I simply make a another mapped-device object, specifying the raid drive uuid and “/dev/md0” as the target:\n
      \n
      ```\n
      \n
      <span style="color:#323232;">(mapped-device\n
      </span><span style="color:#323232;">   (source (uuid\n
      </span><span style="color:#323232;">                {raid uuid}))\n
      </span><span style="color:#323232;">                (target "/dev/md0")\n
      </span><span style="color:#323232;">                (type luks-device-mapping))\n
      </span>\n
      ```\n
      \n
      and then pass that as a dependency to the raid file system object?\n
      \n
      Thanks
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 6
    +favouriteCount: 7
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1711060515 {#1815
      date: 2024-03-21 23:35:15.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1916 …}
    +votes: Doctrine\ORM\PersistentCollection {#1974 …}
    +reports: Doctrine\ORM\PersistentCollection {#1837 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1936 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2429 …}
    +badges: Doctrine\ORM\PersistentCollection {#2424 …}
    +children: []
    -id: 26622
    -titleTs: "'drive':6 'encrypt':4 'luk':3 'raid':5"
    -bodyTs: "'/dev/mapper/guix':116 '/dev/md0':99,136,191,203 '/dev/sdb1':96 '/dev/sdc1':97 '/mnt/nas':134 '0':127 '1':149 '205e5':76 '4457':80 '694f':79 '8affa3536e75':83 'a2a1':82 'a2a1-8affa3536e75':81 'ad':61 'anoth':180 'base':151 'base-file-system':150 'caa':78 'caa-694f':77 'call':41 'con':108 'config':58 'd':155 'depend':119,141,215 'devic':21,69,73,89,93,103,115,126,135,148,183,197,207 'drive':26,64,163,188 'edit':1 'encrypt':13,37,160 'ext4':118,138 'f':140 'file':31,59,106,110,129,152,219 'file-system':30,105,109,128 'go':171 'guix':85 'like':65,157 'list':70,95,120,122,142,144 'list-ref':121,143 'luk':12,36,88,159,206 'luks-device-map':87,205 'm':7,166 'make':178 'map':22,68,72,90,92,104,125,147,182,196,208 'mapped-devic':67,71,91,124,146,181,195 'mount':11,49,113,132,139 'mount-point':112,131 'need':19,53 'object':33,184,221 'open':45 'pass':211 'point':114,133 'raid':14,25,39,63,102,162,187,200,218 'raid-device-map':101 'ref':123,145 'script':43 'simpli':177 'sourc':74,94,198 'specifi':185 'start':16 'sure':168 'system':32,57,107,111,130,153,220 'target':84,98,194,202 'thank':222 'tri':8 'turn':2 'type':86,100,117,137,204 'uuid':75,189,199,201 'vault':47"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1704181768
    +visibility: "visible             "
    +apId: "https://reddthat.com/post/11036859"
    +editedAt: DateTimeImmutable @1712607909 {#1813
      date: 2024-04-08 22:25:09.0 +02:00
    }
    +createdAt: DateTimeImmutable @1704144268 {#1802
      date: 2024-01-01 22:24:28.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#261}
  +image: null
  +parent: App\Entity\EntryComment {#4102
    +user: Proxies\__CG__\App\Entity\User {#4101 …}
    +entry: App\Entity\Entry {#2396}
    +magazine: App\Entity\Magazine {#261}
    +image: null
    +parent: App\Entity\EntryComment {#4032
      +user: App\Entity\User {#3980 …}
      +entry: App\Entity\Entry {#2396}
      +magazine: App\Entity\Magazine {#261}
      +image: null
      +parent: null
      +root: null
      +body: "You sure you want to use LUKS? It has a specific format that can be probed for almost like a known plain text."
      +lang: "en"
      +isAdult: false
      +favouriteCount: 1
      +score: 0
      +lastActive: DateTime @1711060515 {#4041
        date: 2024-03-21 23:35:15.0 +01:00
      }
      +ip: null
      +tags: null
      +mentions: [
        "@HulkSmashBurgers@reddthat.com"
      ]
      +children: Doctrine\ORM\PersistentCollection {#4030 …}
      +nested: Doctrine\ORM\PersistentCollection {#4028 …}
      +votes: Doctrine\ORM\PersistentCollection {#4026 …}
      +reports: Doctrine\ORM\PersistentCollection {#4024 …}
      +favourites: Doctrine\ORM\PersistentCollection {#3992 …}
      +notifications: Doctrine\ORM\PersistentCollection {#3996 …}
      -id: 271876
      -bodyTs: "'almost':18 'format':12 'known':21 'like':19 'luk':7 'plain':22 'probe':16 'specif':11 'sure':2 'text':23 'use':6 'want':4"
      +ranking: 0
      +commentCount: 0
      +upVotes: 0
      +downVotes: 0
      +visibility: "visible             "
      +apId: "https://sh.itjust.works/comment/6990747"
      +editedAt: null
      +createdAt: DateTimeImmutable @1704145891 {#3977
        date: 2024-01-01 22:51:31.0 +01:00
      }
    }
    +root: App\Entity\EntryComment {#4032}
    +body: "[devicetests.com/secure-luks-encryption](https://devicetests.com/secure-luks-encryption) had to Google that, if you want to brute force your way into a modern like setup you either need a weak password or a very powerful computer and time/money… or do you mean something else?"
    +lang: "en"
    +isAdult: false
    +favouriteCount: 1
    +score: 0
    +lastActive: DateTime @1704183585 {#4043
      date: 2024-01-02 09:19:45.0 +01:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@HulkSmashBurgers@reddthat.com"
      "@lurch@sh.itjust.works"
    ]
    +children: Doctrine\ORM\PersistentCollection {#4103 …}
    +nested: Doctrine\ORM\PersistentCollection {#4105 …}
    +votes: Doctrine\ORM\PersistentCollection {#4107 …}
    +reports: Doctrine\ORM\PersistentCollection {#4109 …}
    +favourites: Doctrine\ORM\PersistentCollection {#4111 …}
    +notifications: Doctrine\ORM\PersistentCollection {#4113 …}
    -id: 272678
    -bodyTs: "'/secure-luks-encryption](https://devicetests.com/secure-luks-encryption)':3 'brute':12 'comput':31 'devicetests.com':2 'devicetests.com/secure-luks-encryption](https://devicetests.com/secure-luks-encryption)':1 'either':22 'els':39 'forc':13 'googl':6 'like':19 'mean':37 'modern':18 'need':23 'password':26 'power':30 'setup':20 'someth':38 'time/money':33 'want':10 'way':15 'weak':25"
    +ranking: 0
    +commentCount: 0
    +upVotes: 0
    +downVotes: 0
    +visibility: "visible             "
    +apId: "https://lemmy.ml/comment/7006739"
    +editedAt: null
    +createdAt: DateTimeImmutable @1704183585 {#4042
      date: 2024-01-02 09:19:45.0 +01:00
    }
  }
  +root: App\Entity\EntryComment {#4032}
  +body: """
    I mean that any attack gets more easy when you know, after it’s decrypted there are the bytes A, B and C at the locations X, Y and Z. It helps with brute force as well as hybrid attacks to find the master key.\n
    \n
    LUKS does exactly have those specific Bytes at specific locations PLUS it has a marker that basically says “I am in this format and encrypted with this algorythm”.
    """
  +lang: "en"
  +isAdult: false
  +favouriteCount: 0
  +score: 0
  +lastActive: DateTime @1704205462 {#4121
    date: 2024-01-02 15:24:22.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@HulkSmashBurgers@reddthat.com"
    "@lurch@sh.itjust.works"
    "@LoveSausage@lemmy.ml"
    "@HulkSmashBurgers@reddthat.com"
    "@lurch@sh.itjust.works"
    "@LoveSausage@lemmy.ml"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4127 …}
  +nested: Doctrine\ORM\PersistentCollection {#4129 …}
  +votes: Doctrine\ORM\PersistentCollection {#4125 …}
  +reports: Doctrine\ORM\PersistentCollection {#4132 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4134 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4136 …}
  -id: 273514
  -bodyTs: "'algorythm':73 'attack':5,40 'b':21 'basic':62 'brute':34 'byte':19,52 'c':23 'decrypt':15 'easi':8 'encrypt':70 'exact':48 'find':42 'forc':35 'format':68 'get':6 'help':32 'hybrid':39 'key':45 'know':11 'locat':26,55 'luk':46 'marker':60 'master':44 'mean':2 'plus':56 'say':63 'specif':51,54 'well':37 'x':27 'y':28 'z':30"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://sh.itjust.works/comment/7005338"
  +editedAt: DateTimeImmutable @1710914600 {#4118
    date: 2024-03-20 07:03:20.0 +01:00
  }
  +createdAt: DateTimeImmutable @1704205462 {#4116
    date: 2024-01-02 15:24:22.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
21 DENIED ROLE_USER
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
22 DENIED moderate
App\Entity\EntryComment {#4153
  +user: Proxies\__CG__\App\Entity\User {#4101 …}
  +entry: App\Entity\Entry {#2396
    +user: Proxies\__CG__\App\Entity\User {#1960 …}
    +magazine: App\Entity\Magazine {#261
      +icon: null
      +name: "guix@lemmy.ml"
      +title: "guix"
      +description: "Guix is an advanced distribution of the GNU operating system developed by the GNU Project"
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 10
      +entryCommentCount: 8
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1727743868 {#269
        date: 2024-10-01 02:51:08.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#248 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#244 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#233 …}
      +entries: Doctrine\ORM\PersistentCollection {#191 …}
      +posts: Doctrine\ORM\PersistentCollection {#149 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#211 …}
      +bans: Doctrine\ORM\PersistentCollection {#128 …}
      +reports: Doctrine\ORM\PersistentCollection {#114 …}
      +badges: Doctrine\ORM\PersistentCollection {#92 …}
      +logs: Doctrine\ORM\PersistentCollection {#82 …}
      +awards: Doctrine\ORM\PersistentCollection {#71 …}
      +categories: Doctrine\ORM\PersistentCollection {#1830 …}
      -id: 118
      +apId: "guix@lemmy.ml"
      +apProfileId: "https://lemmy.ml/c/guix"
      +apPublicUrl: "https://lemmy.ml/c/guix"
      +apFollowersUrl: "https://lemmy.ml/c/guix/followers"
      +apInboxUrl: "https://lemmy.ml/inbox"
      +apDomain: "lemmy.ml"
      +apPreferredUsername: "guix"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703436704 {#267
        date: 2023-12-24 17:51:44.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703436703 {#275
        date: 2023-12-24 17:51:43.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1876 …}
    +slug: "How-to-luks-encrypt-raid-drive"
    +title: "How to luks encrypt raid drive?"
    +url: null
    +body: """
      Edit: Turns out for what I’m trying to do (mount luks encrypted raid after start up) only needs the device mapping for the raid drive and not a file-system object.\n
      \n
      So I luks encrypted the raid and call a script to open the vault and mount it when I need to.\n
      \n
      ---\n
      \n
      In my system config file I added a raid drive like so:\n
      \n
      ```\n
      \n
      <span style="color:#323232;">(mapped-devices (list (mapped-device\n
      </span><span style="color:#323232;">                                     (source (uuid\n
      </span><span style="color:#323232;">                                                  "205e5caa-694f-4457-a2a1-8affa3536e75"))\n
      </span><span style="color:#323232;">                                     (target "guix")\n
      </span><span style="color:#323232;">                                     (type luks-device-mapping))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">                                  (mapped-device\n
      </span><span style="color:#323232;">                                     (source (list "/dev/sdb1" "/dev/sdc1"))\n
      </span><span style="color:#323232;">                                     (target "/dev/md0")\n
      </span><span style="color:#323232;">                                     (type raid-device-mapping))))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">(file-systems (cons* (file-system\n
      </span><span style="color:#323232;">                                  (mount-point "/")\n
      </span><span style="color:#323232;">                                  (device "/dev/mapper/guix")\n
      </span><span style="color:#323232;">                                  (type "ext4")\n
      </span><span style="color:#323232;">                                  (dependencies (list (list-ref mapped-devices 0))))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">                               (file-system\n
      </span><span style="color:#323232;">                                  (mount-point "/mnt/nas")\n
      </span><span style="color:#323232;">                                  (device "/dev/md0")\n
      </span><span style="color:#323232;">                                  (type "ext4")\n
      </span><span style="color:#323232;">                                  (mount? #f)\n
      </span><span style="color:#323232;">                                  (dependencies (list (list-ref mapped-devices 1)))) %base-file-systems)))\n
      </span>\n
      ```\n
      \n
      I’d now like to luks encrypt the raid drive but I’m not sure how to go about doing it. Do I simply make a another mapped-device object, specifying the raid drive uuid and “/dev/md0” as the target:\n
      \n
      ```\n
      \n
      <span style="color:#323232;">(mapped-device\n
      </span><span style="color:#323232;">   (source (uuid\n
      </span><span style="color:#323232;">                {raid uuid}))\n
      </span><span style="color:#323232;">                (target "/dev/md0")\n
      </span><span style="color:#323232;">                (type luks-device-mapping))\n
      </span>\n
      ```\n
      \n
      and then pass that as a dependency to the raid file system object?\n
      \n
      Thanks
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 6
    +favouriteCount: 7
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1711060515 {#1815
      date: 2024-03-21 23:35:15.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1916 …}
    +votes: Doctrine\ORM\PersistentCollection {#1974 …}
    +reports: Doctrine\ORM\PersistentCollection {#1837 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1936 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2429 …}
    +badges: Doctrine\ORM\PersistentCollection {#2424 …}
    +children: []
    -id: 26622
    -titleTs: "'drive':6 'encrypt':4 'luk':3 'raid':5"
    -bodyTs: "'/dev/mapper/guix':116 '/dev/md0':99,136,191,203 '/dev/sdb1':96 '/dev/sdc1':97 '/mnt/nas':134 '0':127 '1':149 '205e5':76 '4457':80 '694f':79 '8affa3536e75':83 'a2a1':82 'a2a1-8affa3536e75':81 'ad':61 'anoth':180 'base':151 'base-file-system':150 'caa':78 'caa-694f':77 'call':41 'con':108 'config':58 'd':155 'depend':119,141,215 'devic':21,69,73,89,93,103,115,126,135,148,183,197,207 'drive':26,64,163,188 'edit':1 'encrypt':13,37,160 'ext4':118,138 'f':140 'file':31,59,106,110,129,152,219 'file-system':30,105,109,128 'go':171 'guix':85 'like':65,157 'list':70,95,120,122,142,144 'list-ref':121,143 'luk':12,36,88,159,206 'luks-device-map':87,205 'm':7,166 'make':178 'map':22,68,72,90,92,104,125,147,182,196,208 'mapped-devic':67,71,91,124,146,181,195 'mount':11,49,113,132,139 'mount-point':112,131 'need':19,53 'object':33,184,221 'open':45 'pass':211 'point':114,133 'raid':14,25,39,63,102,162,187,200,218 'raid-device-map':101 'ref':123,145 'script':43 'simpli':177 'sourc':74,94,198 'specifi':185 'start':16 'sure':168 'system':32,57,107,111,130,153,220 'target':84,98,194,202 'thank':222 'tri':8 'turn':2 'type':86,100,117,137,204 'uuid':75,189,199,201 'vault':47"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1704181768
    +visibility: "visible             "
    +apId: "https://reddthat.com/post/11036859"
    +editedAt: DateTimeImmutable @1712607909 {#1813
      date: 2024-04-08 22:25:09.0 +02:00
    }
    +createdAt: DateTimeImmutable @1704144268 {#1802
      date: 2024-01-01 22:24:28.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#261}
  +image: null
  +parent: App\Entity\EntryComment {#4124
    +user: App\Entity\User {#3980 …}
    +entry: App\Entity\Entry {#2396}
    +magazine: App\Entity\Magazine {#261}
    +image: null
    +parent: App\Entity\EntryComment {#4102
      +user: Proxies\__CG__\App\Entity\User {#4101 …}
      +entry: App\Entity\Entry {#2396}
      +magazine: App\Entity\Magazine {#261}
      +image: null
      +parent: App\Entity\EntryComment {#4032
        +user: App\Entity\User {#3980 …}
        +entry: App\Entity\Entry {#2396}
        +magazine: App\Entity\Magazine {#261}
        +image: null
        +parent: null
        +root: null
        +body: "You sure you want to use LUKS? It has a specific format that can be probed for almost like a known plain text."
        +lang: "en"
        +isAdult: false
        +favouriteCount: 1
        +score: 0
        +lastActive: DateTime @1711060515 {#4041
          date: 2024-03-21 23:35:15.0 +01:00
        }
        +ip: null
        +tags: null
        +mentions: [
          "@HulkSmashBurgers@reddthat.com"
        ]
        +children: Doctrine\ORM\PersistentCollection {#4030 …}
        +nested: Doctrine\ORM\PersistentCollection {#4028 …}
        +votes: Doctrine\ORM\PersistentCollection {#4026 …}
        +reports: Doctrine\ORM\PersistentCollection {#4024 …}
        +favourites: Doctrine\ORM\PersistentCollection {#3992 …}
        +notifications: Doctrine\ORM\PersistentCollection {#3996 …}
        -id: 271876
        -bodyTs: "'almost':18 'format':12 'known':21 'like':19 'luk':7 'plain':22 'probe':16 'specif':11 'sure':2 'text':23 'use':6 'want':4"
        +ranking: 0
        +commentCount: 0
        +upVotes: 0
        +downVotes: 0
        +visibility: "visible             "
        +apId: "https://sh.itjust.works/comment/6990747"
        +editedAt: null
        +createdAt: DateTimeImmutable @1704145891 {#3977
          date: 2024-01-01 22:51:31.0 +01:00
        }
      }
      +root: App\Entity\EntryComment {#4032}
      +body: "[devicetests.com/secure-luks-encryption](https://devicetests.com/secure-luks-encryption) had to Google that, if you want to brute force your way into a modern like setup you either need a weak password or a very powerful computer and time/money… or do you mean something else?"
      +lang: "en"
      +isAdult: false
      +favouriteCount: 1
      +score: 0
      +lastActive: DateTime @1704183585 {#4043
        date: 2024-01-02 09:19:45.0 +01:00
      }
      +ip: null
      +tags: null
      +mentions: [
        "@HulkSmashBurgers@reddthat.com"
        "@lurch@sh.itjust.works"
      ]
      +children: Doctrine\ORM\PersistentCollection {#4103 …}
      +nested: Doctrine\ORM\PersistentCollection {#4105 …}
      +votes: Doctrine\ORM\PersistentCollection {#4107 …}
      +reports: Doctrine\ORM\PersistentCollection {#4109 …}
      +favourites: Doctrine\ORM\PersistentCollection {#4111 …}
      +notifications: Doctrine\ORM\PersistentCollection {#4113 …}
      -id: 272678
      -bodyTs: "'/secure-luks-encryption](https://devicetests.com/secure-luks-encryption)':3 'brute':12 'comput':31 'devicetests.com':2 'devicetests.com/secure-luks-encryption](https://devicetests.com/secure-luks-encryption)':1 'either':22 'els':39 'forc':13 'googl':6 'like':19 'mean':37 'modern':18 'need':23 'password':26 'power':30 'setup':20 'someth':38 'time/money':33 'want':10 'way':15 'weak':25"
      +ranking: 0
      +commentCount: 0
      +upVotes: 0
      +downVotes: 0
      +visibility: "visible             "
      +apId: "https://lemmy.ml/comment/7006739"
      +editedAt: null
      +createdAt: DateTimeImmutable @1704183585 {#4042
        date: 2024-01-02 09:19:45.0 +01:00
      }
    }
    +root: App\Entity\EntryComment {#4032}
    +body: """
      I mean that any attack gets more easy when you know, after it’s decrypted there are the bytes A, B and C at the locations X, Y and Z. It helps with brute force as well as hybrid attacks to find the master key.\n
      \n
      LUKS does exactly have those specific Bytes at specific locations PLUS it has a marker that basically says “I am in this format and encrypted with this algorythm”.
      """
    +lang: "en"
    +isAdult: false
    +favouriteCount: 0
    +score: 0
    +lastActive: DateTime @1704205462 {#4121
      date: 2024-01-02 15:24:22.0 +01:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@HulkSmashBurgers@reddthat.com"
      "@lurch@sh.itjust.works"
      "@LoveSausage@lemmy.ml"
      "@HulkSmashBurgers@reddthat.com"
      "@lurch@sh.itjust.works"
      "@LoveSausage@lemmy.ml"
    ]
    +children: Doctrine\ORM\PersistentCollection {#4127 …}
    +nested: Doctrine\ORM\PersistentCollection {#4129 …}
    +votes: Doctrine\ORM\PersistentCollection {#4125 …}
    +reports: Doctrine\ORM\PersistentCollection {#4132 …}
    +favourites: Doctrine\ORM\PersistentCollection {#4134 …}
    +notifications: Doctrine\ORM\PersistentCollection {#4136 …}
    -id: 273514
    -bodyTs: "'algorythm':73 'attack':5,40 'b':21 'basic':62 'brute':34 'byte':19,52 'c':23 'decrypt':15 'easi':8 'encrypt':70 'exact':48 'find':42 'forc':35 'format':68 'get':6 'help':32 'hybrid':39 'key':45 'know':11 'locat':26,55 'luk':46 'marker':60 'master':44 'mean':2 'plus':56 'say':63 'specif':51,54 'well':37 'x':27 'y':28 'z':30"
    +ranking: 0
    +commentCount: 0
    +upVotes: 0
    +downVotes: 0
    +visibility: "visible             "
    +apId: "https://sh.itjust.works/comment/7005338"
    +editedAt: DateTimeImmutable @1710914600 {#4118
      date: 2024-03-20 07:03:20.0 +01:00
    }
    +createdAt: DateTimeImmutable @1704205462 {#4116
      date: 2024-01-02 15:24:22.0 +01:00
    }
  }
  +root: App\Entity\EntryComment {#4032}
  +body: "Interesting. But is that issue not mitigated by using a good passphrase ? Been using luks as default for years. Any better option for full disk encryption on Linux ?"
  +lang: "en"
  +isAdult: false
  +favouriteCount: 0
  +score: 0
  +lastActive: DateTime @1704216167 {#4148
    date: 2024-01-02 18:22:47.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@HulkSmashBurgers@reddthat.com"
    "@lurch@sh.itjust.works"
    "@LoveSausage@lemmy.ml"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4145 …}
  +nested: Doctrine\ORM\PersistentCollection {#4142 …}
  +votes: Doctrine\ORM\PersistentCollection {#4140 …}
  +reports: Doctrine\ORM\PersistentCollection {#4154 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4156 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4158 …}
  -id: 273995
  -bodyTs: "'better':21 'default':17 'disk':25 'encrypt':26 'full':24 'good':11 'interest':1 'issu':5 'linux':28 'luk':15 'mitig':7 'option':22 'passphras':12 'use':9,14 'year':19"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.ml/comment/7014080"
  +editedAt: null
  +createdAt: DateTimeImmutable @1704216167 {#4151
    date: 2024-01-02 18:22:47.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
23 DENIED edit
App\Entity\EntryComment {#4153
  +user: Proxies\__CG__\App\Entity\User {#4101 …}
  +entry: App\Entity\Entry {#2396
    +user: Proxies\__CG__\App\Entity\User {#1960 …}
    +magazine: App\Entity\Magazine {#261
      +icon: null
      +name: "guix@lemmy.ml"
      +title: "guix"
      +description: "Guix is an advanced distribution of the GNU operating system developed by the GNU Project"
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 10
      +entryCommentCount: 8
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1727743868 {#269
        date: 2024-10-01 02:51:08.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#248 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#244 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#233 …}
      +entries: Doctrine\ORM\PersistentCollection {#191 …}
      +posts: Doctrine\ORM\PersistentCollection {#149 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#211 …}
      +bans: Doctrine\ORM\PersistentCollection {#128 …}
      +reports: Doctrine\ORM\PersistentCollection {#114 …}
      +badges: Doctrine\ORM\PersistentCollection {#92 …}
      +logs: Doctrine\ORM\PersistentCollection {#82 …}
      +awards: Doctrine\ORM\PersistentCollection {#71 …}
      +categories: Doctrine\ORM\PersistentCollection {#1830 …}
      -id: 118
      +apId: "guix@lemmy.ml"
      +apProfileId: "https://lemmy.ml/c/guix"
      +apPublicUrl: "https://lemmy.ml/c/guix"
      +apFollowersUrl: "https://lemmy.ml/c/guix/followers"
      +apInboxUrl: "https://lemmy.ml/inbox"
      +apDomain: "lemmy.ml"
      +apPreferredUsername: "guix"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703436704 {#267
        date: 2023-12-24 17:51:44.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703436703 {#275
        date: 2023-12-24 17:51:43.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1876 …}
    +slug: "How-to-luks-encrypt-raid-drive"
    +title: "How to luks encrypt raid drive?"
