cryptsetup-luks
Follow these steps to when using cryptsetup-luks:
Creating
# cryptsetup luksFormat /dev/partition # cryptsetup luksOpen /dev/partition label # mke2fs -j /dev/mapper/label # mount /dev/mapper/label /mnt/label
Mounting
Of course later you don’t have to use luksFormat and mke2fs:
# cryptsetup luksOpen /dev/partition label # mount /dev/mapper/label /mnt/label
Umounting
# umount /mnt/label # cryptsetup luksClose label
Encrypting your home partition
Note
|
You have need to install the sharutils package to do the followings! |
-
List these modules in /etc/sysconfig/modules:
aes aes-i586 sha256 dm-crypt
-
Move all data from /home to a secure place (in this example /media/sda1/home)
# cp -arvx /home /media/sda1/
-
Umount /home (in this example /dev/hda6) and fill it with random numbers:
# umount /home # dd if=/dev/urandom of=/dev/hda6
-
Create the encrypted partition:
# cryptsetup -y luksFormat /dev/hda6
Here we will be asked for a password which will be necessary to access /home at boot time.
-
Open the encrypted partition and create its file system (ext3 in this example):
# cryptsetup luksOpen /dev/hda6 home # mkfs.ext3 /dev/mapper/home
-
Mount the home partition and copy the contents of original home:
# mount /dev/mapper/home /home # cp -arvx /media/sda1/home /home
-
Edit the home related line in /etc/fstab:
/dev/mapper/home /home ext3 noatime 0 0
-
Create /etc/rc.d/rc.crypt script with the following content:
#!/bin/sh /usr/sbin/cryptsetup luksOpen /dev/hda6 home /bin/mount /dev/mapper/home /home
-
Enable it:
# ln -s /etc/rc.d/rc.crypt /etc/rc.d/rcS.d/S15rc.crypt
You have to delay the splash screen, so that you can type your password before the splash appears:
# mv /etc/rc.d/rcS.d/S03rc.splash /etc/rc.d/rcS.d/S15rc.splash
(It will ask the password between the lvm and the splash service.)
Now the system can be restarted and the password will be asked to access home partition boot-time.
Note
|
The English keyboard map will be used at that point of the boot process. |