From a2b9e9b1348ac6e5c77a28146560b7380551d609 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Nicol=C3=A1s=20Reynolds?= Date: Sat, 29 Jan 2011 17:48:43 -0300 Subject: filesystem-2010.12-2 --- libre-testing/filesystem/crypttab | 33 +++++++++++++++++++++++++++++++++ 1 file changed, 33 insertions(+) create mode 100644 libre-testing/filesystem/crypttab (limited to 'libre-testing/filesystem/crypttab') diff --git a/libre-testing/filesystem/crypttab b/libre-testing/filesystem/crypttab new file mode 100644 index 000000000..dd6994b5a --- /dev/null +++ b/libre-testing/filesystem/crypttab @@ -0,0 +1,33 @@ +# crypttab: Mappings for encrypted partitions +# +# Each mapped device will be created in /dev/mapper, so your /etc/fstab +# should use the /dev/mapper/{NAME} paths for encrypted devices. +# +# Each PASSWORD field can be an absolute pathname to a key file (starting +# with a slash, recommended) or a literal string that will be used as +# a passphrase. To use special characters in the passphrase, surround it +# by quotes, the usual bash quoting rules apply. +# There are two special keywords that cannot be used as passphrases: +# - ASK ask for a passphrase on boot +# - SWAP use a random key and create a swapspace afterwards +# WARNING: use the SWAP keyword carefully, as it overwrites the data +# on the specified partition +# +# To create a key file: +# hashalot -n 32 ripemd160 >/etc/crytfs.key +# or +# dd if=/dev/urandom of=/etc/cryptfs.key bs=256 count=1 +# +# To pass additional options to cryptsetup for non-LUKS partitions, use the +# fourth column. +# +# NOTE: Do not list your root (/) partition here, it must be set up +# beforehand by the initramfs (/etc/mkinitcpio.conf). + + +# NAME SOURCE DEVICE PASSWORD OPTIONS +#home /dev/hda4 mypassword +#data1 /dev/hda3 "my \"password\"" +#data2 /dev/hda5 /etc/cryptfs.key +#swap /dev/hdx4 SWAP -c aes-cbc-essiv:sha256 -s 256 +#vol /dev/hdb7 ASK -- cgit v1.2.3-2-g168b