issue104:securite
Différences
Ci-dessous, les différences entre deux révisions de la page.
Prochaine révision | Révision précédente | ||
issue104:securite [2015/12/28 18:55] – créée auntiee | issue104:securite [2016/01/10 15:23] (Version actuelle) – auntiee | ||
---|---|---|---|
Ligne 1: | Ligne 1: | ||
- | For many years, TrueCrypt was my encryption program of choice to encrypt my files on my computer. I liked how it worked on both my Linux and Windows systems. However, in May of 2014, TrueCrypt was discontinued, | + | **For many years, TrueCrypt was my encryption program of choice to encrypt my files on my computer. I liked how it worked on both my Linux and Windows systems. However, in May of 2014, TrueCrypt was discontinued, |
Since then the project was forked to the VeraCrypt program, and this is the program that I'm running today. | Since then the project was forked to the VeraCrypt program, and this is the program that I'm running today. | ||
Ligne 8: | Ligne 8: | ||
Once you have the file downloaded, extract it by either using right-click and “Extract Here”, or from the command-line by typing: | Once you have the file downloaded, extract it by either using right-click and “Extract Here”, or from the command-line by typing: | ||
+ | |||
+ | tar xvf veracrypt-1.13-setup.tar.bz2** | ||
+ | |||
+ | Pendant des années, TrueCrypt a été le programme de cryptage que je préférais pour encoder mes fichiers sur mon ordinateur. J' | ||
+ | |||
+ | Depuis, le projet a été dévié vers le programme VeraCrypt et c'est ce programme que j' | ||
+ | |||
+ | J' | ||
+ | |||
+ | Pour installer VeraCrypt sur votre ordinateur, allez à https:// | ||
+ | |||
+ | Une fois le fichier téléchargé, | ||
tar xvf veracrypt-1.13-setup.tar.bz2 | tar xvf veracrypt-1.13-setup.tar.bz2 | ||
- | At this point you'll have four files extracted. Two are for a console installation (32 and 64-bit), and two are for GUI installation (32 and 64-bit). In this case, we'll use the 32-bit GUI install. You can issue the command: | + | **At this point you'll have four files extracted. Two are for a console installation (32 and 64-bit), and two are for GUI installation (32 and 64-bit). In this case, we'll use the 32-bit GUI install. You can issue the command: |
sh veracrypt-1.13-setup-gui-x86 | sh veracrypt-1.13-setup-gui-x86 | ||
Ligne 20: | Ligne 32: | ||
After this, we'll see a message about uninstall instructions. If you ever want to uninstall VeraCrypt, you'll use this command: | After this, we'll see a message about uninstall instructions. If you ever want to uninstall VeraCrypt, you'll use this command: | ||
+ | |||
+ | veracrypt-uninstall.sh** | ||
+ | |||
+ | Une fois fait, vous aurez extrait quatre fichiers. Deux sont pour une installation en console (32 et 64-bit), et deux pour une installation graphique ((32 et 64-bit). Dans notre cas, nous utiliserons l' | ||
+ | |||
+ | sh veracrypt-1.13-setup-gui-x86 | ||
+ | |||
+ | Puisque le paquet est déjà extrait, vous pouvez sélectionner « Install VeraCrypt » (installer VeraCrypt). | ||
+ | |||
+ | La prochaine étape consiste à lire les termes de la licence. Vous pouvez utiliser les barres de défilement à gauche pour les lire et, une fois fait, vous pouvez les accepter tout en bas. | ||
+ | |||
+ | Après cela, nous verrons un message concernant la désinstallation. Si jamais vous voulez désinstaller VeraCrypt, vous utiliserez la commande : | ||
veracrypt-uninstall.sh | veracrypt-uninstall.sh | ||
- | Type in your root password at the prompt, and press return. The package will install several files, and once it's done, will direct you to press “enter” to exit the terminal. To start the program, click on the home button and search for “Vera”. The VeraCrypt program will be displayed. Click it to get started! | + | **Type in your root password at the prompt, and press return. The package will install several files, and once it's done, will direct you to press “enter” to exit the terminal. To start the program, click on the home button and search for “Vera”. The VeraCrypt program will be displayed. Click it to get started! |
Once the program starts, you'll be presented with several empty slots. Our first task is to create an empty container. The easiest thing to do is to create one container, put a password on it, and then mount your container. This is the process that we'll walk through. After that, we'll work on setting up a two-step system for better security. So to get started, click on the “create volume” button. | Once the program starts, you'll be presented with several empty slots. Our first task is to create an empty container. The easiest thing to do is to create one container, put a password on it, and then mount your container. This is the process that we'll walk through. After that, we'll work on setting up a two-step system for better security. So to get started, click on the “create volume” button. | ||
Ligne 29: | Ligne 53: | ||
For our tutorial, we'll create an encrypted file container, so select the first option. Select “Standard VeraCrypt Volume” on the next screen. | For our tutorial, we'll create an encrypted file container, so select the first option. Select “Standard VeraCrypt Volume” on the next screen. | ||
- | At this point, VeraCrypt wants you to select a file to make a container. You don't want to use an existing file, because it will be deleted and replaced with the newly-created VeraCrypt file. So what you can do is create an empty text file, and call it whatever you want. For security purposes, don't call the file something obvious like “secret container”, | + | At this point, VeraCrypt wants you to select a file to make a container. You don't want to use an existing file, because it will be deleted and replaced with the newly-created VeraCrypt file. So what you can do is create an empty text file, and call it whatever you want. For security purposes, don't call the file something obvious like “secret container”, |
- | Now you get to select which kind of encryption you want. The differences in the types of encryption are beyond the scope of this tutorial, so for our purposes we'll just select AES(Twofish) and select Next. | + | À l' |
+ | |||
+ | Une fois le programme démarré, vous allez voir plusieurs emplacements vides. Notre première tâche est de créer un conteneur vide. Le plus facile est de créer un conteneur, de lui attribuer un mot de passe, puis de le monter. C'est le processus que nous allons suivre, pas à pas. Après cela, nous travaillerons sur la mise en place d'un système à deux niveaux, pour plus de sécurité. Aussi, pour commencer, cliquez sur le bouton « Create volume » (créer un volume). | ||
+ | |||
+ | Dans ce tutoriel, nous allons créer un conteneur de fichier crypté : choisissez la première option. Sur l' | ||
+ | |||
+ | À ce stade, VeraCrypt veut que vous sélectionniez un fichier pour en faire un conteneur. Vous ne voulez pas utiliser un fichier existant, parce qu'il sera effacé et remplacé par le fichier VeraCrypt nouvellement créé. Ce que vous pouvez faire, c'est de créer un fichier texte vide en l' | ||
+ | |||
+ | **Now you get to select which kind of encryption you want. The differences in the types of encryption are beyond the scope of this tutorial, so for our purposes we'll just select AES(Twofish) and select Next. | ||
Now you determine how big you want to make your container. We'll select a simple 500MB container. After clicking next, you'll choose the password you want for the container. | Now you determine how big you want to make your container. We'll select a simple 500MB container. After clicking next, you'll choose the password you want for the container. | ||
Ligne 37: | Ligne 69: | ||
Now you'll be presented with the format options of the container. If you plan on using the container only in Linux, you can choose the Ext4 file system. However if you want the container to be mounted in Windows also, select “FAT”. | Now you'll be presented with the format options of the container. If you plan on using the container only in Linux, you can choose the Ext4 file system. However if you want the container to be mounted in Windows also, select “FAT”. | ||
- | It’s time to encrypt the container! By moving the mouse around, you'll increase the cryptographic strength of the encryption keys. When you are satisfied with the strength (or just impatient), click Format to create the container. You'll get one more warning that the file already exists. Since we created the file for this purpose, we can format it. | + | It’s time to encrypt the container! By moving the mouse around, you'll increase the cryptographic strength of the encryption keys. When you are satisfied with the strength (or just impatient), click Format to create the container. You'll get one more warning that the file already exists. Since we created the file for this purpose, we can format it.** |
- | Once it's finished, you'll be presented with a dialog saying it was successful. Now it's time to mount the container and use it! Go back to the original screen with the 12 different slots, and this time click on “select file”. Navigate to where you created your container, and select it. Once you have the correct file, click on a slot where you want to mount the container, and select “mount” at the bottom. You'll enter the password you created for the container at this point. VeraCrypt will then ask for your root password in order to mount it. | + | Maintenant, vous devez sélectionner le type d' |
+ | |||
+ | Ici, vous déterminez la taille que vous voulez donner à votre conteneur. Nous choisirons un simple conteneur de 500 Mo. Après avoir cliqué sur Next, vous choisirez le mot de passe que vous voulez attribuer au conteneur. | ||
+ | |||
+ | Ensuite, les options de format du conteneur vous sont présentées. Si vous prévoyez de n' | ||
+ | |||
+ | C'est le moment d' | ||
+ | |||
+ | **Once it's finished, you'll be presented with a dialog saying it was successful. Now it's time to mount the container and use it! Go back to the original screen with the 12 different slots, and this time click on “select file”. Navigate to where you created your container, and select it. Once you have the correct file, click on a slot where you want to mount the container, and select “mount” at the bottom. You'll enter the password you created for the container at this point. VeraCrypt will then ask for your root password in order to mount it. | ||
Here we can see that our 500MB container is mounted in slot 5 of VeraCrypt. Opening our file manager of choice we can see that it is indeed mounted and ready for files. In this case, Dolphin is reporting a new 499.8 MB hard drive. | Here we can see that our 500MB container is mounted in slot 5 of VeraCrypt. Opening our file manager of choice we can see that it is indeed mounted and ready for files. In this case, Dolphin is reporting a new 499.8 MB hard drive. | ||
When you are done with the container, you need to dismount the drive, so it can close properly. Simply click “Dismount” and VeraCrypt will dismount the drive. To verify that you closed it correctly, go back to your file manager and see if it's there. | When you are done with the container, you need to dismount the drive, so it can close properly. Simply click “Dismount” and VeraCrypt will dismount the drive. To verify that you closed it correctly, go back to your file manager and see if it's there. | ||
- | Indeed, it's dismounted, and no longer displays on the list of devices! | + | Indeed, it's dismounted, and no longer displays on the list of devices!** |
- | So that's the basics of creating an encrypted file container. You can move the container anywhere you want, it doesn' | + | Une fois terminé, un dialogue indiquant le succès de l' |
+ | |||
+ | Ici, vous pouvez voir que notre conteneur de 500 Mo est monté dans l' | ||
+ | |||
+ | Quand vous aurez fini d' | ||
+ | |||
+ | Oui, il est démonté et il n'est plus affiché dans la liste des disques ! | ||
+ | |||
+ | **So that's the basics of creating an encrypted file container. You can move the container anywhere you want, it doesn' | ||
Store that container among the other files in that directory, and just remember it's a container, and not actually what the label says. If the small container gets compromised, | Store that container among the other files in that directory, and just remember it's a container, and not actually what the label says. If the small container gets compromised, | ||
- | That wraps up our VeraCrypt tutorial, and should get you started in encrypting and hiding your sensitive files. Remember that longer passwords are better, and don't accidentally delete your containers thinking they are something else! | + | That wraps up our VeraCrypt tutorial, and should get you started in encrypting and hiding your sensitive files. Remember that longer passwords are better, and don't accidentally delete your containers thinking they are something else!** |
+ | |||
+ | Voilà ! Ce sont les bases de la création d'un conteneur encrypté de fichiers. Vous pouvez déplacer le conteneur où vous voulez, il n'est pas nécessaire de le garder dans le dossier de création. Pour plus de sécurité, vous pourriez vouloir essayer un système à deux niveaux. Ce que vous pouvez faire, c'est créer un simple fichier de 1 Mo avec un simple mot de passe. Montez ce conteneur, et à l' | ||
+ | |||
+ | Stockez le conteneur parmi les autres fichiers du répertoire et souvenez-vous juste que c'est un conteneur, et pas vraiment ce qu' | ||
+ | |||
+ | Ceci termine notre tutoriel sur VeraCrypt ; il devrait vous aider à démarrer dans l' | ||
+ | |||
+ | **BIO : Scott lives in Oklahoma, USA with his wife and four kids. He has been using Linux in one form or another since 2010. His current preferred distro is Kubuntu 14.04.** | ||
- | BIO : Scott lives in Oklahoma, USA with his wife and four kids. He has been using Linux in one form or another since 2010. His current preferred distro is Kubuntu 14.04. | + | BIO : Scott vit à Oklahoma, USA, avec sa femme et ses quatre enfants. Il utilise |
issue104/securite.1451325332.txt.gz · Dernière modification : 2015/12/28 18:55 de auntiee