    +url: null
    +body: """
      Edit: Turns out for what I’m trying to do (mount luks encrypted raid after start up) only needs the device mapping for the raid drive and not a file-system object.\n
      \n
      So I luks encrypted the raid and call a script to open the vault and mount it when I need to.\n
      \n
      ---\n
      \n
      In my system config file I added a raid drive like so:\n
      \n
      ```\n
      \n
      <span style="color:#323232;">(mapped-devices (list (mapped-device\n
      </span><span style="color:#323232;">                                     (source (uuid\n
      </span><span style="color:#323232;">                                                  "205e5caa-694f-4457-a2a1-8affa3536e75"))\n
      </span><span style="color:#323232;">                                     (target "guix")\n
      </span><span style="color:#323232;">                                     (type luks-device-mapping))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">                                  (mapped-device\n
      </span><span style="color:#323232;">                                     (source (list "/dev/sdb1" "/dev/sdc1"))\n
      </span><span style="color:#323232;">                                     (target "/dev/md0")\n
      </span><span style="color:#323232;">                                     (type raid-device-mapping))))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">(file-systems (cons* (file-system\n
      </span><span style="color:#323232;">                                  (mount-point "/")\n
      </span><span style="color:#323232;">                                  (device "/dev/mapper/guix")\n
      </span><span style="color:#323232;">                                  (type "ext4")\n
      </span><span style="color:#323232;">                                  (dependencies (list (list-ref mapped-devices 0))))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">                               (file-system\n
      </span><span style="color:#323232;">                                  (mount-point "/mnt/nas")\n
      </span><span style="color:#323232;">                                  (device "/dev/md0")\n
      </span><span style="color:#323232;">                                  (type "ext4")\n
      </span><span style="color:#323232;">                                  (mount? #f)\n
      </span><span style="color:#323232;">                                  (dependencies (list (list-ref mapped-devices 1)))) %base-file-systems)))\n
      </span>\n
      ```\n
      \n
      I’d now like to luks encrypt the raid drive but I’m not sure how to go about doing it. Do I simply make a another mapped-device object, specifying the raid drive uuid and “/dev/md0” as the target:\n
      \n
      ```\n
      \n
      <span style="color:#323232;">(mapped-device\n
      </span><span style="color:#323232;">   (source (uuid\n
      </span><span style="color:#323232;">                {raid uuid}))\n
      </span><span style="color:#323232;">                (target "/dev/md0")\n
      </span><span style="color:#323232;">                (type luks-device-mapping))\n
      </span>\n
      ```\n
      \n
      and then pass that as a dependency to the raid file system object?\n
      \n
      Thanks
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 6
    +favouriteCount: 7
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1711060515 {#1815
      date: 2024-03-21 23:35:15.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1916 …}
    +votes: Doctrine\ORM\PersistentCollection {#1974 …}
    +reports: Doctrine\ORM\PersistentCollection {#1837 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1936 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2429 …}
    +badges: Doctrine\ORM\PersistentCollection {#2424 …}
    +children: []
    -id: 26622
    -titleTs: "'drive':6 'encrypt':4 'luk':3 'raid':5"
    -bodyTs: "'/dev/mapper/guix':116 '/dev/md0':99,136,191,203 '/dev/sdb1':96 '/dev/sdc1':97 '/mnt/nas':134 '0':127 '1':149 '205e5':76 '4457':80 '694f':79 '8affa3536e75':83 'a2a1':82 'a2a1-8affa3536e75':81 'ad':61 'anoth':180 'base':151 'base-file-system':150 'caa':78 'caa-694f':77 'call':41 'con':108 'config':58 'd':155 'depend':119,141,215 'devic':21,69,73,89,93,103,115,126,135,148,183,197,207 'drive':26,64,163,188 'edit':1 'encrypt':13,37,160 'ext4':118,138 'f':140 'file':31,59,106,110,129,152,219 'file-system':30,105,109,128 'go':171 'guix':85 'like':65,157 'list':70,95,120,122,142,144 'list-ref':121,143 'luk':12,36,88,159,206 'luks-device-map':87,205 'm':7,166 'make':178 'map':22,68,72,90,92,104,125,147,182,196,208 'mapped-devic':67,71,91,124,146,181,195 'mount':11,49,113,132,139 'mount-point':112,131 'need':19,53 'object':33,184,221 'open':45 'pass':211 'point':114,133 'raid':14,25,39,63,102,162,187,200,218 'raid-device-map':101 'ref':123,145 'script':43 'simpli':177 'sourc':74,94,198 'specifi':185 'start':16 'sure':168 'system':32,57,107,111,130,153,220 'target':84,98,194,202 'thank':222 'tri':8 'turn':2 'type':86,100,117,137,204 'uuid':75,189,199,201 'vault':47"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1704181768
    +visibility: "visible             "
    +apId: "https://reddthat.com/post/11036859"
    +editedAt: DateTimeImmutable @1712607909 {#1813
      date: 2024-04-08 22:25:09.0 +02:00
    }
    +createdAt: DateTimeImmutable @1704144268 {#1802
      date: 2024-01-01 22:24:28.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#261}
  +image: null
  +parent: App\Entity\EntryComment {#4124
    +user: App\Entity\User {#3980 …}
    +entry: App\Entity\Entry {#2396}
    +magazine: App\Entity\Magazine {#261}
    +image: null
    +parent: App\Entity\EntryComment {#4102
      +user: Proxies\__CG__\App\Entity\User {#4101 …}
      +entry: App\Entity\Entry {#2396}
      +magazine: App\Entity\Magazine {#261}
      +image: null
      +parent: App\Entity\EntryComment {#4032
        +user: App\Entity\User {#3980 …}
        +entry: App\Entity\Entry {#2396}
        +magazine: App\Entity\Magazine {#261}
        +image: null
        +parent: null
        +root: null
        +body: "You sure you want to use LUKS? It has a specific format that can be probed for almost like a known plain text."
        +lang: "en"
        +isAdult: false
        +favouriteCount: 1
        +score: 0
        +lastActive: DateTime @1711060515 {#4041
          date: 2024-03-21 23:35:15.0 +01:00
        }
        +ip: null
        +tags: null
        +mentions: [
          "@HulkSmashBurgers@reddthat.com"
        ]
        +children: Doctrine\ORM\PersistentCollection {#4030 …}
        +nested: Doctrine\ORM\PersistentCollection {#4028 …}
        +votes: Doctrine\ORM\PersistentCollection {#4026 …}
        +reports: Doctrine\ORM\PersistentCollection {#4024 …}
        +favourites: Doctrine\ORM\PersistentCollection {#3992 …}
        +notifications: Doctrine\ORM\PersistentCollection {#3996 …}
        -id: 271876
        -bodyTs: "'almost':18 'format':12 'known':21 'like':19 'luk':7 'plain':22 'probe':16 'specif':11 'sure':2 'text':23 'use':6 'want':4"
        +ranking: 0
        +commentCount: 0
        +upVotes: 0
        +downVotes: 0
        +visibility: "visible             "
        +apId: "https://sh.itjust.works/comment/6990747"
        +editedAt: null
        +createdAt: DateTimeImmutable @1704145891 {#3977
          date: 2024-01-01 22:51:31.0 +01:00
        }
      }
      +root: App\Entity\EntryComment {#4032}
      +body: "[devicetests.com/secure-luks-encryption](https://devicetests.com/secure-luks-encryption) had to Google that, if you want to brute force your way into a modern like setup you either need a weak password or a very powerful computer and time/money… or do you mean something else?"
      +lang: "en"
      +isAdult: false
      +favouriteCount: 1
      +score: 0
      +lastActive: DateTime @1704183585 {#4043
        date: 2024-01-02 09:19:45.0 +01:00
      }
      +ip: null
      +tags: null
      +mentions: [
        "@HulkSmashBurgers@reddthat.com"
        "@lurch@sh.itjust.works"
      ]
      +children: Doctrine\ORM\PersistentCollection {#4103 …}
      +nested: Doctrine\ORM\PersistentCollection {#4105 …}
      +votes: Doctrine\ORM\PersistentCollection {#4107 …}
      +reports: Doctrine\ORM\PersistentCollection {#4109 …}
      +favourites: Doctrine\ORM\PersistentCollection {#4111 …}
      +notifications: Doctrine\ORM\PersistentCollection {#4113 …}
      -id: 272678
      -bodyTs: "'/secure-luks-encryption](https://devicetests.com/secure-luks-encryption)':3 'brute':12 'comput':31 'devicetests.com':2 'devicetests.com/secure-luks-encryption](https://devicetests.com/secure-luks-encryption)':1 'either':22 'els':39 'forc':13 'googl':6 'like':19 'mean':37 'modern':18 'need':23 'password':26 'power':30 'setup':20 'someth':38 'time/money':33 'want':10 'way':15 'weak':25"
      +ranking: 0
      +commentCount: 0
      +upVotes: 0
      +downVotes: 0
      +visibility: "visible             "
      +apId: "https://lemmy.ml/comment/7006739"
      +editedAt: null
      +createdAt: DateTimeImmutable @1704183585 {#4042
        date: 2024-01-02 09:19:45.0 +01:00
      }
    }
    +root: App\Entity\EntryComment {#4032}
    +body: """
      I mean that any attack gets more easy when you know, after it’s decrypted there are the bytes A, B and C at the locations X, Y and Z. It helps with brute force as well as hybrid attacks to find the master key.\n
      \n
      LUKS does exactly have those specific Bytes at specific locations PLUS it has a marker that basically says “I am in this format and encrypted with this algorythm”.
      """
    +lang: "en"
    +isAdult: false
    +favouriteCount: 0
    +score: 0
    +lastActive: DateTime @1704205462 {#4121
      date: 2024-01-02 15:24:22.0 +01:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@HulkSmashBurgers@reddthat.com"
      "@lurch@sh.itjust.works"
      "@LoveSausage@lemmy.ml"
      "@HulkSmashBurgers@reddthat.com"
      "@lurch@sh.itjust.works"
      "@LoveSausage@lemmy.ml"
    ]
    +children: Doctrine\ORM\PersistentCollection {#4127 …}
    +nested: Doctrine\ORM\PersistentCollection {#4129 …}
    +votes: Doctrine\ORM\PersistentCollection {#4125 …}
    +reports: Doctrine\ORM\PersistentCollection {#4132 …}
    +favourites: Doctrine\ORM\PersistentCollection {#4134 …}
    +notifications: Doctrine\ORM\PersistentCollection {#4136 …}
    -id: 273514
    -bodyTs: "'algorythm':73 'attack':5,40 'b':21 'basic':62 'brute':34 'byte':19,52 'c':23 'decrypt':15 'easi':8 'encrypt':70 'exact':48 'find':42 'forc':35 'format':68 'get':6 'help':32 'hybrid':39 'key':45 'know':11 'locat':26,55 'luk':46 'marker':60 'master':44 'mean':2 'plus':56 'say':63 'specif':51,54 'well':37 'x':27 'y':28 'z':30"
    +ranking: 0
    +commentCount: 0
    +upVotes: 0
    +downVotes: 0
    +visibility: "visible             "
    +apId: "https://sh.itjust.works/comment/7005338"
    +editedAt: DateTimeImmutable @1710914600 {#4118
      date: 2024-03-20 07:03:20.0 +01:00
    }
    +createdAt: DateTimeImmutable @1704205462 {#4116
      date: 2024-01-02 15:24:22.0 +01:00
    }
  }
  +root: App\Entity\EntryComment {#4032}
  +body: "Interesting. But is that issue not mitigated by using a good passphrase ? Been using luks as default for years. Any better option for full disk encryption on Linux ?"
  +lang: "en"
  +isAdult: false
  +favouriteCount: 0
  +score: 0
  +lastActive: DateTime @1704216167 {#4148
    date: 2024-01-02 18:22:47.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@HulkSmashBurgers@reddthat.com"
    "@lurch@sh.itjust.works"
    "@LoveSausage@lemmy.ml"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4145 …}
  +nested: Doctrine\ORM\PersistentCollection {#4142 …}
  +votes: Doctrine\ORM\PersistentCollection {#4140 …}
  +reports: Doctrine\ORM\PersistentCollection {#4154 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4156 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4158 …}
  -id: 273995
  -bodyTs: "'better':21 'default':17 'disk':25 'encrypt':26 'full':24 'good':11 'interest':1 'issu':5 'linux':28 'luk':15 'mitig':7 'option':22 'passphras':12 'use':9,14 'year':19"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.ml/comment/7014080"
  +editedAt: null
  +createdAt: DateTimeImmutable @1704216167 {#4151
    date: 2024-01-02 18:22:47.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
24 DENIED moderate
App\Entity\EntryComment {#4153
  +user: Proxies\__CG__\App\Entity\User {#4101 …}
  +entry: App\Entity\Entry {#2396
    +user: Proxies\__CG__\App\Entity\User {#1960 …}
    +magazine: App\Entity\Magazine {#261
      +icon: null
      +name: "guix@lemmy.ml"
      +title: "guix"
      +description: "Guix is an advanced distribution of the GNU operating system developed by the GNU Project"
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 10
      +entryCommentCount: 8
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1727743868 {#269
        date: 2024-10-01 02:51:08.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#248 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#244 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#233 …}
      +entries: Doctrine\ORM\PersistentCollection {#191 …}
      +posts: Doctrine\ORM\PersistentCollection {#149 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#211 …}
      +bans: Doctrine\ORM\PersistentCollection {#128 …}
      +reports: Doctrine\ORM\PersistentCollection {#114 …}
      +badges: Doctrine\ORM\PersistentCollection {#92 …}
      +logs: Doctrine\ORM\PersistentCollection {#82 …}
      +awards: Doctrine\ORM\PersistentCollection {#71 …}
      +categories: Doctrine\ORM\PersistentCollection {#1830 …}
      -id: 118
      +apId: "guix@lemmy.ml"
      +apProfileId: "https://lemmy.ml/c/guix"
      +apPublicUrl: "https://lemmy.ml/c/guix"
      +apFollowersUrl: "https://lemmy.ml/c/guix/followers"
      +apInboxUrl: "https://lemmy.ml/inbox"
      +apDomain: "lemmy.ml"
      +apPreferredUsername: "guix"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703436704 {#267
        date: 2023-12-24 17:51:44.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703436703 {#275
        date: 2023-12-24 17:51:43.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1876 …}
    +slug: "How-to-luks-encrypt-raid-drive"
    +title: "How to luks encrypt raid drive?"
