You are here |
sylvaindurand.org | ||
| | | |
willhaley.com
|
|
| | | | You can automatically unlock and mount LUKS encrypted volumes at boot by specifying the volumes and their keys in /etc/crypttab. For the sake of this article, I am working with non-critical volumes. Volumes for storage. Not volumes required to boot your machine properly. I am not discussing how to mount an encrypted root volume. I like to keep my keyfiles on USB drives. You do not need to use a USB device to unlock your volumes, but it is a bit silly to keep the key on a permanent disk connected to your machine, right? | |
| | | |
ounapuu.ee
|
|
| | | | Imagine that you have an unencrypted drive containing your private data and one day it starts throwing a bunch of errors. You have backups of the data so you've got that part covered, but would you feel comfortable sending the drive in to be warrantied? You have no control over who has access to that drive, and due to the drive failing you can't format it as well. Do you take the financial hit and buy a new drive, or send it in regardless and risk someone looking through your files? | |
| | | |
willhaley.com
|
|
| | | | Encrypt and Decrypt a Single File on Linux with AES256 and GPG Encrypt gpg --cipher-algo AES256 --symmetric --output encrypted.file plain.file Decrypt gpg --output plain.file --decrypt encrypted.file Change the key file for a LUKS device cryptsetup luksChangeKey /dev/sdX --key-file /keys/old.keyfile /keys/new.keyfile Create a LUKS Encrypted Image Container File Create an empty 1GB img file dd if=/dev/zero of=encrypted.img bs=1 count=0 seek=1G Choose a keyfile that will be used to encrypt and unlock the image. Any regular file works as a key. A random key can be generated like so. | |
| | | |
www.wgdd.de
|
|
| | A private blog about Debian GNU/Linux, my work and life as a Debian user and as Debian developer. |