Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- cat /etc/conf.d/dmcrypt
- # /etc/conf.d/dmcrypt
- # For people who run dmcrypt on top of some other layer (like raid),
- # use rc_need to specify that requirement. See the runscript(8) man
- # page for more information.
- #--------------------
- # Instructions
- #--------------------
- # Note regarding the syntax of this file. This file is *almost* bash,
- # but each line is evaluated separately. Separate swaps/targets can be
- # specified. The init-script which reads this file assumes that a
- # swap= or target= line starts a new section, similar to lilo or grub
- # configuration.
- # Note when using gpg keys and /usr on a separate partition, you will
- # have to copy /usr/bin/gpg to /bin/gpg so that it will work properly
- # and ensure that gpg has been compiled statically.
- # See http://bugs.gentoo.org/90482 for more information.
- # Note that the init-script which reads this file detects whether your
- # partition is LUKS or not. No mkfs is run unless you specify a makefs
- # option.
- # Global options:
- #----------------
- # Max number of checks to perform (1 per second)
- #dmcrypt_max_timeout=120
- # Arguments:
- #-----------
- # target=<name> == Mapping name for partition.
- # swap=<name> == Mapping name for swap partition.
- # source='<dev>' == Real device for partition.
- # key='</path/to/keyfile>[:<mode>]' == Fullpath from / or from inside removable media.
- # remdev='<dev>' == Device that will be assigned to removable media.
- # gpg_options='<opts>' == Default are --quiet --decrypt
- # options='<opts>' == cryptsetup, for LUKS you can only use --readonly
- # loop_file='<file>' == Loopback file.
- # pre_mount='cmds' == commands to execute before mounting partition.
- # post_mount='cmds' == commands to execute after mounting partition.
- #-----------
- # Supported Modes
- # gpg == decrypt and pipe key into cryptsetup.
- # Note: new-line character must not be part of key.
- # Command to erase \n char: 'cat key | tr -d '\n' > cleanKey'
- #--------------------
- # dm-crypt examples
- #--------------------
- ## swap
- # Swap partitions. These should come first so that no keys make their
- # way into unencrypted swap.
- # If no options are given, they will default to: -c aes -h sha1 -d /dev/urandom
- # If no makefs is given then mkswap will be assumed
- #swap=crypt-swap
- #source='/dev/hda2'
- swap=crypt-swap
- source='/dev/disk/by-id/ata-SAMSUNG_HN-M234MBB_S1R1J1MBA12345-part4'
- ## /home with passphrase
- #target=crypt-home
- #source='/dev/hda5'
- ## /home with regular keyfile
- #target=crypt-home
- #source='/dev/hda5'
- #key='/full/path/to/homekey'
- ## /home with gpg protected key
- #target=crypt-home
- #source='/dev/hda5'
- #key='/full/path/to/homekey:gpg'
- ## /home with regular keyfile on removable media(such as usb-stick)
- #target=crypt-home
- #source='/dev/hda5'
- #key='/full/path/to/homekey'
- #remdev='/dev/sda1'
- ##/home with gpg protected key on removable media(such as usb-stick)
- #target=crypt-home
- #source='/dev/hda5'
- #key='/full/path/to/homekey:gpg'
- #remdev='/dev/sda1'
- ##/tmp with regular keyfile
- #target=crypt-tmp
- #source='/dev/hda6'
- #key='/full/path/to/tmpkey'
- #pre_mount='/sbin/mkreiserfs -f -f ${dev}'
- #post_mount='chown root:root ${mount_point}; chmod 1777 ${mount_point}'
- ## Loopback file example
- #mount='crypt-loop-home'
- #source='/dev/loop0'
- #loop_file='/mnt/crypt/home'
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement