Re: Cannot mount truecrypt volume over network
Actually the solution couldn't be simpler. You just need to add an option to the "mount" command:
Code:
uid={local username}
The complete command (in the case of CIFS/SMB) being:
Code:
sudo mount -t cifs //{host}/{share} {local mount point} -o user={remote username},uid={local username}
Note: Without specifying the password as an option (always a good idea to avoid plaintexting your passwords and/or in a way that bash history collects, IMO), this command would then prompt you for the remote password (after first prompting you for the sudo password of course).
All this does is mounts the share in a way that you (the user) can read and write to. Then, TrueCrypt has no problems accessing an encrypted volume stored on that share (assuming no other issues of course).
I don't know why this isn't widely discussed on the internets. I had to dig through the mount man page to discover this, after a fruitless internet search to this particular problem.
This is also not a hack or workaround. It's how mount was designed to work.
I should also point out that the previous solution discussed here is potentially dangerous, as it obviates the user-based security built-in to FUSE, and that TrueCrypt (and other FUSE modules such as EncFS) rely on: That is, by default only the current user can see the mounted volume! Modifying /etc/fuse.conf to add "user_allow_other", and specifying "allow_other" on the command line, overrides this behavior and allows any user to see your decrypted data.
If you've encrypted your data in the first place, there's a fairly good chance you wouldn't want this side effect!
--"This is just an example; it might be better."
Bookmarks