File: cmtab.example

package info (click to toggle)
cryptmount 6.3.0-1
  • links: PTS
  • area: main
  • in suites: forky, sid, trixie
  • size: 1,208 kB
  • sloc: ansic: 6,249; sh: 2,478; makefile: 159; sed: 16
file content (48 lines) | stat: -rw-r--r-- 1,484 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
# Sample configuration file for cryptmount

# The following target uses a raw file to act as a LUKS encrypted container.
# cryptmount will automatically configure a vacant loopback device on mounting
crypt_basic {
    dev=/home/crypt.fs
    dir=/home/some_username/crypt
    fstype=ext4
    keyformat=luks
}

# The following target uses a raw file to contain the encrypted fs
# but uses a separate key-file managed via libgcrypt
crypt_detached {
    dev=/home/crypt.fs
    dir=/mnt/crypt
    fstype=ext3         mountoptions=defaults
    cipher=aes
    keyfile=/home/secretiveuser/crypt.key
    keyformat=libgcrypt
}


# The following target uses part of a raw disk partition as the encrypted fs:
# (sectors 512-16895 are used here. Remove the 'startsector' and 'numsector'
# parameters to use the whole partition.)
crypt_sdb63 {
    dev=/dev/sdb63      startsector=512 numsectors=16384
    dir=/mnt/crypt63
    fstype=ext3         mountoptions=defaults \
    cipher=serpent      # filesystem encryption

    # information about file used to store decryption key:
    keyfile=/etc/cryptmount/crypt_sdb63.key
    keyformat=openssl-compat keyhash=md5 keycipher=bf-cbc
}


# The following target uses part of a raw disk partition to create
# an encrypted swap (paging) area.
crypto_swap {
    dev=/dev/sdb63      startsector=16896 numsectors=1024
    fstype=swap         flags=mkswap
    cipher=twofish
    keyfile=/dev/random        keymaxlen=16
    keyformat=raw
    bootaction=swap
}