    +url: null
    +body: """
      Edit: Turns out for what I’m trying to do (mount luks encrypted raid after start up) only needs the device mapping for the raid drive and not a file-system object.\n
      \n
      So I luks encrypted the raid and call a script to open the vault and mount it when I need to.\n
      \n
      ---\n
      \n
      In my system config file I added a raid drive like so:\n
      \n
      ```\n
      \n
      <span style="color:#323232;">(mapped-devices (list (mapped-device\n
      </span><span style="color:#323232;">                                     (source (uuid\n
      </span><span style="color:#323232;">                                                  "205e5caa-694f-4457-a2a1-8affa3536e75"))\n
      </span><span style="color:#323232;">                                     (target "guix")\n
      </span><span style="color:#323232;">                                     (type luks-device-mapping))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">                                  (mapped-device\n
      </span><span style="color:#323232;">                                     (source (list "/dev/sdb1" "/dev/sdc1"))\n
      </span><span style="color:#323232;">                                     (target "/dev/md0")\n
      </span><span style="color:#323232;">                                     (type raid-device-mapping))))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">(file-systems (cons* (file-system\n
      </span><span style="color:#323232;">                                  (mount-point "/")\n
      </span><span style="color:#323232;">                                  (device "/dev/mapper/guix")\n
      </span><span style="color:#323232;">                                  (type "ext4")\n
      </span><span style="color:#323232;">                                  (dependencies (list (list-ref mapped-devices 0))))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">                               (file-system\n
      </span><span style="color:#323232;">                                  (mount-point "/mnt/nas")\n
      </span><span style="color:#323232;">                                  (device "/dev/md0")\n
      </span><span style="color:#323232;">                                  (type "ext4")\n
      </span><span style="color:#323232;">                                  (mount? #f)\n
      </span><span style="color:#323232;">                                  (dependencies (list (list-ref mapped-devices 1)))) %base-file-systems)))\n
      </span>\n
      ```\n
      \n
      I’d now like to luks encrypt the raid drive but I’m not sure how to go about doing it. Do I simply make a another mapped-device object, specifying the raid drive uuid and “/dev/md0” as the target:\n
      \n
      ```\n
      \n
      <span style="color:#323232;">(mapped-device\n
      </span><span style="color:#323232;">   (source (uuid\n
      </span><span style="color:#323232;">                {raid uuid}))\n
      </span><span style="color:#323232;">                (target "/dev/md0")\n
      </span><span style="color:#323232;">                (type luks-device-mapping))\n
      </span>\n
      ```\n
      \n
      and then pass that as a dependency to the raid file system object?\n
      \n
      Thanks
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 6
    +favouriteCount: 7
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1711060515 {#1815
      date: 2024-03-21 23:35:15.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1916 …}
    +votes: Doctrine\ORM\PersistentCollection {#1974 …}
    +reports: Doctrine\ORM\PersistentCollection {#1837 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1936 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2429 …}
    +badges: Doctrine\ORM\PersistentCollection {#2424 …}
    +children: []
    -id: 26622
    -titleTs: "'drive':6 'encrypt':4 'luk':3 'raid':5"
    -bodyTs: "'/dev/mapper/guix':116 '/dev/md0':99,136,191,203 '/dev/sdb1':96 '/dev/sdc1':97 '/mnt/nas':134 '0':127 '1':149 '205e5':76 '4457':80 '694f':79 '8affa3536e75':83 'a2a1':82 'a2a1-8affa3536e75':81 'ad':61 'anoth':180 'base':151 'base-file-system':150 'caa':78 'caa-694f':77 'call':41 'con':108 'config':58 'd':155 'depend':119,141,215 'devic':21,69,73,89,93,103,115,126,135,148,183,197,207 'drive':26,64,163,188 'edit':1 'encrypt':13,37,160 'ext4':118,138 'f':140 'file':31,59,106,110,129,152,219 'file-system':30,105,109,128 'go':171 'guix':85 'like':65,157 'list':70,95,120,122,142,144 'list-ref':121,143 'luk':12,36,88,159,206 'luks-device-map':87,205 'm':7,166 'make':178 'map':22,68,72,90,92,104,125,147,182,196,208 'mapped-devic':67,71,91,124,146,181,195 'mount':11,49,113,132,139 'mount-point':112,131 'need':19,53 'object':33,184,221 'open':45 'pass':211 'point':114,133 'raid':14,25,39,63,102,162,187,200,218 'raid-device-map':101 'ref':123,145 'script':43 'simpli':177 'sourc':74,94,198 'specifi':185 'start':16 'sure':168 'system':32,57,107,111,130,153,220 'target':84,98,194,202 'thank':222 'tri':8 'turn':2 'type':86,100,117,137,204 'uuid':75,189,199,201 'vault':47"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1704181768
    +visibility: "visible             "
    +apId: "https://reddthat.com/post/11036859"
    +editedAt: DateTimeImmutable @1712607909 {#1813
      date: 2024-04-08 22:25:09.0 +02:00
    }
    +createdAt: DateTimeImmutable @1704144268 {#1802
      date: 2024-01-01 22:24:28.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#261}
  +image: null
  +parent: App\Entity\EntryComment {#4124
    +user: App\Entity\User {#3980 …}
    +entry: App\Entity\Entry {#2396}
    +magazine: App\Entity\Magazine {#261}
    +image: null
    +parent: App\Entity\EntryComment {#4102
      +user: Proxies\__CG__\App\Entity\User {#4101 …}
      +entry: App\Entity\Entry {#2396}
      +magazine: App\Entity\Magazine {#261}
      +image: null
      +parent: App\Entity\EntryComment {#4032
        +user: App\Entity\User {#3980 …}
        +entry: App\Entity\Entry {#2396}
        +magazine: App\Entity\Magazine {#261}
        +image: null
        +parent: null
        +root: null
        +body: "You sure you want to use LUKS? It has a specific format that can be probed for almost like a known plain text."
        +lang: "en"
        +isAdult: false
        +favouriteCount: 1
        +score: 0
        +lastActive: DateTime @1711060515 {#4041
          date: 2024-03-21 23:35:15.0 +01:00
        }
        +ip: null
        +tags: null
        +mentions: [
          "@HulkSmashBurgers@reddthat.com"
        ]
        +children: Doctrine\ORM\PersistentCollection {#4030 …}
        +nested: Doctrine\ORM\PersistentCollection {#4028 …}
        +votes: Doctrine\ORM\PersistentCollection {#4026 …}
        +reports: Doctrine\ORM\PersistentCollection {#4024 …}
        +favourites: Doctrine\ORM\PersistentCollection {#3992 …}
        +notifications: Doctrine\ORM\PersistentCollection {#3996 …}
        -id: 271876
        -bodyTs: "'almost':18 'format':12 'known':21 'like':19 'luk':7 'plain':22 'probe':16 'specif':11 'sure':2 'text':23 'use':6 'want':4"
        +ranking: 0
        +commentCount: 0
        +upVotes: 0
        +downVotes: 0
        +visibility: "visible             "
        +apId: "https://sh.itjust.works/comment/6990747"
        +editedAt: null
        +createdAt: DateTimeImmutable @1704145891 {#3977
          date: 2024-01-01 22:51:31.0 +01:00
        }
      }
      +root: App\Entity\EntryComment {#4032}
      +body: "[devicetests.com/secure-luks-encryption](https://devicetests.com/secure-luks-encryption) had to Google that, if you want to brute force your way into a modern like setup you either need a weak password or a very powerful computer and time/money… or do you mean something else?"
      +lang: "en"
      +isAdult: false
      +favouriteCount: 1
      +score: 0
      +lastActive: DateTime @1704183585 {#4043
        date: 2024-01-02 09:19:45.0 +01:00
      }
      +ip: null
      +tags: null
      +mentions: [
        "@HulkSmashBurgers@reddthat.com"
        "@lurch@sh.itjust.works"
      ]
      +children: Doctrine\ORM\PersistentCollection {#4103 …}
      +nested: Doctrine\ORM\PersistentCollection {#4105 …}
      +votes: Doctrine\ORM\PersistentCollection {#4107 …}
      +reports: Doctrine\ORM\PersistentCollection {#4109 …}
      +favourites: Doctrine\ORM\PersistentCollection {#4111 …}
      +notifications: Doctrine\ORM\PersistentCollection {#4113 …}
      -id: 272678
      -bodyTs: "'/secure-luks-encryption](https://devicetests.com/secure-luks-encryption)':3 'brute':12 'comput':31 'devicetests.com':2 'devicetests.com/secure-luks-encryption](https://devicetests.com/secure-luks-encryption)':1 'either':22 'els':39 'forc':13 'googl':6 'like':19 'mean':37 'modern':18 'need':23 'password':26 'power':30 'setup':20 'someth':38 'time/money':33 'want':10 'way':15 'weak':25"
      +ranking: 0
      +commentCount: 0
      +upVotes: 0
      +downVotes: 0
      +visibility: "visible             "
      +apId: "https://lemmy.ml/comment/7006739"
      +editedAt: null
      +createdAt: DateTimeImmutable @1704183585 {#4042
        date: 2024-01-02 09:19:45.0 +01:00
      }
    }
    +root: App\Entity\EntryComment {#4032}
    +body: """
      I mean that any attack gets more easy when you know, after it’s decrypted there are the bytes A, B and C at the locations X, Y and Z. It helps with brute force as well as hybrid attacks to find the master key.\n
      \n
      LUKS does exactly have those specific Bytes at specific locations PLUS it has a marker that basically says “I am in this format and encrypted with this algorythm”.
      """
    +lang: "en"
    +isAdult: false
    +favouriteCount: 0
    +score: 0
    +lastActive: DateTime @1704205462 {#4121
      date: 2024-01-02 15:24:22.0 +01:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@HulkSmashBurgers@reddthat.com"
      "@lurch@sh.itjust.works"
      "@LoveSausage@lemmy.ml"
      "@HulkSmashBurgers@reddthat.com"
      "@lurch@sh.itjust.works"
      "@LoveSausage@lemmy.ml"
    ]
    +children: Doctrine\ORM\PersistentCollection {#4127 …}
    +nested: Doctrine\ORM\PersistentCollection {#4129 …}
    +votes: Doctrine\ORM\PersistentCollection {#4125 …}
    +reports: Doctrine\ORM\PersistentCollection {#4132 …}
    +favourites: Doctrine\ORM\PersistentCollection {#4134 …}
    +notifications: Doctrine\ORM\PersistentCollection {#4136 …}
    -id: 273514
    -bodyTs: "'algorythm':73 'attack':5,40 'b':21 'basic':62 'brute':34 'byte':19,52 'c':23 'decrypt':15 'easi':8 'encrypt':70 'exact':48 'find':42 'forc':35 'format':68 'get':6 'help':32 'hybrid':39 'key':45 'know':11 'locat':26,55 'luk':46 'marker':60 'master':44 'mean':2 'plus':56 'say':63 'specif':51,54 'well':37 'x':27 'y':28 'z':30"
    +ranking: 0
    +commentCount: 0
    +upVotes: 0
    +downVotes: 0
    +visibility: "visible             "
    +apId: "https://sh.itjust.works/comment/7005338"
    +editedAt: DateTimeImmutable @1710914600 {#4118
      date: 2024-03-20 07:03:20.0 +01:00
    }
    +createdAt: DateTimeImmutable @1704205462 {#4116
      date: 2024-01-02 15:24:22.0 +01:00
    }
  }
  +root: App\Entity\EntryComment {#4032}
  +body: "Interesting. But is that issue not mitigated by using a good passphrase ? Been using luks as default for years. Any better option for full disk encryption on Linux ?"
  +lang: "en"
  +isAdult: false
  +favouriteCount: 0
  +score: 0
  +lastActive: DateTime @1704216167 {#4148
    date: 2024-01-02 18:22:47.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@HulkSmashBurgers@reddthat.com"
    "@lurch@sh.itjust.works"
    "@LoveSausage@lemmy.ml"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4145 …}
  +nested: Doctrine\ORM\PersistentCollection {#4142 …}
  +votes: Doctrine\ORM\PersistentCollection {#4140 …}
  +reports: Doctrine\ORM\PersistentCollection {#4154 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4156 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4158 …}
  -id: 273995
  -bodyTs: "'better':21 'default':17 'disk':25 'encrypt':26 'full':24 'good':11 'interest':1 'issu':5 'linux':28 'luk':15 'mitig':7 'option':22 'passphras':12 'use':9,14 'year':19"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://lemmy.ml/comment/7014080"
  +editedAt: null
  +createdAt: DateTimeImmutable @1704216167 {#4151
    date: 2024-01-02 18:22:47.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
25 DENIED ROLE_USER
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
26 DENIED moderate
App\Entity\EntryComment {#4175
  +user: App\Entity\User {#3980 …}
  +entry: App\Entity\Entry {#2396
    +user: Proxies\__CG__\App\Entity\User {#1960 …}
    +magazine: App\Entity\Magazine {#261
      +icon: null
      +name: "guix@lemmy.ml"
      +title: "guix"
      +description: "Guix is an advanced distribution of the GNU operating system developed by the GNU Project"
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 10
      +entryCommentCount: 8
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1727743868 {#269
        date: 2024-10-01 02:51:08.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#248 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#244 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#233 …}
      +entries: Doctrine\ORM\PersistentCollection {#191 …}
      +posts: Doctrine\ORM\PersistentCollection {#149 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#211 …}
      +bans: Doctrine\ORM\PersistentCollection {#128 …}
      +reports: Doctrine\ORM\PersistentCollection {#114 …}
      +badges: Doctrine\ORM\PersistentCollection {#92 …}
      +logs: Doctrine\ORM\PersistentCollection {#82 …}
      +awards: Doctrine\ORM\PersistentCollection {#71 …}
      +categories: Doctrine\ORM\PersistentCollection {#1830 …}
      -id: 118
      +apId: "guix@lemmy.ml"
      +apProfileId: "https://lemmy.ml/c/guix"
      +apPublicUrl: "https://lemmy.ml/c/guix"
      +apFollowersUrl: "https://lemmy.ml/c/guix/followers"
      +apInboxUrl: "https://lemmy.ml/inbox"
      +apDomain: "lemmy.ml"
      +apPreferredUsername: "guix"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703436704 {#267
        date: 2023-12-24 17:51:44.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703436703 {#275
        date: 2023-12-24 17:51:43.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1876 …}
    +slug: "How-to-luks-encrypt-raid-drive"
    +title: "How to luks encrypt raid drive?"
    +url: null
    +body: """
      Edit: Turns out for what I’m trying to do (mount luks encrypted raid after start up) only needs the device mapping for the raid drive and not a file-system object.\n
      \n
      So I luks encrypted the raid and call a script to open the vault and mount it when I need to.\n
      \n
      ---\n
      \n
      In my system config file I added a raid drive like so:\n
      \n
      ```\n
      \n
      <span style="color:#323232;">(mapped-devices (list (mapped-device\n
      </span><span style="color:#323232;">                                     (source (uuid\n
      </span><span style="color:#323232;">                                                  "205e5caa-694f-4457-a2a1-8affa3536e75"))\n
      </span><span style="color:#323232;">                                     (target "guix")\n
      </span><span style="color:#323232;">                                     (type luks-device-mapping))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">                                  (mapped-device\n
      </span><span style="color:#323232;">                                     (source (list "/dev/sdb1" "/dev/sdc1"))\n
      </span><span style="color:#323232;">                                     (target "/dev/md0")\n
      </span><span style="color:#323232;">                                     (type raid-device-mapping))))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">(file-systems (cons* (file-system\n
      </span><span style="color:#323232;">                                  (mount-point "/")\n
      </span><span style="color:#323232;">                                  (device "/dev/mapper/guix")\n
      </span><span style="color:#323232;">                                  (type "ext4")\n
      </span><span style="color:#323232;">                                  (dependencies (list (list-ref mapped-devices 0))))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">                               (file-system\n
      </span><span style="color:#323232;">                                  (mount-point "/mnt/nas")\n
      </span><span style="color:#323232;">                                  (device "/dev/md0")\n
      </span><span style="color:#323232;">                                  (type "ext4")\n
      </span><span style="color:#323232;">                                  (mount? #f)\n
      </span><span style="color:#323232;">                                  (dependencies (list (list-ref mapped-devices 1)))) %base-file-systems)))\n
      </span>\n
      ```\n
      \n
      I’d now like to luks encrypt the raid drive but I’m not sure how to go about doing it. Do I simply make a another mapped-device object, specifying the raid drive uuid and “/dev/md0” as the target:\n
      \n
      ```\n
      \n
      <span style="color:#323232;">(mapped-device\n
      </span><span style="color:#323232;">   (source (uuid\n
      </span><span style="color:#323232;">                {raid uuid}))\n
      </span><span style="color:#323232;">                (target "/dev/md0")\n
      </span><span style="color:#323232;">                (type luks-device-mapping))\n
      </span>\n
      ```\n
      \n
      and then pass that as a dependency to the raid file system object?\n
      \n
      Thanks
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 6
    +favouriteCount: 7
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1711060515 {#1815
      date: 2024-03-21 23:35:15.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1916 …}
    +votes: Doctrine\ORM\PersistentCollection {#1974 …}
    +reports: Doctrine\ORM\PersistentCollection {#1837 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1936 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2429 …}
    +badges: Doctrine\ORM\PersistentCollection {#2424 …}
    +children: []
    -id: 26622
    -titleTs: "'drive':6 'encrypt':4 'luk':3 'raid':5"
    -bodyTs: "'/dev/mapper/guix':116 '/dev/md0':99,136,191,203 '/dev/sdb1':96 '/dev/sdc1':97 '/mnt/nas':134 '0':127 '1':149 '205e5':76 '4457':80 '694f':79 '8affa3536e75':83 'a2a1':82 'a2a1-8affa3536e75':81 'ad':61 'anoth':180 'base':151 'base-file-system':150 'caa':78 'caa-694f':77 'call':41 'con':108 'config':58 'd':155 'depend':119,141,215 'devic':21,69,73,89,93,103,115,126,135,148,183,197,207 'drive':26,64,163,188 'edit':1 'encrypt':13,37,160 'ext4':118,138 'f':140 'file':31,59,106,110,129,152,219 'file-system':30,105,109,128 'go':171 'guix':85 'like':65,157 'list':70,95,120,122,142,144 'list-ref':121,143 'luk':12,36,88,159,206 'luks-device-map':87,205 'm':7,166 'make':178 'map':22,68,72,90,92,104,125,147,182,196,208 'mapped-devic':67,71,91,124,146,181,195 'mount':11,49,113,132,139 'mount-point':112,131 'need':19,53 'object':33,184,221 'open':45 'pass':211 'point':114,133 'raid':14,25,39,63,102,162,187,200,218 'raid-device-map':101 'ref':123,145 'script':43 'simpli':177 'sourc':74,94,198 'specifi':185 'start':16 'sure':168 'system':32,57,107,111,130,153,220 'target':84,98,194,202 'thank':222 'tri':8 'turn':2 'type':86,100,117,137,204 'uuid':75,189,199,201 'vault':47"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1704181768
    +visibility: "visible             "
    +apId: "https://reddthat.com/post/11036859"
    +editedAt: DateTimeImmutable @1712607909 {#1813
      date: 2024-04-08 22:25:09.0 +02:00
    }
    +createdAt: DateTimeImmutable @1704144268 {#1802
      date: 2024-01-01 22:24:28.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#261}
  +image: null
  +parent: App\Entity\EntryComment {#4153
    +user: Proxies\__CG__\App\Entity\User {#4101 …}
    +entry: App\Entity\Entry {#2396}
    +magazine: App\Entity\Magazine {#261}
    +image: null
    +parent: App\Entity\EntryComment {#4124
      +user: App\Entity\User {#3980 …}
      +entry: App\Entity\Entry {#2396}
      +magazine: App\Entity\Magazine {#261}
      +image: null
      +parent: App\Entity\EntryComment {#4102
        +user: Proxies\__CG__\App\Entity\User {#4101 …}
        +entry: App\Entity\Entry {#2396}
        +magazine: App\Entity\Magazine {#261}
        +image: null
        +parent: App\Entity\EntryComment {#4032
          +user: App\Entity\User {#3980 …}
          +entry: App\Entity\Entry {#2396}
          +magazine: App\Entity\Magazine {#261}
          +image: null
          +parent: null
          +root: null
          +body: "You sure you want to use LUKS? It has a specific format that can be probed for almost like a known plain text."
          +lang: "en"
          +isAdult: false
          +favouriteCount: 1
          +score: 0
          +lastActive: DateTime @1711060515 {#4041
            date: 2024-03-21 23:35:15.0 +01:00
          }
          +ip: null
          +tags: null
          +mentions: [
            "@HulkSmashBurgers@reddthat.com"
          ]
          +children: Doctrine\ORM\PersistentCollection {#4030 …}
          +nested: Doctrine\ORM\PersistentCollection {#4028 …}
          +votes: Doctrine\ORM\PersistentCollection {#4026 …}
          +reports: Doctrine\ORM\PersistentCollection {#4024 …}
          +favourites: Doctrine\ORM\PersistentCollection {#3992 …}
          +notifications: Doctrine\ORM\PersistentCollection {#3996 …}
          -id: 271876
          -bodyTs: "'almost':18 'format':12 'known':21 'like':19 'luk':7 'plain':22 'probe':16 'specif':11 'sure':2 'text':23 'use':6 'want':4"
          +ranking: 0
          +commentCount: 0
          +upVotes: 0
          +downVotes: 0
          +visibility: "visible             "
          +apId: "https://sh.itjust.works/comment/6990747"
          +editedAt: null
          +createdAt: DateTimeImmutable @1704145891 {#3977
            date: 2024-01-01 22:51:31.0 +01:00
          }
        }
        +root: App\Entity\EntryComment {#4032}
        +body: "[devicetests.com/secure-luks-encryption](https://devicetests.com/secure-luks-encryption) had to Google that, if you want to brute force your way into a modern like setup you either need a weak password or a very powerful computer and time/money… or do you mean something else?"
        +lang: "en"
        +isAdult: false
        +favouriteCount: 1
        +score: 0
        +lastActive: DateTime @1704183585 {#4043
          date: 2024-01-02 09:19:45.0 +01:00
        }
        +ip: null
        +tags: null
        +mentions: [
          "@HulkSmashBurgers@reddthat.com"
          "@lurch@sh.itjust.works"
        ]
        +children: Doctrine\ORM\PersistentCollection {#4103 …}
        +nested: Doctrine\ORM\PersistentCollection {#4105 …}
        +votes: Doctrine\ORM\PersistentCollection {#4107 …}
        +reports: Doctrine\ORM\PersistentCollection {#4109 …}
        +favourites: Doctrine\ORM\PersistentCollection {#4111 …}
        +notifications: Doctrine\ORM\PersistentCollection {#4113 …}
        -id: 272678
        -bodyTs: "'/secure-luks-encryption](https://devicetests.com/secure-luks-encryption)':3 'brute':12 'comput':31 'devicetests.com':2 'devicetests.com/secure-luks-encryption](https://devicetests.com/secure-luks-encryption)':1 'either':22 'els':39 'forc':13 'googl':6 'like':19 'mean':37 'modern':18 'need':23 'password':26 'power':30 'setup':20 'someth':38 'time/money':33 'want':10 'way':15 'weak':25"
        +ranking: 0
        +commentCount: 0
        +upVotes: 0
        +downVotes: 0
        +visibility: "visible             "
        +apId: "https://lemmy.ml/comment/7006739"
        +editedAt: null
        +createdAt: DateTimeImmutable @1704183585 {#4042
          date: 2024-01-02 09:19:45.0 +01:00
        }
      }
      +root: App\Entity\EntryComment {#4032}
      +body: """
        I mean that any attack gets more easy when you know, after it’s decrypted there are the bytes A, B and C at the locations X, Y and Z. It helps with brute force as well as hybrid attacks to find the master key.\n
        \n
        LUKS does exactly have those specific Bytes at specific locations PLUS it has a marker that basically says “I am in this format and encrypted with this algorythm”.
        """
      +lang: "en"
      +isAdult: false
      +favouriteCount: 0
      +score: 0
      +lastActive: DateTime @1704205462 {#4121
        date: 2024-01-02 15:24:22.0 +01:00
      }
      +ip: null
      +tags: null
      +mentions: [
        "@HulkSmashBurgers@reddthat.com"
        "@lurch@sh.itjust.works"
        "@LoveSausage@lemmy.ml"
        "@HulkSmashBurgers@reddthat.com"
        "@lurch@sh.itjust.works"
        "@LoveSausage@lemmy.ml"
      ]
      +children: Doctrine\ORM\PersistentCollection {#4127 …}
      +nested: Doctrine\ORM\PersistentCollection {#4129 …}
      +votes: Doctrine\ORM\PersistentCollection {#4125 …}
      +reports: Doctrine\ORM\PersistentCollection {#4132 …}
      +favourites: Doctrine\ORM\PersistentCollection {#4134 …}
      +notifications: Doctrine\ORM\PersistentCollection {#4136 …}
      -id: 273514
      -bodyTs: "'algorythm':73 'attack':5,40 'b':21 'basic':62 'brute':34 'byte':19,52 'c':23 'decrypt':15 'easi':8 'encrypt':70 'exact':48 'find':42 'forc':35 'format':68 'get':6 'help':32 'hybrid':39 'key':45 'know':11 'locat':26,55 'luk':46 'marker':60 'master':44 'mean':2 'plus':56 'say':63 'specif':51,54 'well':37 'x':27 'y':28 'z':30"
      +ranking: 0
      +commentCount: 0
      +upVotes: 0
      +downVotes: 0
      +visibility: "visible             "
      +apId: "https://sh.itjust.works/comment/7005338"
      +editedAt: DateTimeImmutable @1710914600 {#4118
        date: 2024-03-20 07:03:20.0 +01:00
      }
      +createdAt: DateTimeImmutable @1704205462 {#4116
        date: 2024-01-02 15:24:22.0 +01:00
      }
    }
    +root: App\Entity\EntryComment {#4032}
    +body: "Interesting. But is that issue not mitigated by using a good passphrase ? Been using luks as default for years. Any better option for full disk encryption on Linux ?"
    +lang: "en"
    +isAdult: false
    +favouriteCount: 0
    +score: 0
    +lastActive: DateTime @1704216167 {#4148
      date: 2024-01-02 18:22:47.0 +01:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@HulkSmashBurgers@reddthat.com"
      "@lurch@sh.itjust.works"
      "@LoveSausage@lemmy.ml"
    ]
    +children: Doctrine\ORM\PersistentCollection {#4145 …}
    +nested: Doctrine\ORM\PersistentCollection {#4142 …}
    +votes: Doctrine\ORM\PersistentCollection {#4140 …}
    +reports: Doctrine\ORM\PersistentCollection {#4154 …}
    +favourites: Doctrine\ORM\PersistentCollection {#4156 …}
    +notifications: Doctrine\ORM\PersistentCollection {#4158 …}
    -id: 273995
    -bodyTs: "'better':21 'default':17 'disk':25 'encrypt':26 'full':24 'good':11 'interest':1 'issu':5 'linux':28 'luk':15 'mitig':7 'option':22 'passphras':12 'use':9,14 'year':19"
    +ranking: 0
    +commentCount: 0
    +upVotes: 0
    +downVotes: 0
    +visibility: "visible             "
    +apId: "https://lemmy.ml/comment/7014080"
    +editedAt: null
    +createdAt: DateTimeImmutable @1704216167 {#4151
      date: 2024-01-02 18:22:47.0 +01:00
    }
  }
  +root: App\Entity\EntryComment {#4032}
  +body: """
    A good pasphrase helps the same for non-LUKS, but they still don’t have that specific weakness.\n
    \n
    You can use cryptsetup without LUKS. However, something that starts to decrypt has to be unencryoted, so you can enter the password. Depending on how convenient it is for the user, it will leak some helpful info, like for example that the target is a valid file system that can be mounted or what cipher had been used.\n
    \n
    to conceal this, you’d have to enter all it does manually in a shell/script without history. You could also add a number of bytes to skip as a sort of extra password and fill the start with random bytes, so it’s harder to find the start of the payload that is peobably a file system.
    """
  +lang: "en"
  +isAdult: false
  +favouriteCount: 0
  +score: 0
  +lastActive: DateTime @1704238417 {#4170
    date: 2024-01-03 00:33:37.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@HulkSmashBurgers@reddthat.com"
    "@lurch@sh.itjust.works"
    "@LoveSausage@lemmy.ml"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4167 …}
  +nested: Doctrine\ORM\PersistentCollection {#4164 …}
  +votes: Doctrine\ORM\PersistentCollection {#4162 …}
  +reports: Doctrine\ORM\PersistentCollection {#4176 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4178 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4180 …}
  -id: 275040
  -bodyTs: "'add':98 'also':97 'byte':102,117 'cipher':74 'conceal':79 'conveni':45 'could':96 'cryptsetup':23 'd':82 'decrypt':31 'depend':42 'enter':39,85 'exampl':59 'extra':109 'file':66,133 'fill':112 'find':123 'good':2 'harder':121 'help':4,55 'histori':94 'howev':26 'info':56 'leak':53 'like':57 'luk':10,25 'manual':89 'mount':71 'non':9 'non-luk':8 'number':100 'pasphras':3 'password':41,110 'payload':128 'peobabl':131 'random':116 'shell/script':92 'skip':104 'someth':27 'sort':107 'specif':18 'start':29,114,125 'still':13 'system':67,134 'target':62 'unencryot':35 'use':22,77 'user':50 'valid':65 'weak':19 'without':24,93"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://sh.itjust.works/comment/7017568"
  +editedAt: null
  +createdAt: DateTimeImmutable @1704238417 {#4173
    date: 2024-01-03 00:33:37.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
27 DENIED edit
App\Entity\EntryComment {#4175
  +user: App\Entity\User {#3980 …}
  +entry: App\Entity\Entry {#2396
    +user: Proxies\__CG__\App\Entity\User {#1960 …}
    +magazine: App\Entity\Magazine {#261
      +icon: null
      +name: "guix@lemmy.ml"
      +title: "guix"
      +description: "Guix is an advanced distribution of the GNU operating system developed by the GNU Project"
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 10
      +entryCommentCount: 8
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1727743868 {#269
        date: 2024-10-01 02:51:08.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#248 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#244 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#233 …}
      +entries: Doctrine\ORM\PersistentCollection {#191 …}
      +posts: Doctrine\ORM\PersistentCollection {#149 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#211 …}
      +bans: Doctrine\ORM\PersistentCollection {#128 …}
      +reports: Doctrine\ORM\PersistentCollection {#114 …}
      +badges: Doctrine\ORM\PersistentCollection {#92 …}
      +logs: Doctrine\ORM\PersistentCollection {#82 …}
      +awards: Doctrine\ORM\PersistentCollection {#71 …}
      +categories: Doctrine\ORM\PersistentCollection {#1830 …}
      -id: 118
      +apId: "guix@lemmy.ml"
      +apProfileId: "https://lemmy.ml/c/guix"
      +apPublicUrl: "https://lemmy.ml/c/guix"
      +apFollowersUrl: "https://lemmy.ml/c/guix/followers"
      +apInboxUrl: "https://lemmy.ml/inbox"
      +apDomain: "lemmy.ml"
      +apPreferredUsername: "guix"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703436704 {#267
        date: 2023-12-24 17:51:44.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703436703 {#275
        date: 2023-12-24 17:51:43.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1876 …}
    +slug: "How-to-luks-encrypt-raid-drive"
    +title: "How to luks encrypt raid drive?"
    +url: null
    +body: """
      Edit: Turns out for what I’m trying to do (mount luks encrypted raid after start up) only needs the device mapping for the raid drive and not a file-system object.\n
      \n
      So I luks encrypted the raid and call a script to open the vault and mount it when I need to.\n
      \n
      ---\n
      \n
      In my system config file I added a raid drive like so:\n
      \n
      ```\n
      \n
      <span style="color:#323232;">(mapped-devices (list (mapped-device\n
      </span><span style="color:#323232;">                                     (source (uuid\n
      </span><span style="color:#323232;">                                                  "205e5caa-694f-4457-a2a1-8affa3536e75"))\n
      </span><span style="color:#323232;">                                     (target "guix")\n
      </span><span style="color:#323232;">                                     (type luks-device-mapping))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">                                  (mapped-device\n
      </span><span style="color:#323232;">                                     (source (list "/dev/sdb1" "/dev/sdc1"))\n
      </span><span style="color:#323232;">                                     (target "/dev/md0")\n
      </span><span style="color:#323232;">                                     (type raid-device-mapping))))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">(file-systems (cons* (file-system\n
      </span><span style="color:#323232;">                                  (mount-point "/")\n
      </span><span style="color:#323232;">                                  (device "/dev/mapper/guix")\n
      </span><span style="color:#323232;">                                  (type "ext4")\n
      </span><span style="color:#323232;">                                  (dependencies (list (list-ref mapped-devices 0))))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">                               (file-system\n
      </span><span style="color:#323232;">                                  (mount-point "/mnt/nas")\n
      </span><span style="color:#323232;">                                  (device "/dev/md0")\n
      </span><span style="color:#323232;">                                  (type "ext4")\n
      </span><span style="color:#323232;">                                  (mount? #f)\n
      </span><span style="color:#323232;">                                  (dependencies (list (list-ref mapped-devices 1)))) %base-file-systems)))\n
      </span>\n
      ```\n
      \n
      I’d now like to luks encrypt the raid drive but I’m not sure how to go about doing it. Do I simply make a another mapped-device object, specifying the raid drive uuid and “/dev/md0” as the target:\n
      \n
      ```\n
      \n
      <span style="color:#323232;">(mapped-device\n
      </span><span style="color:#323232;">   (source (uuid\n
      </span><span style="color:#323232;">                {raid uuid}))\n
      </span><span style="color:#323232;">                (target "/dev/md0")\n
      </span><span style="color:#323232;">                (type luks-device-mapping))\n
      </span>\n
      ```\n
      \n
      and then pass that as a dependency to the raid file system object?\n
      \n
      Thanks
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 6
    +favouriteCount: 7
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1711060515 {#1815
      date: 2024-03-21 23:35:15.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1916 …}
    +votes: Doctrine\ORM\PersistentCollection {#1974 …}
    +reports: Doctrine\ORM\PersistentCollection {#1837 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1936 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2429 …}
    +badges: Doctrine\ORM\PersistentCollection {#2424 …}
    +children: []
    -id: 26622
    -titleTs: "'drive':6 'encrypt':4 'luk':3 'raid':5"
    -bodyTs: "'/dev/mapper/guix':116 '/dev/md0':99,136,191,203 '/dev/sdb1':96 '/dev/sdc1':97 '/mnt/nas':134 '0':127 '1':149 '205e5':76 '4457':80 '694f':79 '8affa3536e75':83 'a2a1':82 'a2a1-8affa3536e75':81 'ad':61 'anoth':180 'base':151 'base-file-system':150 'caa':78 'caa-694f':77 'call':41 'con':108 'config':58 'd':155 'depend':119,141,215 'devic':21,69,73,89,93,103,115,126,135,148,183,197,207 'drive':26,64,163,188 'edit':1 'encrypt':13,37,160 'ext4':118,138 'f':140 'file':31,59,106,110,129,152,219 'file-system':30,105,109,128 'go':171 'guix':85 'like':65,157 'list':70,95,120,122,142,144 'list-ref':121,143 'luk':12,36,88,159,206 'luks-device-map':87,205 'm':7,166 'make':178 'map':22,68,72,90,92,104,125,147,182,196,208 'mapped-devic':67,71,91,124,146,181,195 'mount':11,49,113,132,139 'mount-point':112,131 'need':19,53 'object':33,184,221 'open':45 'pass':211 'point':114,133 'raid':14,25,39,63,102,162,187,200,218 'raid-device-map':101 'ref':123,145 'script':43 'simpli':177 'sourc':74,94,198 'specifi':185 'start':16 'sure':168 'system':32,57,107,111,130,153,220 'target':84,98,194,202 'thank':222 'tri':8 'turn':2 'type':86,100,117,137,204 'uuid':75,189,199,201 'vault':47"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1704181768
    +visibility: "visible             "
    +apId: "https://reddthat.com/post/11036859"
    +editedAt: DateTimeImmutable @1712607909 {#1813
      date: 2024-04-08 22:25:09.0 +02:00
    }
    +createdAt: DateTimeImmutable @1704144268 {#1802
      date: 2024-01-01 22:24:28.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#261}
  +image: null
  +parent: App\Entity\EntryComment {#4153
    +user: Proxies\__CG__\App\Entity\User {#4101 …}
    +entry: App\Entity\Entry {#2396}
    +magazine: App\Entity\Magazine {#261}
    +image: null
    +parent: App\Entity\EntryComment {#4124
      +user: App\Entity\User {#3980 …}
      +entry: App\Entity\Entry {#2396}
      +magazine: App\Entity\Magazine {#261}
      +image: null
      +parent: App\Entity\EntryComment {#4102
        +user: Proxies\__CG__\App\Entity\User {#4101 …}
        +entry: App\Entity\Entry {#2396}
        +magazine: App\Entity\Magazine {#261}
        +image: null
        +parent: App\Entity\EntryComment {#4032
          +user: App\Entity\User {#3980 …}
          +entry: App\Entity\Entry {#2396}
          +magazine: App\Entity\Magazine {#261}
          +image: null
          +parent: null
          +root: null
          +body: "You sure you want to use LUKS? It has a specific format that can be probed for almost like a known plain text."
          +lang: "en"
          +isAdult: false
          +favouriteCount: 1
          +score: 0
          +lastActive: DateTime @1711060515 {#4041
            date: 2024-03-21 23:35:15.0 +01:00
          }
          +ip: null
          +tags: null
          +mentions: [
            "@HulkSmashBurgers@reddthat.com"
          ]
          +children: Doctrine\ORM\PersistentCollection {#4030 …}
          +nested: Doctrine\ORM\PersistentCollection {#4028 …}
          +votes: Doctrine\ORM\PersistentCollection {#4026 …}
          +reports: Doctrine\ORM\PersistentCollection {#4024 …}
          +favourites: Doctrine\ORM\PersistentCollection {#3992 …}
          +notifications: Doctrine\ORM\PersistentCollection {#3996 …}
          -id: 271876
          -bodyTs: "'almost':18 'format':12 'known':21 'like':19 'luk':7 'plain':22 'probe':16 'specif':11 'sure':2 'text':23 'use':6 'want':4"
          +ranking: 0
          +commentCount: 0
          +upVotes: 0
          +downVotes: 0
          +visibility: "visible             "
          +apId: "https://sh.itjust.works/comment/6990747"
          +editedAt: null
          +createdAt: DateTimeImmutable @1704145891 {#3977
            date: 2024-01-01 22:51:31.0 +01:00
          }
        }
        +root: App\Entity\EntryComment {#4032}
        +body: "[devicetests.com/secure-luks-encryption](https://devicetests.com/secure-luks-encryption) had to Google that, if you want to brute force your way into a modern like setup you either need a weak password or a very powerful computer and time/money… or do you mean something else?"
        +lang: "en"
        +isAdult: false
        +favouriteCount: 1
        +score: 0
        +lastActive: DateTime @1704183585 {#4043
          date: 2024-01-02 09:19:45.0 +01:00
        }
        +ip: null
        +tags: null
        +mentions: [
          "@HulkSmashBurgers@reddthat.com"
          "@lurch@sh.itjust.works"
        ]
        +children: Doctrine\ORM\PersistentCollection {#4103 …}
        +nested: Doctrine\ORM\PersistentCollection {#4105 …}
        +votes: Doctrine\ORM\PersistentCollection {#4107 …}
        +reports: Doctrine\ORM\PersistentCollection {#4109 …}
        +favourites: Doctrine\ORM\PersistentCollection {#4111 …}
        +notifications: Doctrine\ORM\PersistentCollection {#4113 …}
        -id: 272678
        -bodyTs: "'/secure-luks-encryption](https://devicetests.com/secure-luks-encryption)':3 'brute':12 'comput':31 'devicetests.com':2 'devicetests.com/secure-luks-encryption](https://devicetests.com/secure-luks-encryption)':1 'either':22 'els':39 'forc':13 'googl':6 'like':19 'mean':37 'modern':18 'need':23 'password':26 'power':30 'setup':20 'someth':38 'time/money':33 'want':10 'way':15 'weak':25"
        +ranking: 0
        +commentCount: 0
        +upVotes: 0
        +downVotes: 0
        +visibility: "visible             "
        +apId: "https://lemmy.ml/comment/7006739"
        +editedAt: null
        +createdAt: DateTimeImmutable @1704183585 {#4042
          date: 2024-01-02 09:19:45.0 +01:00
        }
      }
      +root: App\Entity\EntryComment {#4032}
      +body: """
        I mean that any attack gets more easy when you know, after it’s decrypted there are the bytes A, B and C at the locations X, Y and Z. It helps with brute force as well as hybrid attacks to find the master key.\n
        \n
        LUKS does exactly have those specific Bytes at specific locations PLUS it has a marker that basically says “I am in this format and encrypted with this algorythm”.
        """
      +lang: "en"
      +isAdult: false
      +favouriteCount: 0
      +score: 0
      +lastActive: DateTime @1704205462 {#4121
        date: 2024-01-02 15:24:22.0 +01:00
      }
      +ip: null
      +tags: null
      +mentions: [
        "@HulkSmashBurgers@reddthat.com"
        "@lurch@sh.itjust.works"
        "@LoveSausage@lemmy.ml"
        "@HulkSmashBurgers@reddthat.com"
        "@lurch@sh.itjust.works"
        "@LoveSausage@lemmy.ml"
      ]
      +children: Doctrine\ORM\PersistentCollection {#4127 …}
      +nested: Doctrine\ORM\PersistentCollection {#4129 …}
      +votes: Doctrine\ORM\PersistentCollection {#4125 …}
      +reports: Doctrine\ORM\PersistentCollection {#4132 …}
      +favourites: Doctrine\ORM\PersistentCollection {#4134 …}
      +notifications: Doctrine\ORM\PersistentCollection {#4136 …}
      -id: 273514
      -bodyTs: "'algorythm':73 'attack':5,40 'b':21 'basic':62 'brute':34 'byte':19,52 'c':23 'decrypt':15 'easi':8 'encrypt':70 'exact':48 'find':42 'forc':35 'format':68 'get':6 'help':32 'hybrid':39 'key':45 'know':11 'locat':26,55 'luk':46 'marker':60 'master':44 'mean':2 'plus':56 'say':63 'specif':51,54 'well':37 'x':27 'y':28 'z':30"
      +ranking: 0
      +commentCount: 0
      +upVotes: 0
      +downVotes: 0
      +visibility: "visible             "
      +apId: "https://sh.itjust.works/comment/7005338"
      +editedAt: DateTimeImmutable @1710914600 {#4118
        date: 2024-03-20 07:03:20.0 +01:00
      }
      +createdAt: DateTimeImmutable @1704205462 {#4116
        date: 2024-01-02 15:24:22.0 +01:00
      }
    }
    +root: App\Entity\EntryComment {#4032}
    +body: "Interesting. But is that issue not mitigated by using a good passphrase ? Been using luks as default for years. Any better option for full disk encryption on Linux ?"
    +lang: "en"
    +isAdult: false
    +favouriteCount: 0
    +score: 0
    +lastActive: DateTime @1704216167 {#4148
      date: 2024-01-02 18:22:47.0 +01:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@HulkSmashBurgers@reddthat.com"
      "@lurch@sh.itjust.works"
      "@LoveSausage@lemmy.ml"
    ]
    +children: Doctrine\ORM\PersistentCollection {#4145 …}
    +nested: Doctrine\ORM\PersistentCollection {#4142 …}
    +votes: Doctrine\ORM\PersistentCollection {#4140 …}
    +reports: Doctrine\ORM\PersistentCollection {#4154 …}
    +favourites: Doctrine\ORM\PersistentCollection {#4156 …}
    +notifications: Doctrine\ORM\PersistentCollection {#4158 …}
    -id: 273995
    -bodyTs: "'better':21 'default':17 'disk':25 'encrypt':26 'full':24 'good':11 'interest':1 'issu':5 'linux':28 'luk':15 'mitig':7 'option':22 'passphras':12 'use':9,14 'year':19"
    +ranking: 0
    +commentCount: 0
    +upVotes: 0
    +downVotes: 0
    +visibility: "visible             "
    +apId: "https://lemmy.ml/comment/7014080"
    +editedAt: null
    +createdAt: DateTimeImmutable @1704216167 {#4151
      date: 2024-01-02 18:22:47.0 +01:00
    }
  }
  +root: App\Entity\EntryComment {#4032}
  +body: """
    A good pasphrase helps the same for non-LUKS, but they still don’t have that specific weakness.\n
    \n
    You can use cryptsetup without LUKS. However, something that starts to decrypt has to be unencryoted, so you can enter the password. Depending on how convenient it is for the user, it will leak some helpful info, like for example that the target is a valid file system that can be mounted or what cipher had been used.\n
    \n
    to conceal this, you’d have to enter all it does manually in a shell/script without history. You could also add a number of bytes to skip as a sort of extra password and fill the start with random bytes, so it’s harder to find the start of the payload that is peobably a file system.
    """
  +lang: "en"
  +isAdult: false
  +favouriteCount: 0
  +score: 0
  +lastActive: DateTime @1704238417 {#4170
    date: 2024-01-03 00:33:37.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@HulkSmashBurgers@reddthat.com"
    "@lurch@sh.itjust.works"
    "@LoveSausage@lemmy.ml"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4167 …}
  +nested: Doctrine\ORM\PersistentCollection {#4164 …}
  +votes: Doctrine\ORM\PersistentCollection {#4162 …}
  +reports: Doctrine\ORM\PersistentCollection {#4176 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4178 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4180 …}
  -id: 275040
  -bodyTs: "'add':98 'also':97 'byte':102,117 'cipher':74 'conceal':79 'conveni':45 'could':96 'cryptsetup':23 'd':82 'decrypt':31 'depend':42 'enter':39,85 'exampl':59 'extra':109 'file':66,133 'fill':112 'find':123 'good':2 'harder':121 'help':4,55 'histori':94 'howev':26 'info':56 'leak':53 'like':57 'luk':10,25 'manual':89 'mount':71 'non':9 'non-luk':8 'number':100 'pasphras':3 'password':41,110 'payload':128 'peobabl':131 'random':116 'shell/script':92 'skip':104 'someth':27 'sort':107 'specif':18 'start':29,114,125 'still':13 'system':67,134 'target':62 'unencryot':35 'use':22,77 'user':50 'valid':65 'weak':19 'without':24,93"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://sh.itjust.works/comment/7017568"
  +editedAt: null
  +createdAt: DateTimeImmutable @1704238417 {#4173
    date: 2024-01-03 00:33:37.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
28 DENIED moderate
App\Entity\EntryComment {#4175
  +user: App\Entity\User {#3980 …}
  +entry: App\Entity\Entry {#2396
    +user: Proxies\__CG__\App\Entity\User {#1960 …}
    +magazine: App\Entity\Magazine {#261
      +icon: null
      +name: "guix@lemmy.ml"
      +title: "guix"
      +description: "Guix is an advanced distribution of the GNU operating system developed by the GNU Project"
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 10
      +entryCommentCount: 8
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1727743868 {#269
        date: 2024-10-01 02:51:08.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#248 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#244 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#233 …}
      +entries: Doctrine\ORM\PersistentCollection {#191 …}
      +posts: Doctrine\ORM\PersistentCollection {#149 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#211 …}
      +bans: Doctrine\ORM\PersistentCollection {#128 …}
      +reports: Doctrine\ORM\PersistentCollection {#114 …}
      +badges: Doctrine\ORM\PersistentCollection {#92 …}
      +logs: Doctrine\ORM\PersistentCollection {#82 …}
      +awards: Doctrine\ORM\PersistentCollection {#71 …}
      +categories: Doctrine\ORM\PersistentCollection {#1830 …}
      -id: 118
      +apId: "guix@lemmy.ml"
      +apProfileId: "https://lemmy.ml/c/guix"
      +apPublicUrl: "https://lemmy.ml/c/guix"
      +apFollowersUrl: "https://lemmy.ml/c/guix/followers"
      +apInboxUrl: "https://lemmy.ml/inbox"
      +apDomain: "lemmy.ml"
      +apPreferredUsername: "guix"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703436704 {#267
        date: 2023-12-24 17:51:44.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703436703 {#275
        date: 2023-12-24 17:51:43.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1876 …}
    +slug: "How-to-luks-encrypt-raid-drive"
    +title: "How to luks encrypt raid drive?"
    +url: null
    +body: """
      Edit: Turns out for what I’m trying to do (mount luks encrypted raid after start up) only needs the device mapping for the raid drive and not a file-system object.\n
      \n
      So I luks encrypted the raid and call a script to open the vault and mount it when I need to.\n
      \n
      ---\n
      \n
      In my system config file I added a raid drive like so:\n
      \n
      ```\n
      \n
      <span style="color:#323232;">(mapped-devices (list (mapped-device\n
      </span><span style="color:#323232;">                                     (source (uuid\n
      </span><span style="color:#323232;">                                                  "205e5caa-694f-4457-a2a1-8affa3536e75"))\n
      </span><span style="color:#323232;">                                     (target "guix")\n
      </span><span style="color:#323232;">                                     (type luks-device-mapping))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">                                  (mapped-device\n
      </span><span style="color:#323232;">                                     (source (list "/dev/sdb1" "/dev/sdc1"))\n
      </span><span style="color:#323232;">                                     (target "/dev/md0")\n
      </span><span style="color:#323232;">                                     (type raid-device-mapping))))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">(file-systems (cons* (file-system\n
      </span><span style="color:#323232;">                                  (mount-point "/")\n
      </span><span style="color:#323232;">                                  (device "/dev/mapper/guix")\n
      </span><span style="color:#323232;">                                  (type "ext4")\n
      </span><span style="color:#323232;">                                  (dependencies (list (list-ref mapped-devices 0))))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">                               (file-system\n
      </span><span style="color:#323232;">                                  (mount-point "/mnt/nas")\n
      </span><span style="color:#323232;">                                  (device "/dev/md0")\n
      </span><span style="color:#323232;">                                  (type "ext4")\n
      </span><span style="color:#323232;">                                  (mount? #f)\n
      </span><span style="color:#323232;">                                  (dependencies (list (list-ref mapped-devices 1)))) %base-file-systems)))\n
      </span>\n
      ```\n
      \n
      I’d now like to luks encrypt the raid drive but I’m not sure how to go about doing it. Do I simply make a another mapped-device object, specifying the raid drive uuid and “/dev/md0” as the target:\n
      \n
      ```\n
      \n
      <span style="color:#323232;">(mapped-device\n
      </span><span style="color:#323232;">   (source (uuid\n
      </span><span style="color:#323232;">                {raid uuid}))\n
      </span><span style="color:#323232;">                (target "/dev/md0")\n
      </span><span style="color:#323232;">                (type luks-device-mapping))\n
      </span>\n
      ```\n
      \n
      and then pass that as a dependency to the raid file system object?\n
      \n
      Thanks
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 6
    +favouriteCount: 7
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1711060515 {#1815
      date: 2024-03-21 23:35:15.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1916 …}
    +votes: Doctrine\ORM\PersistentCollection {#1974 …}
    +reports: Doctrine\ORM\PersistentCollection {#1837 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1936 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2429 …}
    +badges: Doctrine\ORM\PersistentCollection {#2424 …}
    +children: []
    -id: 26622
    -titleTs: "'drive':6 'encrypt':4 'luk':3 'raid':5"
    -bodyTs: "'/dev/mapper/guix':116 '/dev/md0':99,136,191,203 '/dev/sdb1':96 '/dev/sdc1':97 '/mnt/nas':134 '0':127 '1':149 '205e5':76 '4457':80 '694f':79 '8affa3536e75':83 'a2a1':82 'a2a1-8affa3536e75':81 'ad':61 'anoth':180 'base':151 'base-file-system':150 'caa':78 'caa-694f':77 'call':41 'con':108 'config':58 'd':155 'depend':119,141,215 'devic':21,69,73,89,93,103,115,126,135,148,183,197,207 'drive':26,64,163,188 'edit':1 'encrypt':13,37,160 'ext4':118,138 'f':140 'file':31,59,106,110,129,152,219 'file-system':30,105,109,128 'go':171 'guix':85 'like':65,157 'list':70,95,120,122,142,144 'list-ref':121,143 'luk':12,36,88,159,206 'luks-device-map':87,205 'm':7,166 'make':178 'map':22,68,72,90,92,104,125,147,182,196,208 'mapped-devic':67,71,91,124,146,181,195 'mount':11,49,113,132,139 'mount-point':112,131 'need':19,53 'object':33,184,221 'open':45 'pass':211 'point':114,133 'raid':14,25,39,63,102,162,187,200,218 'raid-device-map':101 'ref':123,145 'script':43 'simpli':177 'sourc':74,94,198 'specifi':185 'start':16 'sure':168 'system':32,57,107,111,130,153,220 'target':84,98,194,202 'thank':222 'tri':8 'turn':2 'type':86,100,117,137,204 'uuid':75,189,199,201 'vault':47"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1704181768
    +visibility: "visible             "
    +apId: "https://reddthat.com/post/11036859"
    +editedAt: DateTimeImmutable @1712607909 {#1813
      date: 2024-04-08 22:25:09.0 +02:00
    }
    +createdAt: DateTimeImmutable @1704144268 {#1802
      date: 2024-01-01 22:24:28.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#261}
  +image: null
  +parent: App\Entity\EntryComment {#4153
    +user: Proxies\__CG__\App\Entity\User {#4101 …}
    +entry: App\Entity\Entry {#2396}
    +magazine: App\Entity\Magazine {#261}
    +image: null
    +parent: App\Entity\EntryComment {#4124
      +user: App\Entity\User {#3980 …}
      +entry: App\Entity\Entry {#2396}
      +magazine: App\Entity\Magazine {#261}
      +image: null
      +parent: App\Entity\EntryComment {#4102
        +user: Proxies\__CG__\App\Entity\User {#4101 …}
        +entry: App\Entity\Entry {#2396}
        +magazine: App\Entity\Magazine {#261}
        +image: null
        +parent: App\Entity\EntryComment {#4032
          +user: App\Entity\User {#3980 …}
          +entry: App\Entity\Entry {#2396}
          +magazine: App\Entity\Magazine {#261}
          +image: null
          +parent: null
          +root: null
          +body: "You sure you want to use LUKS? It has a specific format that can be probed for almost like a known plain text."
          +lang: "en"
          +isAdult: false
          +favouriteCount: 1
          +score: 0
          +lastActive: DateTime @1711060515 {#4041
            date: 2024-03-21 23:35:15.0 +01:00
          }
          +ip: null
          +tags: null
          +mentions: [
            "@HulkSmashBurgers@reddthat.com"
          ]
          +children: Doctrine\ORM\PersistentCollection {#4030 …}
          +nested: Doctrine\ORM\PersistentCollection {#4028 …}
          +votes: Doctrine\ORM\PersistentCollection {#4026 …}
          +reports: Doctrine\ORM\PersistentCollection {#4024 …}
          +favourites: Doctrine\ORM\PersistentCollection {#3992 …}
          +notifications: Doctrine\ORM\PersistentCollection {#3996 …}
          -id: 271876
          -bodyTs: "'almost':18 'format':12 'known':21 'like':19 'luk':7 'plain':22 'probe':16 'specif':11 'sure':2 'text':23 'use':6 'want':4"
          +ranking: 0
          +commentCount: 0
          +upVotes: 0
          +downVotes: 0
          +visibility: "visible             "
          +apId: "https://sh.itjust.works/comment/6990747"
          +editedAt: null
          +createdAt: DateTimeImmutable @1704145891 {#3977
            date: 2024-01-01 22:51:31.0 +01:00
          }
        }
        +root: App\Entity\EntryComment {#4032}
        +body: "[devicetests.com/secure-luks-encryption](https://devicetests.com/secure-luks-encryption) had to Google that, if you want to brute force your way into a modern like setup you either need a weak password or a very powerful computer and time/money… or do you mean something else?"
        +lang: "en"
        +isAdult: false
        +favouriteCount: 1
        +score: 0
        +lastActive: DateTime @1704183585 {#4043
          date: 2024-01-02 09:19:45.0 +01:00
        }
        +ip: null
        +tags: null
        +mentions: [
          "@HulkSmashBurgers@reddthat.com"
          "@lurch@sh.itjust.works"
        ]
        +children: Doctrine\ORM\PersistentCollection {#4103 …}
        +nested: Doctrine\ORM\PersistentCollection {#4105 …}
        +votes: Doctrine\ORM\PersistentCollection {#4107 …}
        +reports: Doctrine\ORM\PersistentCollection {#4109 …}
        +favourites: Doctrine\ORM\PersistentCollection {#4111 …}
        +notifications: Doctrine\ORM\PersistentCollection {#4113 …}
        -id: 272678
        -bodyTs: "'/secure-luks-encryption](https://devicetests.com/secure-luks-encryption)':3 'brute':12 'comput':31 'devicetests.com':2 'devicetests.com/secure-luks-encryption](https://devicetests.com/secure-luks-encryption)':1 'either':22 'els':39 'forc':13 'googl':6 'like':19 'mean':37 'modern':18 'need':23 'password':26 'power':30 'setup':20 'someth':38 'time/money':33 'want':10 'way':15 'weak':25"
        +ranking: 0
        +commentCount: 0
        +upVotes: 0
        +downVotes: 0
        +visibility: "visible             "
        +apId: "https://lemmy.ml/comment/7006739"
        +editedAt: null
        +createdAt: DateTimeImmutable @1704183585 {#4042
          date: 2024-01-02 09:19:45.0 +01:00
        }
      }
      +root: App\Entity\EntryComment {#4032}
      +body: """
        I mean that any attack gets more easy when you know, after it’s decrypted there are the bytes A, B and C at the locations X, Y and Z. It helps with brute force as well as hybrid attacks to find the master key.\n
        \n
        LUKS does exactly have those specific Bytes at specific locations PLUS it has a marker that basically says “I am in this format and encrypted with this algorythm”.
        """
      +lang: "en"
      +isAdult: false
      +favouriteCount: 0
      +score: 0
      +lastActive: DateTime @1704205462 {#4121
        date: 2024-01-02 15:24:22.0 +01:00
      }
      +ip: null
      +tags: null
      +mentions: [
        "@HulkSmashBurgers@reddthat.com"
        "@lurch@sh.itjust.works"
        "@LoveSausage@lemmy.ml"
        "@HulkSmashBurgers@reddthat.com"
        "@lurch@sh.itjust.works"
        "@LoveSausage@lemmy.ml"
      ]
      +children: Doctrine\ORM\PersistentCollection {#4127 …}
      +nested: Doctrine\ORM\PersistentCollection {#4129 …}
      +votes: Doctrine\ORM\PersistentCollection {#4125 …}
      +reports: Doctrine\ORM\PersistentCollection {#4132 …}
      +favourites: Doctrine\ORM\PersistentCollection {#4134 …}
      +notifications: Doctrine\ORM\PersistentCollection {#4136 …}
      -id: 273514
      -bodyTs: "'algorythm':73 'attack':5,40 'b':21 'basic':62 'brute':34 'byte':19,52 'c':23 'decrypt':15 'easi':8 'encrypt':70 'exact':48 'find':42 'forc':35 'format':68 'get':6 'help':32 'hybrid':39 'key':45 'know':11 'locat':26,55 'luk':46 'marker':60 'master':44 'mean':2 'plus':56 'say':63 'specif':51,54 'well':37 'x':27 'y':28 'z':30"
      +ranking: 0
      +commentCount: 0
      +upVotes: 0
      +downVotes: 0
      +visibility: "visible             "
      +apId: "https://sh.itjust.works/comment/7005338"
      +editedAt: DateTimeImmutable @1710914600 {#4118
        date: 2024-03-20 07:03:20.0 +01:00
      }
      +createdAt: DateTimeImmutable @1704205462 {#4116
        date: 2024-01-02 15:24:22.0 +01:00
      }
    }
    +root: App\Entity\EntryComment {#4032}
    +body: "Interesting. But is that issue not mitigated by using a good passphrase ? Been using luks as default for years. Any better option for full disk encryption on Linux ?"
    +lang: "en"
    +isAdult: false
    +favouriteCount: 0
    +score: 0
    +lastActive: DateTime @1704216167 {#4148
      date: 2024-01-02 18:22:47.0 +01:00
    }
    +ip: null
    +tags: null
    +mentions: [
      "@HulkSmashBurgers@reddthat.com"
      "@lurch@sh.itjust.works"
      "@LoveSausage@lemmy.ml"
    ]
    +children: Doctrine\ORM\PersistentCollection {#4145 …}
    +nested: Doctrine\ORM\PersistentCollection {#4142 …}
    +votes: Doctrine\ORM\PersistentCollection {#4140 …}
    +reports: Doctrine\ORM\PersistentCollection {#4154 …}
    +favourites: Doctrine\ORM\PersistentCollection {#4156 …}
    +notifications: Doctrine\ORM\PersistentCollection {#4158 …}
    -id: 273995
    -bodyTs: "'better':21 'default':17 'disk':25 'encrypt':26 'full':24 'good':11 'interest':1 'issu':5 'linux':28 'luk':15 'mitig':7 'option':22 'passphras':12 'use':9,14 'year':19"
    +ranking: 0
    +commentCount: 0
    +upVotes: 0
    +downVotes: 0
    +visibility: "visible             "
    +apId: "https://lemmy.ml/comment/7014080"
    +editedAt: null
    +createdAt: DateTimeImmutable @1704216167 {#4151
      date: 2024-01-02 18:22:47.0 +01:00
    }
  }
  +root: App\Entity\EntryComment {#4032}
  +body: """
    A good pasphrase helps the same for non-LUKS, but they still don’t have that specific weakness.\n
    \n
    You can use cryptsetup without LUKS. However, something that starts to decrypt has to be unencryoted, so you can enter the password. Depending on how convenient it is for the user, it will leak some helpful info, like for example that the target is a valid file system that can be mounted or what cipher had been used.\n
    \n
    to conceal this, you’d have to enter all it does manually in a shell/script without history. You could also add a number of bytes to skip as a sort of extra password and fill the start with random bytes, so it’s harder to find the start of the payload that is peobably a file system.
    """
  +lang: "en"
  +isAdult: false
  +favouriteCount: 0
  +score: 0
  +lastActive: DateTime @1704238417 {#4170
    date: 2024-01-03 00:33:37.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@HulkSmashBurgers@reddthat.com"
    "@lurch@sh.itjust.works"
    "@LoveSausage@lemmy.ml"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4167 …}
  +nested: Doctrine\ORM\PersistentCollection {#4164 …}
  +votes: Doctrine\ORM\PersistentCollection {#4162 …}
  +reports: Doctrine\ORM\PersistentCollection {#4176 …}
  +favourites: Doctrine\ORM\PersistentCollection {#4178 …}
  +notifications: Doctrine\ORM\PersistentCollection {#4180 …}
  -id: 275040
  -bodyTs: "'add':98 'also':97 'byte':102,117 'cipher':74 'conceal':79 'conveni':45 'could':96 'cryptsetup':23 'd':82 'decrypt':31 'depend':42 'enter':39,85 'exampl':59 'extra':109 'file':66,133 'fill':112 'find':123 'good':2 'harder':121 'help':4,55 'histori':94 'howev':26 'info':56 'leak':53 'like':57 'luk':10,25 'manual':89 'mount':71 'non':9 'non-luk':8 'number':100 'pasphras':3 'password':41,110 'payload':128 'peobabl':131 'random':116 'shell/script':92 'skip':104 'someth':27 'sort':107 'specif':18 'start':29,114,125 'still':13 'system':67,134 'target':62 'unencryot':35 'use':22,77 'user':50 'valid':65 'weak':19 'without':24,93"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://sh.itjust.works/comment/7017568"
  +editedAt: null
  +createdAt: DateTimeImmutable @1704238417 {#4173
    date: 2024-01-03 00:33:37.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
29 DENIED edit
App\Entity\Magazine {#261
  +icon: null
  +name: "guix@lemmy.ml"
  +title: "guix"
  +description: "Guix is an advanced distribution of the GNU operating system developed by the GNU Project"
  +rules: null
  +subscriptionsCount: 1
  +entryCount: 10
  +entryCommentCount: 8
  +postCount: 0
  +postCommentCount: 0
  +isAdult: false
  +customCss: null
  +lastActive: DateTime @1727743868 {#269
    date: 2024-10-01 02:51:08.0 +02:00
  }
  +markedForDeletionAt: null
  +tags: null
  +moderators: Doctrine\ORM\PersistentCollection {#248 …}
  +ownershipRequests: Doctrine\ORM\PersistentCollection {#244 …}
  +moderatorRequests: Doctrine\ORM\PersistentCollection {#233 …}
  +entries: Doctrine\ORM\PersistentCollection {#191 …}
  +posts: Doctrine\ORM\PersistentCollection {#149 …}
  +subscriptions: Doctrine\ORM\PersistentCollection {#211 …}
  +bans: Doctrine\ORM\PersistentCollection {#128 …}
  +reports: Doctrine\ORM\PersistentCollection {#114 …}
  +badges: Doctrine\ORM\PersistentCollection {#92 …}
  +logs: Doctrine\ORM\PersistentCollection {#82 …}
  +awards: Doctrine\ORM\PersistentCollection {#71 …}
  +categories: Doctrine\ORM\PersistentCollection {#1830 …}
  -id: 118
  +apId: "guix@lemmy.ml"
  +apProfileId: "https://lemmy.ml/c/guix"
  +apPublicUrl: "https://lemmy.ml/c/guix"
  +apFollowersUrl: "https://lemmy.ml/c/guix/followers"
  +apInboxUrl: "https://lemmy.ml/inbox"
  +apDomain: "lemmy.ml"
  +apPreferredUsername: "guix"
  +apDiscoverable: true
  +apManuallyApprovesFollowers: null
  +privateKey: null
  +publicKey: null
  +apFetchedAt: DateTime @1703436704 {#267
    date: 2023-12-24 17:51:44.0 +01:00
  }
  +apDeletedAt: null
  +apTimeoutAt: null
  +visibility: "visible             "
  +createdAt: DateTimeImmutable @1703436703 {#275
    date: 2023-12-24 17:51:43.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS DENIED
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details