No, sorry chickpee, I believe you're incorrect.
Is an encrypted Time Machine disk really just the same as a normal
disk, full-disk-encrypted using FileVault?
Yes. It is. This would be "FileVault 2" we are talking about, aka CoreStorage, Apple's newish logical volume manager. This is different that the previous TM and FileVault technologies, which are based on AES-encrypted sparse-bundle disk images (which are still used for network backups, etc.). The process that starts in System Preferences (these days) when you enable disk encryption (whether on an external disk, for Time Machine, or on the boot drive for FileVault), provided the disk is suitable, it does an online conversion from a traditional GPT Partition Table to a single monolithic data store, with a very small partition for the CS firmware. Logical volumes (in logical volume groups) are then carved out of this, and these (software) volumes are then HFS formatted and encrypted.
I believe the most straightforward method for doing this would be to:
- Attach the disk you're going to use, wipe it. Free space or a single HFS+ partition.
diskutil cs create/convert
(wasn't/was formatted; unimportant) to initialize and add a new LVG
diskutil cs createVolume
, create a single LV. You could enable encryption at this point, with diskutil cs encryptVolume
, if you know the passphrase you're going to use;
if not, leave it unencrypted for now.
diskutil partitionDisk diskX
-- see below -- CS volumes appear as if they are completely autonomous, separate disks, so you partitionDisk.
Then: mount and unlock the volume on your new user's machine. Once the disk is unlocked, there shouldn't be any trouble 'adopting' it for use there. If you want to put it into a config script, I believe it's just something like tmutil -a /Volumes/Foo
, tmutil startbackup -ad disk...
. This is the part I'm least sure about, but I'm also sure its easily doable. I haven't done this for Time Machine per se my self, but I pre-encrypt disks for FileVault like this all the time, and the OS sort of just knows what to do with if after that.
A properly suitable CS-enabled-disk is going to appear like this in diskutil (although you might not have the third partition on disk0 if it's knows it's not going to be a boot drive:
/dev/disk0
#: TYPE NAME SIZE IDENTIFIER
0: GUID_partition_scheme *251.0 GB disk0
1: EFI EFI 209.7 MB disk0s1
2: Apple_CoreStorage 250.1 GB disk0s2
3: Apple_Boot Boot OS X 250.0 MB disk0s3
/dev/disk1
#: TYPE NAME SIZE IDENTIFIER
0: Apple_HFS Macintosh LV *249.8 GB disk1
disk0 will not appear as encrypted, ever, since this is what the volume manager basically has to 'boot' off of. disk1 will be encrypted and will require the passcode to mount.
Time Machine prepares the drive for storing backups when you set it up. This means, disrupting filesystem-level encryption that wasn't made by Time Machine. If you want encryption on top of Time Machine encryption, it has to be below the filesystem level, or you'll surely lose it in favor of Time Machine. If you want encrypted Time Machine backups, simply enable encrypted backups when setting up Time Machine instead of encrypting in Disk Utility.
Best Answer
22 hours is very long indeed. I have encrypted a 1TB drive in less time before.
Maybe this daemon hangs or simply halted because the drive is not mounted (which is fine). So you should just re-mount it again.
Alternatively, I would try I restart the daemon by simply restarting the computer. Once the Time Machine backup is mounted again, the daemon will continue encrypting the drive.
Checking the encryption progress using diskutil
You can check the status of the encryption by using the command:
In the nested tree you will see a Logical Volume Family which is currently being encrypted. If you drive is being encrypted, you should see the entry
Conversion Status: Converting
.