diff --git a/man/cryptsetup-luksHeaderBackup.8.adoc b/man/cryptsetup-luksHeaderBackup.8.adoc index d31adb82..6538642f 100644 --- a/man/cryptsetup-luksHeaderBackup.8.adoc +++ b/man/cryptsetup-luksHeaderBackup.8.adoc @@ -16,11 +16,12 @@ cryptsetup-luksHeaderBackup - store a binary backup of the LUKS header and keysl == DESCRIPTION -Stores a binary backup of the LUKS header and keyslot area. + -*NOTE:* Using '-' as a filename writes the header backup to a file named '-'. +Stores a binary backup of the LUKS header and keyslot area. ** can be [--header, --header-backup-file, --disable-locks]. +*NOTE:* Using '-' as a filename writes the header backup to a file named '-'. + *WARNING:* This backup file and a passphrase valid at the time of backup allow decryption of the LUKS data area, even if the passphrase was later changed or removed from the LUKS device. Also, note that with a header backup, you lose the ability to wipe the LUKS device securely by just overwriting the header and keyslots. You must either securely erase all header backups or overwrite the encrypted data area. diff --git a/man/cryptsetup-luksHeaderRestore.8.adoc b/man/cryptsetup-luksHeaderRestore.8.adoc index 59d06f0e..bc0ea066 100644 --- a/man/cryptsetup-luksHeaderRestore.8.adoc +++ b/man/cryptsetup-luksHeaderRestore.8.adoc @@ -16,11 +16,12 @@ cryptsetup-luksHeaderRestore - restore a binary backup of the LUKS header and ke == DESCRIPTION -Restores a binary backup of the LUKS header and keyslot area from the specified file. + -*NOTE:* Using '-' as a filename reads the header backup from a file named '-'. +Restores a binary backup of the LUKS header and keyslot area from the specified file. ** can be [--header, --header-backup-file, --disable-locks]. +*NOTE:* Using '-' as a filename reads the header backup from a file named '-'. + *WARNING:* Header and keyslots will be replaced; only the passphrases from the backup will work afterward. This command requires that the volume key size and data offset of the LUKS header already on the device and the header backup match. diff --git a/man/cryptsetup-luksUUID.8.adoc b/man/cryptsetup-luksUUID.8.adoc index 72a2e2b4..3ead583b 100644 --- a/man/cryptsetup-luksUUID.8.adoc +++ b/man/cryptsetup-luksUUID.8.adoc @@ -16,7 +16,8 @@ cryptsetup-luksUUID - print or set the UUID of a LUKS device == DESCRIPTION -Print the UUID of a LUKS device. + +Print the UUID of a LUKS device. + Set new UUID if --uuid option is specified. ** can be [--header, --uuid, --type, --disable-locks]. diff --git a/man/cryptsetup-open.8.adoc b/man/cryptsetup-open.8.adoc index 83596bea..83fcb8bf 100644 --- a/man/cryptsetup-open.8.adoc +++ b/man/cryptsetup-open.8.adoc @@ -38,7 +38,7 @@ create (OBSOLETE syntax) Opens (creates a mapping with) backed by device . -*WARNING:* You should always specify options --cipher, --key-size and (if no keyfile or keyring is used) then also --hash to avoid incompatibility, as default values can differ in older cryptsetup versions. + +*WARNING:* You should always specify options --cipher, --key-size and (if no keyfile or keyring is used) then also --hash to avoid incompatibility, as default values can differ in older cryptsetup versions. The plain format also allows retrieving a volume key from a kernel keyring specified by --volume-key-keyring. The key in the kernel keyring must be configured before issuing cryptsetup commands, as cryptsetup does not upload any keys to the keyring in plain mode. @@ -82,13 +82,11 @@ loopaesOpen --key-file (old syntax) Opens the loop-AES and sets up a mapping . -If the key file is encrypted with GnuPG, then you have to use --key-file=- and decrypt it before use, e.g., like this: + -gpg --decrypt | cryptsetup loopaesOpen --key-file=- - +If the key file is encrypted with GnuPG, then you have to use --key-file=- and decrypt it before use, e.g., like this: +*gpg --decrypt | cryptsetup loopaesOpen --key-file=- *. -*WARNING:* The loop-AES extension cannot use the direct input of the key file on the real terminal because the keys are separated by end-of-line, and only part of the multi-key file would be read. + -If you need it in script, just use the pipe redirection: + -echo $keyfile | cryptsetup loopaesOpen --key-file=- +*WARNING:* The loop-AES extension cannot use the direct input of the key file