Comment 18 for bug 531240

Revision history for this message
ceg (ceg) wrote : Re: breaking raid: root raid_member opened as luks

concerning cryptsetup "wishlist":

Precautions like this show the level of safety and quality in implementing basic OS operations. If cryptsetup would check the given device before opening, this data loss would not occur now or any time later if blkid, an admin or another script makes an error.

Its just a wrong default to allow accessing individual raid members (its a dangerous operation).

i.e. "mount" returns "unknown filesytem type linux_raid_member“ for filesystems on raid members and will only mount it given the -t option, cryptsetup (or the kernel even?) should refuse by default, too, and maybe allow opening a "cypt on raid member" directly only with --force.