LUKS and Nuke key installtion on Ubuntu?












2















When you install Ubuntu there's an option to encrypt the installation. I didn't select that, can I still encrypt Ubuntu? I do not want to encrypt my home folder I would like to encrypt Ubuntu as if I did select that option on the setup process. Also I recently saw that Offensive Security added the NUKE key feature to Kali's encrypted partitioning and LVM option. Can I install that on Ubuntu as well?










share|improve this question













migrated from security.stackexchange.com Sep 6 '16 at 23:06


This question came from our site for information security professionals.



















  • The encryption Ubuntu offers on install is based on ecryptfs. That is file encryption and only encrypts the home folder. If you want a full block device encryption and a bootable Ubuntu you need to do it yourself manually. Search for luks (the encryption) & lvm (you need logical volumes because booting should be possible) & Ubuntu installation.

    – therealmarv
    Sep 6 '16 at 23:10











  • Related: askubuntu.com/questions/95159/…

    – Elder Geek
    Sep 6 '16 at 23:11











  • So I can't encrypt the Ubuntu system partition like the setup option?

    – Thomas Byerly
    Sep 6 '16 at 23:42
















2















When you install Ubuntu there's an option to encrypt the installation. I didn't select that, can I still encrypt Ubuntu? I do not want to encrypt my home folder I would like to encrypt Ubuntu as if I did select that option on the setup process. Also I recently saw that Offensive Security added the NUKE key feature to Kali's encrypted partitioning and LVM option. Can I install that on Ubuntu as well?










share|improve this question













migrated from security.stackexchange.com Sep 6 '16 at 23:06


This question came from our site for information security professionals.



















  • The encryption Ubuntu offers on install is based on ecryptfs. That is file encryption and only encrypts the home folder. If you want a full block device encryption and a bootable Ubuntu you need to do it yourself manually. Search for luks (the encryption) & lvm (you need logical volumes because booting should be possible) & Ubuntu installation.

    – therealmarv
    Sep 6 '16 at 23:10











  • Related: askubuntu.com/questions/95159/…

    – Elder Geek
    Sep 6 '16 at 23:11











  • So I can't encrypt the Ubuntu system partition like the setup option?

    – Thomas Byerly
    Sep 6 '16 at 23:42














2












2








2








When you install Ubuntu there's an option to encrypt the installation. I didn't select that, can I still encrypt Ubuntu? I do not want to encrypt my home folder I would like to encrypt Ubuntu as if I did select that option on the setup process. Also I recently saw that Offensive Security added the NUKE key feature to Kali's encrypted partitioning and LVM option. Can I install that on Ubuntu as well?










share|improve this question














When you install Ubuntu there's an option to encrypt the installation. I didn't select that, can I still encrypt Ubuntu? I do not want to encrypt my home folder I would like to encrypt Ubuntu as if I did select that option on the setup process. Also I recently saw that Offensive Security added the NUKE key feature to Kali's encrypted partitioning and LVM option. Can I install that on Ubuntu as well?







encryption privacy






share|improve this question













share|improve this question











share|improve this question




share|improve this question










asked Sep 6 '16 at 22:42









Thomas ByerlyThomas Byerly

1291211




1291211




migrated from security.stackexchange.com Sep 6 '16 at 23:06


This question came from our site for information security professionals.









migrated from security.stackexchange.com Sep 6 '16 at 23:06


This question came from our site for information security professionals.















  • The encryption Ubuntu offers on install is based on ecryptfs. That is file encryption and only encrypts the home folder. If you want a full block device encryption and a bootable Ubuntu you need to do it yourself manually. Search for luks (the encryption) & lvm (you need logical volumes because booting should be possible) & Ubuntu installation.

    – therealmarv
    Sep 6 '16 at 23:10











  • Related: askubuntu.com/questions/95159/…

    – Elder Geek
    Sep 6 '16 at 23:11











  • So I can't encrypt the Ubuntu system partition like the setup option?

    – Thomas Byerly
    Sep 6 '16 at 23:42



















  • The encryption Ubuntu offers on install is based on ecryptfs. That is file encryption and only encrypts the home folder. If you want a full block device encryption and a bootable Ubuntu you need to do it yourself manually. Search for luks (the encryption) & lvm (you need logical volumes because booting should be possible) & Ubuntu installation.

    – therealmarv
    Sep 6 '16 at 23:10











  • Related: askubuntu.com/questions/95159/…

    – Elder Geek
    Sep 6 '16 at 23:11











  • So I can't encrypt the Ubuntu system partition like the setup option?

    – Thomas Byerly
    Sep 6 '16 at 23:42

















The encryption Ubuntu offers on install is based on ecryptfs. That is file encryption and only encrypts the home folder. If you want a full block device encryption and a bootable Ubuntu you need to do it yourself manually. Search for luks (the encryption) & lvm (you need logical volumes because booting should be possible) & Ubuntu installation.

– therealmarv
Sep 6 '16 at 23:10





The encryption Ubuntu offers on install is based on ecryptfs. That is file encryption and only encrypts the home folder. If you want a full block device encryption and a bootable Ubuntu you need to do it yourself manually. Search for luks (the encryption) & lvm (you need logical volumes because booting should be possible) & Ubuntu installation.

– therealmarv
Sep 6 '16 at 23:10













Related: askubuntu.com/questions/95159/…

– Elder Geek
Sep 6 '16 at 23:11





Related: askubuntu.com/questions/95159/…

– Elder Geek
Sep 6 '16 at 23:11













So I can't encrypt the Ubuntu system partition like the setup option?

– Thomas Byerly
Sep 6 '16 at 23:42





So I can't encrypt the Ubuntu system partition like the setup option?

– Thomas Byerly
Sep 6 '16 at 23:42










1 Answer
1






active

oldest

votes


















2














Yes, you can add the NUKE feature to Ubuntu crypsetup!
You need der sourcecode from crypsetup, the patch for cryptsetup-1.6.6...



Then you can compile new libcryptsetup and cryptsetup with nuke feature.



This patch is for 1.6.6-5 (Ubuntu 16.04), for other version you neeed other patch, please visit the link!



get the patch (take a look http://deriv.debian.net/patches/c/cryptsetup/)



sudo apt-get update
sudo apt-get install libgcrypt11-dev libdevmapper-dev libpopt-dev uuid-dev libtool automake autopoint debhelper xsltproc docbook-xsl dpkg-dev
sudo apt-get source cryptsetup

wget http://deriv.debian.net/patches/c/cryptsetup/Debian_cryptsetup_2:1.6.6-5_Kali_cryptsetup_2:1.6.6-5kali1.debian.patch


extract source code from cryptsetup



cd cryptsetup-1.6.6


now its time to patch



patch -p1 < ../cryptsetup-nuke-keys/cryptsetup.patch


please corret the path, in my folder i have modified...



after patching, create DEB files for ubuntu



dpkg-buildpackage -b -uc


now its time to install



sudo dpkg -i ../libcryptsetup*.deb
sudo dpkg -i ../cryptsetup*.deb


edit:



I have made a simple shell script to patch and compile cryptsetup for Ubuntu 16.04.
Please be careful!



run it with sudo!



#!/bin/sh

apt-get update
apt-get install libgcrypt11-dev libdevmapper-dev libpopt-dev uuid-dev libtool automake autopoint debhelper xsltproc docbook-xsl dpkg-dev

apt-get source cryptsetup
wget http://deriv.debian.net/patches/c/cryptsetup/Debian_cryptsetup_2:1.6.6-5_Kali_cryptsetup_2:1.6.6-5kali1.debian.patch

cd cryptsetup-1.6.6
patch -p1 < ../Debian_cryptsetup_2:1.6.6-5_Kali_cryptsetup_2:1.6.6-5kali1.debian.patch

dpkg-buildpackage -b -uc


After that, you can install with



sudo dpkg -i ../libcryptsetup*.deb
sudo dpkg -i ../cryptsetup*.deb


check with



cryptsetup --help | grep luksAddNuke


should look like



luksAddNuke - add NUKE to LUKS device



Now you can add nuke keys with



sudo cryptsetup luksAddNuke /dev/sda5


With a standard Ubuntu installation it is normal sda5 !



Now make a backup of the header!



sudo cryptsetup luksHeaderBackup /dev/sda5 --header-backup-file luks-backup


copy the file luks-backup on save location, if you wipe the header with nuke password, you can recover the header with linux live system!



make sure, that ubuntu update dont install the "normal" cryptsetup



sudo apt-mark hold cryptsetup-bin libcryptsetup4


check upgrade



sudo apt-get upgrade


looks like this



Die folgenden Pakete sind zurückgehalten worden:
cryptsetup-bin libcryptsetup4 linux-generic linux-headers-generic linux-image-generic ubuntu-core-launcher



If i have some time, i would create ppa.



roema






share|improve this answer


























  • If you like, i can send you a .deb file for installing.

    – roema
    Oct 8 '16 at 18:26






  • 1





    If you want to make a package for this, please consider uploading it to a Launchpad PPA so that everyone in the community can profit from it. We don't really want to offer personal support here but create questions and answers useful for a wider audience.

    – Byte Commander
    Oct 8 '16 at 18:31











Your Answer








StackExchange.ready(function() {
var channelOptions = {
tags: "".split(" "),
id: "89"
};
initTagRenderer("".split(" "), "".split(" "), channelOptions);

StackExchange.using("externalEditor", function() {
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled) {
StackExchange.using("snippets", function() {
createEditor();
});
}
else {
createEditor();
}
});

function createEditor() {
StackExchange.prepareEditor({
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: true,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: 10,
bindNavPrevention: true,
postfix: "",
imageUploader: {
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
},
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
});


}
});














draft saved

draft discarded


















StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f821881%2fluks-and-nuke-key-installtion-on-ubuntu%23new-answer', 'question_page');
}
);

Post as a guest















Required, but never shown

























1 Answer
1






active

oldest

votes








1 Answer
1






active

oldest

votes









active

oldest

votes






active

oldest

votes









2














Yes, you can add the NUKE feature to Ubuntu crypsetup!
You need der sourcecode from crypsetup, the patch for cryptsetup-1.6.6...



Then you can compile new libcryptsetup and cryptsetup with nuke feature.



This patch is for 1.6.6-5 (Ubuntu 16.04), for other version you neeed other patch, please visit the link!



get the patch (take a look http://deriv.debian.net/patches/c/cryptsetup/)



sudo apt-get update
sudo apt-get install libgcrypt11-dev libdevmapper-dev libpopt-dev uuid-dev libtool automake autopoint debhelper xsltproc docbook-xsl dpkg-dev
sudo apt-get source cryptsetup

wget http://deriv.debian.net/patches/c/cryptsetup/Debian_cryptsetup_2:1.6.6-5_Kali_cryptsetup_2:1.6.6-5kali1.debian.patch


extract source code from cryptsetup



cd cryptsetup-1.6.6


now its time to patch



patch -p1 < ../cryptsetup-nuke-keys/cryptsetup.patch


please corret the path, in my folder i have modified...



after patching, create DEB files for ubuntu



dpkg-buildpackage -b -uc


now its time to install



sudo dpkg -i ../libcryptsetup*.deb
sudo dpkg -i ../cryptsetup*.deb


edit:



I have made a simple shell script to patch and compile cryptsetup for Ubuntu 16.04.
Please be careful!



run it with sudo!



#!/bin/sh

apt-get update
apt-get install libgcrypt11-dev libdevmapper-dev libpopt-dev uuid-dev libtool automake autopoint debhelper xsltproc docbook-xsl dpkg-dev

apt-get source cryptsetup
wget http://deriv.debian.net/patches/c/cryptsetup/Debian_cryptsetup_2:1.6.6-5_Kali_cryptsetup_2:1.6.6-5kali1.debian.patch

cd cryptsetup-1.6.6
patch -p1 < ../Debian_cryptsetup_2:1.6.6-5_Kali_cryptsetup_2:1.6.6-5kali1.debian.patch

dpkg-buildpackage -b -uc


After that, you can install with



sudo dpkg -i ../libcryptsetup*.deb
sudo dpkg -i ../cryptsetup*.deb


check with



cryptsetup --help | grep luksAddNuke


should look like



luksAddNuke - add NUKE to LUKS device



Now you can add nuke keys with



sudo cryptsetup luksAddNuke /dev/sda5


With a standard Ubuntu installation it is normal sda5 !



Now make a backup of the header!



sudo cryptsetup luksHeaderBackup /dev/sda5 --header-backup-file luks-backup


copy the file luks-backup on save location, if you wipe the header with nuke password, you can recover the header with linux live system!



make sure, that ubuntu update dont install the "normal" cryptsetup



sudo apt-mark hold cryptsetup-bin libcryptsetup4


check upgrade



sudo apt-get upgrade


looks like this



Die folgenden Pakete sind zurückgehalten worden:
cryptsetup-bin libcryptsetup4 linux-generic linux-headers-generic linux-image-generic ubuntu-core-launcher



If i have some time, i would create ppa.



roema






share|improve this answer


























  • If you like, i can send you a .deb file for installing.

    – roema
    Oct 8 '16 at 18:26






  • 1





    If you want to make a package for this, please consider uploading it to a Launchpad PPA so that everyone in the community can profit from it. We don't really want to offer personal support here but create questions and answers useful for a wider audience.

    – Byte Commander
    Oct 8 '16 at 18:31
















2














Yes, you can add the NUKE feature to Ubuntu crypsetup!
You need der sourcecode from crypsetup, the patch for cryptsetup-1.6.6...



Then you can compile new libcryptsetup and cryptsetup with nuke feature.



This patch is for 1.6.6-5 (Ubuntu 16.04), for other version you neeed other patch, please visit the link!



get the patch (take a look http://deriv.debian.net/patches/c/cryptsetup/)



sudo apt-get update
sudo apt-get install libgcrypt11-dev libdevmapper-dev libpopt-dev uuid-dev libtool automake autopoint debhelper xsltproc docbook-xsl dpkg-dev
sudo apt-get source cryptsetup

wget http://deriv.debian.net/patches/c/cryptsetup/Debian_cryptsetup_2:1.6.6-5_Kali_cryptsetup_2:1.6.6-5kali1.debian.patch


extract source code from cryptsetup



cd cryptsetup-1.6.6


now its time to patch



patch -p1 < ../cryptsetup-nuke-keys/cryptsetup.patch


please corret the path, in my folder i have modified...



after patching, create DEB files for ubuntu



dpkg-buildpackage -b -uc


now its time to install



sudo dpkg -i ../libcryptsetup*.deb
sudo dpkg -i ../cryptsetup*.deb


edit:



I have made a simple shell script to patch and compile cryptsetup for Ubuntu 16.04.
Please be careful!



run it with sudo!



#!/bin/sh

apt-get update
apt-get install libgcrypt11-dev libdevmapper-dev libpopt-dev uuid-dev libtool automake autopoint debhelper xsltproc docbook-xsl dpkg-dev

apt-get source cryptsetup
wget http://deriv.debian.net/patches/c/cryptsetup/Debian_cryptsetup_2:1.6.6-5_Kali_cryptsetup_2:1.6.6-5kali1.debian.patch

cd cryptsetup-1.6.6
patch -p1 < ../Debian_cryptsetup_2:1.6.6-5_Kali_cryptsetup_2:1.6.6-5kali1.debian.patch

dpkg-buildpackage -b -uc


After that, you can install with



sudo dpkg -i ../libcryptsetup*.deb
sudo dpkg -i ../cryptsetup*.deb


check with



cryptsetup --help | grep luksAddNuke


should look like



luksAddNuke - add NUKE to LUKS device



Now you can add nuke keys with



sudo cryptsetup luksAddNuke /dev/sda5


With a standard Ubuntu installation it is normal sda5 !



Now make a backup of the header!



sudo cryptsetup luksHeaderBackup /dev/sda5 --header-backup-file luks-backup


copy the file luks-backup on save location, if you wipe the header with nuke password, you can recover the header with linux live system!



make sure, that ubuntu update dont install the "normal" cryptsetup



sudo apt-mark hold cryptsetup-bin libcryptsetup4


check upgrade



sudo apt-get upgrade


looks like this



Die folgenden Pakete sind zurückgehalten worden:
cryptsetup-bin libcryptsetup4 linux-generic linux-headers-generic linux-image-generic ubuntu-core-launcher



If i have some time, i would create ppa.



roema






share|improve this answer


























  • If you like, i can send you a .deb file for installing.

    – roema
    Oct 8 '16 at 18:26






  • 1





    If you want to make a package for this, please consider uploading it to a Launchpad PPA so that everyone in the community can profit from it. We don't really want to offer personal support here but create questions and answers useful for a wider audience.

    – Byte Commander
    Oct 8 '16 at 18:31














2












2








2







Yes, you can add the NUKE feature to Ubuntu crypsetup!
You need der sourcecode from crypsetup, the patch for cryptsetup-1.6.6...



Then you can compile new libcryptsetup and cryptsetup with nuke feature.



This patch is for 1.6.6-5 (Ubuntu 16.04), for other version you neeed other patch, please visit the link!



get the patch (take a look http://deriv.debian.net/patches/c/cryptsetup/)



sudo apt-get update
sudo apt-get install libgcrypt11-dev libdevmapper-dev libpopt-dev uuid-dev libtool automake autopoint debhelper xsltproc docbook-xsl dpkg-dev
sudo apt-get source cryptsetup

wget http://deriv.debian.net/patches/c/cryptsetup/Debian_cryptsetup_2:1.6.6-5_Kali_cryptsetup_2:1.6.6-5kali1.debian.patch


extract source code from cryptsetup



cd cryptsetup-1.6.6


now its time to patch



patch -p1 < ../cryptsetup-nuke-keys/cryptsetup.patch


please corret the path, in my folder i have modified...



after patching, create DEB files for ubuntu



dpkg-buildpackage -b -uc


now its time to install



sudo dpkg -i ../libcryptsetup*.deb
sudo dpkg -i ../cryptsetup*.deb


edit:



I have made a simple shell script to patch and compile cryptsetup for Ubuntu 16.04.
Please be careful!



run it with sudo!



#!/bin/sh

apt-get update
apt-get install libgcrypt11-dev libdevmapper-dev libpopt-dev uuid-dev libtool automake autopoint debhelper xsltproc docbook-xsl dpkg-dev

apt-get source cryptsetup
wget http://deriv.debian.net/patches/c/cryptsetup/Debian_cryptsetup_2:1.6.6-5_Kali_cryptsetup_2:1.6.6-5kali1.debian.patch

cd cryptsetup-1.6.6
patch -p1 < ../Debian_cryptsetup_2:1.6.6-5_Kali_cryptsetup_2:1.6.6-5kali1.debian.patch

dpkg-buildpackage -b -uc


After that, you can install with



sudo dpkg -i ../libcryptsetup*.deb
sudo dpkg -i ../cryptsetup*.deb


check with



cryptsetup --help | grep luksAddNuke


should look like



luksAddNuke - add NUKE to LUKS device



Now you can add nuke keys with



sudo cryptsetup luksAddNuke /dev/sda5


With a standard Ubuntu installation it is normal sda5 !



Now make a backup of the header!



sudo cryptsetup luksHeaderBackup /dev/sda5 --header-backup-file luks-backup


copy the file luks-backup on save location, if you wipe the header with nuke password, you can recover the header with linux live system!



make sure, that ubuntu update dont install the "normal" cryptsetup



sudo apt-mark hold cryptsetup-bin libcryptsetup4


check upgrade



sudo apt-get upgrade


looks like this



Die folgenden Pakete sind zurückgehalten worden:
cryptsetup-bin libcryptsetup4 linux-generic linux-headers-generic linux-image-generic ubuntu-core-launcher



If i have some time, i would create ppa.



roema






share|improve this answer















Yes, you can add the NUKE feature to Ubuntu crypsetup!
You need der sourcecode from crypsetup, the patch for cryptsetup-1.6.6...



Then you can compile new libcryptsetup and cryptsetup with nuke feature.



This patch is for 1.6.6-5 (Ubuntu 16.04), for other version you neeed other patch, please visit the link!



get the patch (take a look http://deriv.debian.net/patches/c/cryptsetup/)



sudo apt-get update
sudo apt-get install libgcrypt11-dev libdevmapper-dev libpopt-dev uuid-dev libtool automake autopoint debhelper xsltproc docbook-xsl dpkg-dev
sudo apt-get source cryptsetup

wget http://deriv.debian.net/patches/c/cryptsetup/Debian_cryptsetup_2:1.6.6-5_Kali_cryptsetup_2:1.6.6-5kali1.debian.patch


extract source code from cryptsetup



cd cryptsetup-1.6.6


now its time to patch



patch -p1 < ../cryptsetup-nuke-keys/cryptsetup.patch


please corret the path, in my folder i have modified...



after patching, create DEB files for ubuntu



dpkg-buildpackage -b -uc


now its time to install



sudo dpkg -i ../libcryptsetup*.deb
sudo dpkg -i ../cryptsetup*.deb


edit:



I have made a simple shell script to patch and compile cryptsetup for Ubuntu 16.04.
Please be careful!



run it with sudo!



