NOTE: If the current user is added to the veracrypt group but hasn't logged out and back in again the group setting won't have been updated. Now save the changes and with all the steps done VeraCrypt won't ask for the user password anymore when mounting a volume. Select the VeraCrypt item and edit the properties:Īppend after the command the -use-dummy-sudo-password argument: These steps will differ from each desktop environment (GNOME, KDE, etc) so the screenshots below are a reference only. To avoid this the additional argument -use-dummy-sudo-password which will verify if sudo requires password authentication. Unfortunately VeraCrypt will still ask for the user password due to the sudo implementation. %veracrypt ALL=(root) NOPASSWD:/usr/bin/veracrypt It will then look like this: # Allow members of group sudo to execute any command Then add the following line below the existing sudo group line: %veracrypt ALL=(root) NOPASSWD:/usr/bin/veracrypt We do this with the following command: sudoedit /etc/sudoers These steps tell sudo that any user part of the veracrypt group is allowed to execute the veracrypt executable without password.įor this we need to edit /etc/sudoers. Provide sudo config for passwordless execution of veracrypt Then modify the required user(s) to join the group: sudo usermod -aG veracrypt Install it with: sudo apt install sudo -yīest practise is to have a separate user group so individual users can be linked to it, without providing them with full sudo rights.įirst create the new group: sudo groupadd veracrypt If there is no output then the package hasn't been installed yet. There isn’t a paid plan available or any pestering to donate. Check with the following command if the package is already installed: dpkg -l | grep sudo VeraCrypt Features Overview Pricing 100 Excellent As mentioned, VeraCrypt is a free, open-source project. To be able to use this steps the sudo package is required. All the steps below require sudo rights to execute. To avoid this from happening the steps below will provide with a mechanism where this isn't required anymore. When you use the VeraCrypt GUI, and mount an encrypted volume, it will require to provide each time the user password to elevate VeraCrypt to be able to mount the volume. Provides plausible deniability, in case an adversary forces you to reveal the password: Hidden volume (steganography) and hidden operating system.Encryption can be hardware-accelerated on modern processors.Parallelization and pipelining allow data to be read and written as fast as if the drive was not encrypted.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |