File: cryptmount.8.in

package info (click to toggle)
cryptmount 6.3.0-1
  • links: PTS
  • area: main
  • in suites: forky, sid, trixie
  • size: 1,208 kB
  • sloc: ansic: 6,249; sh: 2,478; makefile: 159; sed: 16
file content (438 lines) | stat: -rw-r--r-- 12,701 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
.\" cryptmount manual page
.\" (C)Copyright 2005-2024 RW Penney
.\"
.TH CRYPTMOUNT 8 "2024-07-21" "@PACKAGE_VERSION@" "User commands"
.SH NAME
cryptmount \- mount/unmount/configure an encrypted filesystem

.\" --------------------------------
.SH SYNOPSIS

.BI "cryptmount \fITARGET\fR [\fITARGET ...\fR]"
.LP
.BI "cryptmount \-\-unmount \fITARGET\fR [\fITARGET ...\fR]"
.LP
.BI "cryptmount \-\-change\-password \fITARGET\fR"
.LP
.BI "cryptmount \-\-generate\-key \fISIZE\fP \fITARGET\fR"
___DELETE_CSWAP_0
.LP
.BI "cryptmount \-\-swapon \fITARGET\fR"
.LP
.BI "cryptmount \-\-swapoff \fITARGET\fR"
___END_CSWAP_0


.\" --------------------------------
.SH DESCRIPTION

.B cryptmount
allows an encrypted filesystem to be mounted or unmounted,
without requiring superuser privileges,
and assists the superuser in creating new encrypted filesystems.
After initial configuration of the filesystem by the system administrator,
the user needs only to provide the decryption password
for that filing system in order for
.B cryptmount
to automatically configure device-mapper and loopback targets
before mounting the filesystem.

.B cryptmount
was written in response to differences between
the newer device-mapper infrastructure of the linux-2.6 kernel series,
and the older cryptoloop infrastructure which allowed ordinary users
access to encrypted filesystems directly through
.B mount
(8).


.\" --------------------------------
.SH OPTIONS

.TP
.B \-a \-\-all
act on all available targets, e.g. for mounting all targets.
.TP
.B \-m \-\-mount
mount the specified target, configuring any required device-mapper
or loopback devices.
The user will be asked to supply a password to unlock
the decryption key for the filesystem.
.TP
.B \-u \-\-unmount
unmount the specified target, and deconfigure any underlying device-mapper
or loopback devices.
No password is required, although the operation will fail
if the filesystem is in use, or if a non-root user tries
to unmount a filesystem mounted by a different user.
.TP
.B \-S \-\-status
provide information on whether the specified target is currently mounted or not
.TP
.B \-l \-\-list
lists all available targets, including basic information
about the filesystem and mount point of each.
.TP
.B \-c \-\-change\-password
change the password protecting the decryption key for a given filesystem.
.TP
.B \-g \-\-generate\-key "\fIsize\fP"
setup a decryption key for a new filesystem.
.IR size\fP
gives the length of the key in bytes.
.TP
.B \-e \-\-reuse\-key "\fIexisting-target\fP"
setup a decryption key for a new filesystem,
using an existing key from another filesystem,
for example to translate between different file-formats
for storing a single key.
This option is only available to the superuser.
.TP
.B \-f \-\-config\-fd "\fInum\fP"
read configuration information about targets from file-descriptor
.IR num\fP
instead of the default configuration file.
This option is only available to the superuser.
.TP
.B \-w \-\-passwd\-fd "\fInum\fP"
read passwords from file-descriptor
.IR num\fP
instead of from the terminal,
e.g. for using cryptmount within scripts or GUI wrappers.
Each password is read once only,
in contrast to terminal-based operation
where new passwords would be requested twice for verification.
.TP
.B \-p \-\-prepare
prepare all the device-mapper and loopback devices needed to access a target, but do not mount.
This is intended to allow the superuser to install a filesystem on an encrypted device.
.TP
.B \-r \-\-release
releases all device-mapper and loopback devices associated with a particular target. This option is only available to the superuser.
___DELETE_CSWAP_0
.TP
.B \-s \-\-swapon
enable the specified target for paging and swapping.
This option is only available to the superuser.
.TP
.B \-x \-\-swapoff
disable the specified target for paging and swapping.
This option is only available to the superuser.
___END_CSWAP_0
.TP
.B \-k \-\-key-managers
list all the available formats for protecting the filesystem access keys.
.TP
.B \-B \-\-system-boot
setup all targets which have declared a "bootaction" parameter.
This will typically be used to automatically mount encrypted filesystems,
or setup encrypted swap partitions, on system startup.
This option is only available to the superuser.
.TP
.B \-Q \-\-system-shutdown
close-down all targets which have declared a "bootaction" parameter.
This is essentially the opposite of the "\-\-system-boot" option.
.TP
.B \-n \-\-safetynet
attempts to close-down any mounted targets that should normally have been
shutdown with \-\-unmount or \-\-swapoff.
This option is only available to the superuser, and intended
.B exclusively
for use during shutdown/reboot of the operating system.
.TP
.B \-v \-\-version
show the version-number of the installed program.


.\" --------------------------------
.SH RETURN CODES
.B cryptmount
returns zero on success.
A non-zero value indicates a failure of some form, as follows:
.TP
.B 1
unrecognized command-line option;
.TP
.B 2
unrecognized filesystem target name;
.TP
.B 3
failed to execute helper program;
.TP
.B 100
insufficient privilege;
.TP
.B 101
security failure in installation.


.\" --------------------------------
.SH EXAMPLE USAGE

In order to create a new encrypted filesystem managed by cryptmount,
you can use the supplied 'cryptmount-setup' program,
which can be used by the superuser to interactively configure a basic setup.

Alternatively, a manual setup allows more control of configuration settings.
Before doing so, one should ensure that kernel support for /dev/loop
and /dev/mapper is available, e.g. via
.sp
.nf
    modprobe \-a loop dm\-crypt
.fi

Now suppose that we wish to setup a new encrypted filesystem,
that will have a target-name of "opaque".
If we have a free disk partition available, say /dev/sdb63, then we can use this directly to store the encrypted filesystem.
Alternatively, if we want to store the encrypted filesystem within an ordinary file, we need to create space using a recipe such as:
.sp
.nf
    dd if=/dev/zero of=/home/opaque.fs bs=1M count=512
.fi
.sp
and then replace all occurrences of '/dev/sdb63' in the following
with '/home/opaque.fs'.
(/dev/urandom can be used in place of /dev/zero, debatably for extra security,
but is rather slower.)

First, we need to add an entry in @CM_SYSCONF_DIR@/cmtab,
which describes the encryption that will be used
to protect the filesystem itself and the access key, as follows:
.sp
.nf
    opaque {
        dev=/dev/sdb63 dir=/home/crypt
        fstype=ext2 mountoptions=defaults cipher=twofish
        keyfile=@CM_SYSCONF_DIR@/opaque.key
        keyformat=builtin
    }
.fi

Here, we will be using the "twofish" algorithm to encrypt
the filesystem itself,
with the built-in key-manager being used
to protect the decryption key (to be stored in @CM_SYSCONF_DIR@/opaque.key).

In order to generate a secret decryption key (in @CM_SYSCONF_DIR@/opaque.key)
that will be used to encrypt the filesystem itself,
we can execute, as root:
.sp
.nf
    cryptmount \-\-generate\-key 32 opaque
.fi

This will generate a 32-byte (256-bit) key,
which is known to be supported by the Twofish cipher algorithm,
and store it in encrypted form
after asking the system administrator for a password.

If we now execute, as root:
.sp
.nf
    cryptmount \-\-prepare opaque
.fi
.sp
we will then be asked for the password that we used when setting up
@CM_SYSCONF_DIR@/opaque.key, which will enable
.B cryptmount
to setup a device-mapper target (/dev/disk/by-id/dm-name-opaque).
(If you receive an error message of the form
.B "device-mapper ioctl cmd 9 failed: Invalid argument",
this may mean that you have chosen a key-size that isn't supported
by your chosen cipher algorithm.
You can get some information about suitable key-sizes
by checking the output from "more /proc/crypto", and looking at the
"min keysize" and "max keysize" fields.)


We can now use standard tools to create the actual filesystem on /dev/disk/by-id/dm-name-opaque:
.sp
.nf
    mke2fs /dev/disk/by-id/dm-name-opaque
.fi
.sp
(It may be advisable, after the filesystem is first mounted,
to check that the permissions of the top-level directory
created by mke2fs are appropriate for your needs.)

