LOGO

Install TrueCrypt on Ubuntu Edgy Eft | Guide

December 22, 2006
Install TrueCrypt on Ubuntu Edgy Eft | Guide

TrueCrypt Installation and Usage on Ubuntu

TrueCrypt represents a robust, open-source solution for disk encryption, compatible with both Windows and Linux operating systems. However, the standard installer can encounter difficulties when deployed on Ubuntu Edgy. This guide provides a detailed walkthrough to facilitate a successful installation and utilization of TrueCrypt within this environment.

Installing TrueCrypt: A Step-by-Step Guide

Initially, the source code should be downloaded directly from the official downloads page. This is because the Debian package available for Ubuntu is often compiled for the 586 kernel architecture, whereas a 686 kernel is typically preferred. Consequently, a custom build is necessary.

Copy the downloaded archive to a directory of your choosing. The subsequent step involves installing essential software required for the build process. It’s possible that some or all of these packages are already present on your system.

sudo apt-get install build-essential dmsetup gawk linux-source linux-headers-`uname -r`

Ensure the backtick character (`) used in the command is the one located below the tilde (~) key on your keyboard. With the prerequisites installed, a small amount of preparatory work is required to ensure proper functionality.

cd /usr/src/

sudo bunzip2 linux-source-2.6.17.tar.bz2

sudo tar xvf linux-source-2.6.17.tar

sudo ln -s linux-source-2.6.17 linux

sudo make -d -C linux modules_prepare

This final command will initiate a lengthy process, displaying a considerable amount of output. You may be prompted to confirm one or two questions during this stage. This step is crucial to prevent potential errors later in the installation.

Return to the directory where you downloaded the TrueCrypt source code and extract the archive, which contains source files for both Windows and Linux.

tar xzvf truecrypt-4.2a-source-code.tar.gz

cd truecrypt-4.2a/Linux/

Given that TrueCrypt installs a kernel module, the build script must be executed with superuser privileges.

sudo ./build.sh

Upon successful completion, the installation script can be launched, confirming that all components have been built correctly.

sudo ./install.sh
Password:
Checking installation requirements...
Testing truecrypt... Done.
Install binaries to [/usr/bin]:
Install man page to [/usr/share/man]:
Install user guide and kernel module to [/usr/share/truecrypt]:
Allow non-admin users to run TrueCrypt [y/N]: Y
Installing kernel module... Done.
Installing truecrypt to /usr/bin... Done.
Installing man page to /usr/share/man/man1... Done.
Installing user guide to /usr/share/truecrypt/doc... Done.
Installing backup kernel module to /usr/share/truecrypt/kernel... Done.

Utilizing TrueCrypt: Common Scenarios

With TrueCrypt now successfully installed, users familiar with the software can resume their work. For those new to the application, several common use cases are outlined below.

Creating a TrueCrypt Volume

Creating a TrueCrypt volume can be achieved with a simple command: truecrypt -c <filename>. However, several command-line options offer greater control over the process.

truecrypt --size 200MB --type normal --encryption AES --hash RIPEMD-160 --filesystem FAT -c myvolume.tc

You will be prompted to enter and re-enter a password, and optionally specify a keyfile. TrueCrypt will then collect random data, prompting you to input at least 320 randomly chosen characters.

Mounting a TrueCrypt Volume

A directory must be created to serve as the mount point for the TrueCrypt volume. For example:

mkdir tcmount

truecrypt -u myvolume.tc tcmount

The -u option is essential for mounting the volume in user mode, granting write access.

Dismounting a TrueCrypt Volume

To dismount a TrueCrypt volume, use the following command:

truecrypt -d <mountpoint>

Verifying Volume Mount Status

The following command can be used to confirm whether a TrueCrypt volume is currently mounted:

geek@ubuntuServ:~$ df -m
Filesystem 1M-blocks Used Available Use% Mounted on
/dev/sda1 7698 1835 5472 26% /
varrun 78 1 78 1% /var/run
varlock 78 0 78 0% /var/lock
procbususb 10 1 10 1% /proc/bus/usb
udev 10 1 10 1% /dev
devshm 78 0 78 0% /dev/shm
/dev/mapper/truecrypt0 20 1 20 1% /home/geek/tcmount

As demonstrated, the mounted volume appears at the bottom of the list, associated with the tcmount directory.

Mounting Volumes on USB Devices

Mounting a volume located on a USB drive is as straightforward as mounting a regular volume. Simply provide the full path to the TrueCrypt volume on the USB drive and a desired mount point directory.

truecrypt -u /media/usbdisk/myvol.tc tcmount

#TrueCrypt#Ubuntu#Edgy Eft#install#encryption#security