You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: man/cryptsetup-luksHeaderBackup.8.adoc
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,11 +16,12 @@ cryptsetup-luksHeaderBackup - store a binary backup of the LUKS header and keysl
16
16
17
17
== DESCRIPTION
18
18
19
-
Stores a binary backup of the LUKS header and keyslot area. +
20
-
*NOTE:* Using '-' as a filename writes the header backup to a file named '-'.
19
+
Stores a binary backup of the LUKS header and keyslot area.
21
20
22
21
*<options>* can be [--header, --header-backup-file, --disable-locks].
23
22
23
+
*NOTE:* Using '-' as a filename writes the header backup to a file named '-'.
24
+
24
25
*WARNING:* This backup file and a passphrase valid at the time of backup allow decryption of the LUKS data area, even if the passphrase was later changed or removed from the LUKS device.
25
26
Also, note that with a header backup, you lose the ability to wipe the LUKS device securely by just overwriting the header and keyslots.
26
27
You must either securely erase all header backups or overwrite the encrypted data area.
Opens (creates a mapping with) <name> backed by device <device>.
40
40
41
-
*WARNING:* You should always specify options --cipher, --key-size and (if no keyfile or keyring is used) then also --hash to avoid incompatibility, as default values can differ in older cryptsetup versions. +
41
+
*WARNING:* You should always specify options --cipher, --key-size and (if no keyfile or keyring is used) then also --hash to avoid incompatibility, as default values can differ in older cryptsetup versions.
42
42
43
43
The plain format also allows retrieving a volume key from a kernel keyring specified by --volume-key-keyring.
44
44
The key in the kernel keyring must be configured before issuing cryptsetup commands, as cryptsetup does not upload any keys to the keyring in plain mode.
*WARNING:* The loop-AES extension cannot use the direct input of the key file on the real terminal because the keys are separated by end-of-line, and only part of the multi-key file would be read. +
90
-
If you need it in script, just use the pipe redirection: +
*WARNING:* The loop-AES extension cannot use the direct input of the key file on the real terminal because the keys are separated by end-of-line, and only part of the multi-key file would be read.
89
+
If you need it in script, just use the pipe redirection: *echo $keyfile | cryptsetup loopaesOpen --key-file=- <device> <name>*.
92
90
93
91
Use --keyfile-size to specify the proper key length if needed.
Copy file name to clipboardExpand all lines: man/cryptsetup.8.adoc
+36-36Lines changed: 36 additions & 36 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -30,37 +30,37 @@ The following are valid actions for all supported device types.
30
30
=== OPEN
31
31
*open <device> <name> --type <device_type>*
32
32
33
-
Opens (creates a mapping with) <name> backed by device <device>. +
33
+
Opens (creates a mapping with) <name> backed by device <device>.
34
34
See *cryptsetup-open*(8).
35
35
36
36
=== CLOSE
37
37
*close <name>*
38
38
39
-
Removes the existing mapping <name> and wipes the key from kernel memory. +
39
+
Removes the existing mapping <name> and wipes the key from kernel memory.
40
40
See *cryptsetup-close*(8).
41
41
42
42
=== STATUS
43
43
*status <name>*
44
44
45
-
Reports the status for the mapping <name>. +
45
+
Reports the status for the mapping <name>.
46
46
See *cryptsetup-status*(8).
47
47
48
48
=== RESIZE
49
49
*resize <name>*
50
50
51
-
Resizes an active mapping <name>. +
51
+
Resizes an active mapping <name>.
52
52
See *cryptsetup-resize*(8).
53
53
54
54
=== REFRESH
55
55
*refresh <name>*
56
56
57
-
Refreshes parameters of active mapping <name>. +
57
+
Refreshes parameters of active mapping <name>.
58
58
See *cryptsetup-refresh*(8).
59
59
60
60
=== REENCRYPT
61
61
*reencrypt <device> or --active-name <name> [<new_name>]*
62
62
63
-
Run LUKS device reencryption. +
63
+
Run LUKS device reencryption.
64
64
See *cryptsetup-reencrypt*(8).