on the real terminal because the keys are separated by end-of-line, and only part of the multi-key file would be read. +If you need it in script, just use the pipe redirection: *echo $keyfile | cryptsetup loopaesOpen --key-file=- *. Use --keyfile-size to specify the proper key length if needed. diff --git a/man/cryptsetup.8.adoc b/man/cryptsetup.8.adoc index 4b3c9620..842987df 100644 --- a/man/cryptsetup.8.adoc +++ b/man/cryptsetup.8.adoc @@ -30,37 +30,37 @@ The following are valid actions for all supported device types. === OPEN *open --type * -Opens (creates a mapping with) backed by device . + +Opens (creates a mapping with) backed by device . See *cryptsetup-open*(8). === CLOSE *close * -Removes the existing mapping and wipes the key from kernel memory. + +Removes the existing mapping and wipes the key from kernel memory. See *cryptsetup-close*(8). === STATUS *status * -Reports the status for the mapping . + +Reports the status for the mapping . See *cryptsetup-status*(8). === RESIZE *resize * -Resizes an active mapping . + +Resizes an active mapping . See *cryptsetup-resize*(8). === REFRESH *refresh * -Refreshes parameters of active mapping . + +Refreshes parameters of active mapping . See *cryptsetup-refresh*(8). === REENCRYPT *reencrypt or --active-name []* -Run LUKS device reencryption. + +Run LUKS device reencryption. See *cryptsetup-reencrypt*(8). == PLAIN MODE @@ -77,7 +77,7 @@ The following are valid plain device type actions: *open --type plain * + create (*OBSOLETE syntax*) -Opens (creates a mapping with) backed by device . + +Opens (creates a mapping with) backed by device . See *cryptsetup-open*(8). == LUKS EXTENSION @@ -109,111 +109,111 @@ The following are valid LUKS actions: === FORMAT *luksFormat []* -Initializes a LUKS partition and sets the initial passphrase (for keyslot 0). + +Initializes a LUKS partition and sets the initial passphrase (for keyslot 0). See *cryptsetup-luksFormat*(8). === OPEN *open --type luks * + luksOpen (*old syntax*) -Opens the LUKS device and sets up a mapping after successful verification of the supplied passphrase. + +Opens the LUKS device and sets up a mapping after successful verification of the supplied passphrase. See *cryptsetup-open*(8). === SUSPEND *luksSuspend * -Suspends an active device (all IO operations will block and accesses to the device will wait indefinitely) and wipes the encryption key from kernel memory. + +Suspends an active device (all IO operations will block and accesses to the device will wait indefinitely) and wipes the encryption key from kernel memory. See *cryptsetup-luksSuspend*(8). === RESUME *luksResume * -Resumes a suspended device and reinstates the encryption key. + +Resumes a suspended device and reinstates the encryption key. See *cryptsetup-luksResume*(8). === ADD KEY *luksAddKey []* -Adds a new passphrase using an existing passphrase. + +Adds a new passphrase using an existing passphrase. See *cryptsetup-luksAddKey*(8). === REMOVE KEY *luksRemoveKey []* -Removes the supplied passphrase from the LUKS device. + +Removes the supplied passphrase from the LUKS device. See *cryptsetup-luksRemoveKey*(8). === CHANGE KEY *luksChangeKey []* -Changes an existing passphrase. + +Changes an existing passphrase. See *cryptsetup-luksChangeKey*(8). === CONVERT KEY *luksConvertKey * -Converts an existing LUKS2 keyslot to new PBKDF parameters. + +Converts an existing LUKS2 keyslot to new PBKDF parameters. See *cryptsetup-luksConvertKey*(8). === KILL SLOT *luksKillSlot * -Wipe the keyslot with the from the LUKS device. + +Wipe the keyslot with the from the LUKS device. See *cryptsetup-luksKillSlot*(8). === ERASE *erase * + luksErase (*old syntax*) -Erase all keyslots and make the LUKS container permanently inaccessible. + +Erase all keyslots and make the LUKS container permanently inaccessible. See *cryptsetup-erase*(8). === UUID *luksUUID * -Print or set the UUID of a LUKS device. + +Print or set the UUID of a LUKS device. See *cryptsetup-luksUUID*(8). === IS LUKS *isLuks * -Returns true, if is a LUKS device, false otherwise. + +Returns true, if is a LUKS device, false otherwise. See *cryptsetup-isLuks*(8). === DUMP *luksDump * -Dump the header information of a LUKS device. + +Dump the header information of a LUKS device. See *cryptsetup-luksDump*(8). === HEADER