#!/bin/sh

apt-get update
apt-get install libgcrypt11-dev libdevmapper-dev libpopt-dev uuid-dev libtool automake autopoint debhelper xsltproc docbook-xsl dpkg-dev

apt-get source cryptsetup
wget http://deriv.debian.net/patches/c/cryptsetup/Debian_cryptsetup_2:1.6.6-5_Kali_cryptsetup_2:1.6.6-5kali1.debian.patch

cd cryptsetup-1.6.6
patch -p1 < ../Debian_cryptsetup_2:1.6.6-5_Kali_cryptsetup_2:1.6.6-5kali1.debian.patch

dpkg-buildpackage -b -uc


After that, you can install with



sudo dpkg -i ../libcryptsetup*.deb
sudo dpkg -i ../cryptsetup*.deb


check with



cryptsetup --help | grep luksAddNuke


should look like



luksAddNuke - add NUKE to LUKS device



Now you can add nuke keys with



sudo cryptsetup luksAddNuke /dev/sda5


With a standard Ubuntu installation it is normal sda5 !



Now make a backup of the header!



sudo cryptsetup luksHeaderBackup /dev/sda5 --header-backup-file luks-backup


copy the file luks-backup on save location, if you wipe the header with nuke password, you can recover the header with linux live system!



make sure, that ubuntu update dont install the "normal" cryptsetup



sudo apt-mark hold cryptsetup-bin libcryptsetup4


check upgrade



sudo apt-get upgrade


looks like this



Die folgenden Pakete sind zurückgehalten worden:
cryptsetup-bin libcryptsetup4 linux-generic linux-headers-generic linux-image-generic ubuntu-core-launcher



If i have some time, i would create ppa.



roema







share|improve this answer














share|improve this answer



share|improve this answer








edited Oct 9 '16 at 7:37

























answered Oct 8 '16 at 18:25









roemaroema

314




314













  • If you like, i can send you a .deb file for installing.

    – roema
    Oct 8 '16 at 18:26






  • 1





    If you want to make a package for this, please consider uploading it to a Launchpad PPA so that everyone in the community can profit from it. We don't really want to offer personal support here but create questions and answers useful for a wider audience.

    – Byte Commander
    Oct 8 '16 at 18:31



















  • If you like, i can send you a .deb file for installing.

    – roema
    Oct 8 '16 at 18:26






  • 1





    If you want to make a package for this, please consider uploading it to a Launchpad PPA so that everyone in the community can profit from it. We don't really want to offer personal support here but create questions and answers useful for a wider audience.

    – Byte Commander
    Oct 8 '16 at 18:31

















If you like, i can send you a .deb file for installing.

– roema
Oct 8 '16 at 18:26





If you like, i can send you a .deb file for installing.

– roema
Oct 8 '16 at 18:26




1




1





If you want to make a package for this, please consider uploading it to a Launchpad PPA so that everyone in the community can profit from it. We don't really want to offer personal support here but create questions and answers useful for a wider audience.

– Byte Commander
Oct 8 '16 at 18:31





If you want to make a package for this, please consider uploading it to a Launchpad PPA so that everyone in the community can profit from it. We don't really want to offer personal support here but create questions and answers useful for a wider audience.

– Byte Commander
Oct 8 '16 at 18:31


















draft saved

draft discarded




















































Thanks for contributing an answer to Ask Ubuntu!


  • Please be sure to answer the question. Provide details and share your research!

But avoid



  • Asking for help, clarification, or responding to other answers.

  • Making statements based on opinion; back them up with references or personal experience.


To learn more, see our tips on writing great answers.




draft saved


draft discarded














StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2faskubuntu.com%2fquestions%2f821881%2fluks-and-nuke-key-installtion-on-ubuntu%23new-answer', 'question_page');
}
);

Post as a guest















Required, but never shown





















































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown

































Required, but never shown














Required, but never shown












Required, but never shown







Required, but never shown







Popular posts from this blog

Human spaceflight

Can not write log (Is /dev/pts mounted?) - openpty in Ubuntu-on-Windows?

張江高科駅