65
65
66
66
== PLAIN MODE
@@ -77,7 +77,7 @@ The following are valid plain device type actions:
77
77
*open --type plain <device> <name>* +
78
78
create <name> <device> (*OBSOLETE syntax*)
79
79
80
-
Opens (creates a mapping with) <name> backed by device <device>. +
80
+
Opens (creates a mapping with) <name> backed by device <device>.
81
81
See *cryptsetup-open*(8).
82
82
83
83
== LUKS EXTENSION
@@ -109,111 +109,111 @@ The following are valid LUKS actions:
109
109
=== FORMAT
110
110
*luksFormat <device> [<key file>]*
111
111
112
-
Initializes a LUKS partition and sets the initial passphrase (for keyslot 0). +
112
+
Initializes a LUKS partition and sets the initial passphrase (for keyslot 0).
113
113
See *cryptsetup-luksFormat*(8).
114
114
115
115
=== OPEN
116
116
*open --type luks <device> <name>* +
117
117
luksOpen <device> <name> (*old syntax*)
118
118
119
-
Opens the LUKS device <device> and sets up a mapping <name> after successful verification of the supplied passphrase. +
119
+
Opens the LUKS device <device> and sets up a mapping <name> after successful verification of the supplied passphrase.
120
120
See *cryptsetup-open*(8).
121
121
122
122
=== SUSPEND
123
123
*luksSuspend <name>*
124
124
125
-
Suspends an active device (all IO operations will block and accesses to the device will wait indefinitely) and wipes the encryption key from kernel memory. +
125
+
Suspends an active device (all IO operations will block and accesses to the device will wait indefinitely) and wipes the encryption key from kernel memory.
126
126
See *cryptsetup-luksSuspend*(8).
127
127
128
128
=== RESUME
129
129
*luksResume <name>*
130
130
131
-
Resumes a suspended device and reinstates the encryption key. +
131
+
Resumes a suspended device and reinstates the encryption key.
132
132
See *cryptsetup-luksResume*(8).
133
133
134
134
=== ADD KEY
135
135
*luksAddKey <device> [<key file with new key>]*
136
136
137
-
Adds a new passphrase using an existing passphrase. +
137
+
Adds a new passphrase using an existing passphrase.
138
138
See *cryptsetup-luksAddKey*(8).
139
139
140
140
=== REMOVE KEY
141
141
*luksRemoveKey <device> [<key file with passphrase to be removed>]*
142
142
143
-
Removes the supplied passphrase from the LUKS device. +
143
+
Removes the supplied passphrase from the LUKS device.
144
144
See *cryptsetup-luksRemoveKey*(8).
145
145
146
146
=== CHANGE KEY
147
147
*luksChangeKey <device> [<new key file>]*
148
148
149
-
Changes an existing passphrase. +
149
+
Changes an existing passphrase.
150
150
See *cryptsetup-luksChangeKey*(8).
151
151
152
152
=== CONVERT KEY
153
153
*luksConvertKey <device>*
154
154
155
-
Converts an existing LUKS2 keyslot to new PBKDF parameters. +
155
+
Converts an existing LUKS2 keyslot to new PBKDF parameters.
156
156
See *cryptsetup-luksConvertKey*(8).
157
157
158
158
=== KILL SLOT
159
159
*luksKillSlot <device> <number>*
160
160
161
-
Wipe the keyslot with the <number> from the LUKS device. +
161
+
Wipe the keyslot with the <number> from the LUKS device.
162
162
See *cryptsetup-luksKillSlot*(8).
163
163
164
164
=== ERASE
165
165
*erase <device>* +
166
166
luksErase <device> (*old syntax*)
167
167
168
-
Erase all keyslots and make the LUKS container permanently inaccessible. +
168
+
Erase all keyslots and make the LUKS container permanently inaccessible.
169
169
See *cryptsetup-erase*(8).
170
170
171
171
=== UUID
172
172
*luksUUID <device>*
173
173
174
-
Print or set the UUID of a LUKS device. +
174
+
Print or set the UUID of a LUKS device.
175
175
See *cryptsetup-luksUUID*(8).
176
176
177
177
=== IS LUKS
178
178
*isLuks <device>*
179
179
180
-
Returns true, if <device> is a LUKS device, false otherwise. +
180
+
Returns true, if <device> is a LUKS device, false otherwise.
Opens the loop-AES <device> and sets up a mapping <name>. +
227
+
Opens the loop-AES <device> and sets up a mapping <name>.
228
228
See *cryptsetup-open*(8).
229
229
230
230
See also section 7 of the FAQ and http://loop-aes.sourceforge.net[loop-AES] for more information regarding loop-AES.
@@ -268,13 +268,13 @@ The reason is that if there were any protection, it would require some metadata
268
268
*open --type tcrypt <device> <name>* +
269
269
tcryptOpen_ <device> <name> (*old syntax*)
270
270
271
-
Opens the TCRYPT (a TrueCrypt-compatible) <device> and sets up a mapping <name>. +
271
+
Opens the TCRYPT (a TrueCrypt-compatible) <device> and sets up a mapping <name>.
272
272
See *cryptsetup-open*(8).
273
273
274
274
=== DUMP
275
275
*tcryptDump <device>*
276
276
277
-
Dump the header information of a TCRYPT device. +
277
+
Dump the header information of a TCRYPT device.
278
278
See *cryptsetup-tcryptDump*(8).
279
279
280
280
See also https://en.wikipedia.org/wiki/TrueCrypt[TrueCrypt] and https://en.wikipedia.org/wiki/VeraCrypt[VeraCrypt] pages for more information.
@@ -305,13 +305,13 @@ Other unlocking methods (TPM, SmartCard) are not supported.
305
305
*open --type bitlk <device> <name>* +
306
306
bitlkOpen <device> <name> (*old syntax*)
307
307
308
-
Opens the BITLK (a BitLocker-compatible) <device> and sets up a mapping <name>. +
308
+
Opens the BITLK (a BitLocker-compatible) <device> and sets up a mapping <name>.
309
309
See *cryptsetup-open*(8).
310
310
311
311
=== DUMP
312
312
*bitlkDump <device>*
313
313
314
-
Dump the header information of a BITLK device. +
314
+
Dump the header information of a BITLK device.
315
315
See *cryptsetup-bitlkDump*(8).
316
316
317
317
Please note that cryptsetup does not use any Windows BitLocker code; please report all problems related to this compatibility extension to the cryptsetup project.
@@ -338,7 +338,7 @@ Other unlocking methods are not supported.
338
338
*open --type fvault2 <device> <name>* +
339
339
fvault2Open <device> <name> (*old syntax*)
340
340
341
-
Opens the FVAULT2 (a FileVault2-compatible) <device> (usually the second partition on the device) and sets up a mapping <name>. +
341
+
Opens the FVAULT2 (a FileVault2-compatible) <device> (usually the second partition on the device) and sets up a mapping <name>.
342
342
See *cryptsetup-open*(8).
343
343
344
344
== SED (Self Encrypting Drive) OPAL EXTENSION
@@ -378,13 +378,13 @@ Additionally specify --hw-opal-factory-reset for a FULL factory reset of the dri
378
378
*repair <device>*
379
379
380
380
Tries to repair the device metadata if possible.
381
-
Currently supported only for LUKS device type. +
381
+
Currently supported only for LUKS device type.
382
382
See *cryptsetup-repair*(8).
383
383
384
384
=== BENCHMARK
385
385
*benchmark <options>*
386
386
387
-
Benchmarks, ciphers and KDF (key derivation function). +
387
+
Benchmarks, ciphers and KDF (key derivation function).
388
388
See *cryptsetup-benchmark*(8).
389
389
390
390
== PLAIN DM-CRYPT OR LUKS?
@@ -591,9 +591,9 @@ For LUKS on-disk metadata specification, see https://gitlab.com/cryptsetup/crypt
591
591
592
592
== AUTHORS
593
593
594
-
Cryptsetup was originally written by mailto:[email protected][Jana Saout]. +
595
-
The LUKS extensions and original man page were written by mailto:[email protected][Clemens Fruhwirth]. +
0 commit comments