NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.

Marty_W's avatar
Marty_W
Follower
Dec 02, 2017
Status:
Unspecified

Feature Request - Enable Use of Encrypted USB Disks

For the sake of security, I encrypt all of my disks and specifically all of my portable USB disks.

 

Please enhance the USB port software on your WiFi Routers to enable use of encrypted disks. Without that ability, the USB ports on my router are of no use to me.

6 Comments

  • I have the same request.    Under the current operation with USB drives attached to the X10 router cannot be encrypted, then anyone with physical access to the router can just walk away with the attached disk(s) and all their data in unsecured, unencrypted format.

  • JasonN's avatar
    JasonN
    NETGEAR Employee Retired

    Hi Everyone,

    Thank you for your suggestions on enabling the use of the USB ports for encrypted USB disks. We will review your idea for consideration. :]

     

     

    - Jason N

  • EDIT : oups sorry was taken to the wrong thread, I was talking about ReadyNas.... will post over there, I'll leave it here in case it helps someone.

     

    Hello,

     

    I would like to add my vote to this feature.

    It would be in my opinion relatively easy to add this feature, as the package is available for debian Jessie as Luks is available in apt-get :

     

    apt-get install cryptsetup

     

    We can then create LUKS volume on USB disks, and allow automatic unlocking if a special keyfile is present.

     

    I manually did it with a cron task that unlocks the luks volume then mount the partition, does a rsync, and then unmounts and locks the volume. I just had a surprise that if the mount operation did not work correctly I had to check for the disk, else the 4GB root partition fills up very quickly!

     

     

    https://miguelmenendez.pro/en/blog/2014/10/encrypt-usb-storage-device-linux-unified-key-setup-luks/

     

    https://blog.tinned-software.net/automount-a-luks-encrypted-volume-on-system-start/

     

    Here is my CRON task :

     

    file : /media/mount_rsync_umount.sh

    cryptsetup -d /secure/keyfile.luks luksOpen /dev/sdj1 LUKS0001

    cryptsetup -d /secure/keyfile.luks luksOpen /dev/sdh1 LUKS0001

    cryptsetup -d /secure/keyfile.luks luksOpen /dev/sdg1 LUKS0001

    cryptsetup -d /secure/keyfile.luks luksOpen /dev/sdi1 LUKS0001

    cryptsetup -d /secure/keyfile.luks luksOpen /dev/sdk1 LUKS0001

    mount /dev/mapper/LUKS0001 /media/sdg1

    mount /dev/mapper/USB /media/sdg1

    rsync -av --exclude-from '/media/exclude-list.txt' "/VOLUME" "/media/sdg1/" > /VOLUME/RSYNC_LOGS/log.log

    umount /media/sdg1

    cryptsetup luksClose /dev/mapper/LUKS0001

    cryptsetup luksClose /dev/mapper/USB

     

    sorry if it not very clean I am not a full time Debian/Bash admin :)

     

    Hope it helps!