BACKUP *luksHeaderBackup --header-backup-file * -Stores a binary backup of the LUKS header and keyslot area. + +Stores a binary backup of the LUKS header and keyslot area. See *cryptsetup-luksHeaderBackup*(8). === HEADER RESTORE *luksHeaderRestore --header-backup-file * -Restores a binary backup of the LUKS header and keyslot area from the specified file. + +Restores a binary backup of the LUKS header and keyslot area from the specified file. See *cryptsetup-luksHeaderRestore*(8). === TOKEN *token * -Manipulate token objects used for obtaining passphrases. + +Manipulate token objects used for obtaining passphrases. See *cryptsetup-token*(8). === CONVERT *convert --type * -Converts the device between LUKS1 and LUKS2 format (if possible). + +Converts the device between LUKS1 and LUKS2 format (if possible). See *cryptsetup-convert*(8). === CONFIG *config * -Set permanent configuration options (store to LUKS header). + +Set permanent configuration options (store to LUKS header). See *cryptsetup-config*(8). == loop-AES EXTENSION @@ -224,7 +224,7 @@ Cryptsetup supports mapping a loop-AES encrypted partition using a compatibility *open --type loopaes --key-file * + loopaesOpen --key-file (*old syntax*) -Opens the loop-AES and sets up a mapping . + +Opens the loop-AES and sets up a mapping . See *cryptsetup-open*(8). See also section 7 of the FAQ and http://loop-aes.sourceforge.net[loop-AES] for more information regarding loop-AES. @@ -268,13 +268,13 @@ The reason is that if there were any protection, it would require some metadata *open --type tcrypt * + tcryptOpen_ (*old syntax*) -Opens the TCRYPT (a TrueCrypt-compatible) and sets up a mapping . + +Opens the TCRYPT (a TrueCrypt-compatible) and sets up a mapping . See *cryptsetup-open*(8). === DUMP *tcryptDump * -Dump the header information of a TCRYPT device. + +Dump the header information of a TCRYPT device. See *cryptsetup-tcryptDump*(8). See also https://en.wikipedia.org/wiki/TrueCrypt[TrueCrypt] and https://en.wikipedia.org/wiki/VeraCrypt[VeraCrypt] pages for more information. @@ -305,13 +305,13 @@ Other unlocking methods (TPM, SmartCard) are not supported. *open --type bitlk * + bitlkOpen (*old syntax*) -Opens the BITLK (a BitLocker-compatible) and sets up a mapping . + +Opens the BITLK (a BitLocker-compatible) and sets up a mapping . See *cryptsetup-open*(8). === DUMP *bitlkDump * -Dump the header information of a BITLK device. + +Dump the header information of a BITLK device. See *cryptsetup-bitlkDump*(8). Please note that cryptsetup does not use any Windows BitLocker code; please report all problems related to this compatibility extension to the cryptsetup project. @@ -338,7 +338,7 @@ Other unlocking methods are not supported. *open --type fvault2 * + fvault2Open (*old syntax*) -Opens the FVAULT2 (a FileVault2-compatible) (usually the second partition on the device) and sets up a mapping . + +Opens the FVAULT2 (a FileVault2-compatible) (usually the second partition on the device) and sets up a mapping . See *cryptsetup-open*(8). == SED (Self Encrypting Drive) OPAL EXTENSION @@ -378,13 +378,13 @@ Additionally specify --hw-opal-factory-reset for a FULL factory reset of the dri *repair * Tries to repair the device metadata if possible. -Currently supported only for LUKS device type. + +Currently supported only for LUKS device type. See *cryptsetup-repair*(8). === BENCHMARK *benchmark * -Benchmarks, ciphers and KDF (key derivation function). + +Benchmarks, ciphers and KDF (key derivation function). See *cryptsetup-benchmark*(8). == PLAIN DM-CRYPT OR LUKS? @@ -591,9 +591,9 @@ For LUKS on-disk metadata specification, see https://gitlab.com/cryptsetup/crypt == AUTHORS -Cryptsetup was originally written by mailto:jana@saout.de[Jana Saout]. + -The LUKS extensions and original man page were written by mailto:clemens@endorphin.org[Clemens Fruhwirth]. + -Man page extensions by mailto:gmazyland@gmail.com[Milan Broz]. + +Cryptsetup was originally written by mailto:jana@saout.de[Jana Saout]. +The LUKS extensions and original man page were written by mailto:clemens@endorphin.org[Clemens Fruhwirth]. +Man page extensions by mailto:gmazyland@gmail.com[Milan Broz]. Man page rewrite and extension by mailto:arno@wagner.name[Arno Wagner]. include::man/common_footer.adoc[]