After executing
.sp
.nf
    cryptmount \-\-release opaque
    mkdir /home/crypt
.fi
.sp
the encrypted filesystem is ready for use.
Ordinary users can mount it by typing
.sp
.nf
    cryptmount \-m opaque
.fi
.sp
or
.sp
.nf
    cryptmount opaque
.fi
.sp
and unmount it using
.sp
.nf
    cryptmount \-u opaque
.fi

.B cryptmount
keeps a record of which user mounted each filesystem
in order to provide a locking mechanism to ensure that
only the same user (or root) can unmount it.


.\" --------------------------------
.SH PASSWORD CHANGING

After a filesystem has been in use for a while,
one may want to change the access password.
For an example target called "opaque", this can be performed by executing:
.sp
.nf
    cryptmount \-\-change\-password opaque
.fi

After successfully supplying the old password, one can then choose
a new password which will be used to re-encrypt the access key for the
filesystem.
(The filesystem itself is not altered or re-encrypted.)


.\" --------------------------------
.SH LUKS ENCRYPTED FILESYSTEMS

.B cryptmount
can be used to provide easy access to encrypted filesystems
compatible with the Linux Unified Key Setup (LUKS) capabilities of the
.B cryptsetup
application.

In order to access an existing LUKS partition,
an entry needs to be created within @CM_SYSCONF_DIR@/cmtab.
For example, if the hard-disk partition /dev/sdb62
is used to contain a LUKS encrypted ext3 filesystem,
an entry of the form:
.sp
.nf
    LUKS {
        keyformat=luks
        dev=/dev/sdb62          keyfile=/dev/sdb62
        dir=/home/luks-dir      fstype=ext3
    }
.fi
.sp
would allow this to be mounted via
.B cryptmount
beneath /home/luks-dir
by executing
.sp
.nf
    cryptmount LUKS
.fi

.B cryptmount
will also allow any user that knows one of the access-passwords
to change their password via
.sp
.nf
    cryptmount \-\-change-password LUKS
.fi

.B cryptmount
also provides basic support for creating new LUKS encrypted filesystems,
which can be placed within ordinary files as well as disk partitions,
via the '\-\-generate-key' recipe shown above.
However, to exploit the full range of functionality within LUKS,
such as for adding multiple passwords, one needs to use
.B cryptsetup

It is strongly recommended that you do not attempt to use LUKS support
in combination with cryptmount's features for storing
.I multiple
encrypted filesystems within a single disk partition or an ordinary file.
This is because of assumptions within the cryptsetup-luks design that
the LUKS key-material is always stored at the beginning of the disk partition.


___DELETE_FSCK_1
.\" --------------------------------
.SH FILESYSTEM MAINTENANCE

For filesystems that are mounted on system-startup,
it is normal for checks on their integrity
to be performed automatically at regular intervals,
typically every few dozen mounts.
If
.B cryptmount
has not been compiled with the '\-\-enable\-fsck' option,
such checks need to be performed manually
for filesystems managed by
.B cryptmount
, which will require the involvement of both the system administrator
and the users who know the relevant access passwords
for the filesystems involved.
Suppose that we wish to check the filesystem associated with
.B cryptmount
target 'opaque', we first need to prepare the decryption devices:
.sp
.nf
    cryptmount \-\-prepare opaque
.fi
.sp
this will create a device-mapper target accessible via '/dev/disk/by-id/dm-name-opaque', on which we can then run standard checking utilities:
.sp
.nf
    fsck \-t auto /dev/disk/by-id/dm-name-opaque
.fi

After these tests have been completed, we can then release the devices:
.sp
.nf
    cryptmount \-\-release opaque
.fi
.sp
and continue using the filesystem as before.
___END_FSCK_1


.\" --------------------------------
.SH FILES
.I @CM_SYSCONF_DIR@/cmtab
- main configuration file
.LP
.I @CM_SYSRUN_DIR@/cryptmount.status
- record of mounted filesystems


.SH "SEE ALSO"
.BR cmtab (5),
.BR cryptmount-setup (8),
.BR cryptsetup (8),
___DELETE_FSCK_1
.BR fsck (8),
___END_FSCK_1
.BR mount (8)


.\" --------------------------------
.SH BUGS
The author would be grateful for any constructive suggestions
and bug-reports, via https://github.com/rwpenney/cryptmount/issues


.\" --------------------------------
.SH COPYRIGHT NOTICE
.B cryptmount
is Copyright 2005-2024, RW Penney
.br
and is supplied with NO WARRANTY.
Licencing terms are as described in the file "COPYING"
within the cryptmount source distribution.

.\" vim: set ts=4 sw=4 et: