So: if anybody were to clue me up regarding the boot process, how to use uBoot to install a custom kernel, and what to do if the install fails and the boot hangs, I will post a WD MyBook Live Disk Encryption HOWTO.
I'm still working on modules. Someone's beaten me to it though, see
here for a guide. menuconfig is running into dependency problems and make 44x/apollo_3G_nas_defconfig isn't going too well either.
I read someone was able to open the WB MyBook live.. I'd like to do but how (without broke something?)
thank you in advance!
regards
They're a much more careful man than I am if so. There's four small plastic clips which allow a snap fit assembly, I suspect for warranty returns they'll pull the casing off and fit a brand new one. As it is, it took me about half an hour to pry the thing apart, and I broke two out of the four tabs. It still fits back together quite securely, sitting on my shelf it's as if I never touched it. The casing doesn't fall off readily either.
@Subliminal changing to x86 looks pretty appealing to me too, it's certainly a faster & easier option. If I can get this damned thing to compile modules (and hopefully stop it using an unreadable ext4 fs) then it'll do pretty much anything I could ask of it. Albeit slowly.
edit; Removed a lot of error codes. I've given up on compiling on the nas and installed a crosscompiler on x86. This seems to be working, in that I have loop.ko built, installed and behaving itself. Next up is working out which of the many netfilter modules I'm interested in.
@John31, which encryption method do you want to get running?
Encfs works as soon as loop.ko is compiled, actually I was astonished by how smoothly the linked howto went.
Edit: A summary of
dm-crypt setup on this device:
Code:
# 1/ Build the following modules (I'm still crosscompiling from x86)
drivers/md/dm-crypt.ko
drivers/md/dm-mod.ko
# 2/ copy these modules to
/lib/modules/2.6.32.11-svn21605/kernel/drivers/md/
# 3/ install modules
/sbin/depmod -a && /sbin/modprobe -av dm-crypt dm-mod
# 4/ apt-get install cryptsetup #possibly some other things I already had installed as well
# 5/ Test
head -c 100M /dev/zero > luksfile # create empty file
losetup /dev/loop0 luksfile # map luksfile to /dev/loop0
cryptsetup luksFormat /dev/loop0 # create LUKS on loop device
cryptsetup luksOpen /dev/loop0 testing #Open the /dev/loop0 file, call it testing
mkfs.ext2 /dev/mapper/testing #Make an ext2 filesystem on testing
mount -t ext2 /dev/mapper/testing /mnt/tmp #Mount the device on /mnt/tmp
# 6/ Closing the encrypted volume
umount /mnt/tmp
cryptsetup luksClose testing
# 7/Opening the encrypted volume
losetup /dev/loop0 luksfile #Needed after a reboot
cryptsetup luksOpen /dev/loop0 testing && mount -t ext2 /dev/mapper/testing /mnt/tmp
edit:Not convinced cryptoloop is required, as it's the predecessor of dm-crypt.