File: cmtab.example

package info (click to toggle)
cryptmount 5.0-2
  • links: PTS
  • area: main
  • in suites: jessie, jessie-kfreebsd
  • size: 1,948 kB
  • ctags: 584
  • sloc: ansic: 6,235; sh: 5,342; makefile: 221; sed: 16
file content (40 lines) | stat: -rw-r--r-- 1,304 bytes parent folder | download | duplicates (3)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
# Sample configuration file for cryptmount

# the following target uses a raw file to contain the encrypted fs
# (e.g. created by "dd if=/dev/zero of=/home/crypt.fs bs=1M count=128)
# cryptmount will automatically configure a vacant loopback device on mounting
crypt_basic {
    dev=/home/crypt.fs
    dir=/mnt/crypt
    fstype=ext2         mountoptions=defaults
    cipher=aes
    keyfile=/home/secretiveuser/crypt.key
    keyformat=builtin
}


# the following target uses part of a raw disk partition as the encrypted fs:
# (sectors 512-16895 are used here. Remove the 'startsector' and 'numsector'
# parameters to use the whole partition.)
crypt_hdb63 {
    dev=/dev/hdb63      startsector=512 numsectors=16384
    dir=/mnt/crypt63
    fstype=ext3         mountoptions=defaults \
    cipher=serpent      # filesystem encryption

    # information about file used to store decryption key:
    keyfile=/etc/cryptmount/crypt_hdb63.key
    keyformat=openssl keyhash=md5 keycipher=bf-cbc
}


# the following target uses part of a raw disk partition to create
# an encrypted swap (paging) area.
crypto_swap {
    dev=/dev/hdb63      startsector=16896 numsectors=1024
    fstype=swap         flags=mkswap
    cipher=twofish
    keyfile=/dev/random        keymaxlen=16
    keyformat=raw
    bootaction=swap
}