mirror of
https://gitlab.com/cryptsetup/cryptsetup.git
synced 2025-12-05 16:00:05 +01:00
man: Use *WARNING* only for serious issues.
Use highlighted warning only for possibility of data loss or serious security issues. No need to scary people everywhere :)
This commit is contained in:
@@ -377,7 +377,7 @@ ifdef::ACTION_LUKSFORMAT[]
|
|||||||
*--integrity-legacy-padding*::
|
*--integrity-legacy-padding*::
|
||||||
Use inefficient legacy padding.
|
Use inefficient legacy padding.
|
||||||
+
|
+
|
||||||
*WARNING*: Do not use this option until you need compatibility with a specific old kernel.
|
Do not use this option until you need compatibility with a specific old kernel.
|
||||||
endif::[]
|
endif::[]
|
||||||
|
|
||||||
ifdef::ACTION_REFRESH[]
|
ifdef::ACTION_REFRESH[]
|
||||||
@@ -464,7 +464,7 @@ ifndef::ACTION_REENCRYPT[]
|
|||||||
See section _NOTES ON PASSPHRASE PROCESSING_ in *cryptsetup*(8) for more information.
|
See section _NOTES ON PASSPHRASE PROCESSING_ in *cryptsetup*(8) for more information.
|
||||||
endif::[]
|
endif::[]
|
||||||
ifdef::ACTION_REENCRYPT[]
|
ifdef::ACTION_REENCRYPT[]
|
||||||
*WARNING:* --key-file option can be used only if there is only one active keyslot, or alternatively, also if --key-slot option is specified (then all other keyslots will be disabled in the new LUKS device).
|
The --key-file option can be used only if there is only one active keyslot, or alternatively, also if --key-slot option is specified (then all other keyslots will be disabled in the new LUKS device).
|
||||||
+
|
+
|
||||||
If this option is not used, cryptsetup will ask for all active keyslot passphrases.
|
If this option is not used, cryptsetup will ask for all active keyslot passphrases.
|
||||||
endif::[]
|
endif::[]
|
||||||
|
|||||||
@@ -31,7 +31,7 @@ The _reencrypt_ action reencrypts data on the LUKS device in-place.
|
|||||||
|
|
||||||
You can regenerate *volume key* (the real key used in on-disk encryption unlocked by passphrase), *cipher*, *cipher mode* or *encryption sector size* (LUKS2 only).
|
You can regenerate *volume key* (the real key used in on-disk encryption unlocked by passphrase), *cipher*, *cipher mode* or *encryption sector size* (LUKS2 only).
|
||||||
|
|
||||||
*WARNING:* If you need to use both luksChangeKey and reencrypt (e.g., to recover from a leak), you need to use them in that order to avoid leaking the new volume key.
|
If you need to use both luksChangeKey and reencrypt (e.g., to recover from a leak), you need to use them in that order to avoid leaking the new volume key.
|
||||||
|
|
||||||
The reencryption process may be safely interrupted by a user via SIGINT signal (ctrl+c).
|
The reencryption process may be safely interrupted by a user via SIGINT signal (ctrl+c).
|
||||||
The same applies to the SIGTERM signal (i.e., issued by systemd during system shutdown).
|
The same applies to the SIGTERM signal (i.e., issued by systemd during system shutdown).
|
||||||
|
|||||||
@@ -563,7 +563,7 @@ Albeit Linux kernel 5.7 added TRIM support for standalone dm-integrity devices,
|
|||||||
Some integrity modes require two independent keys (a key for encryption and authentication).
|
Some integrity modes require two independent keys (a key for encryption and authentication).
|
||||||
Both these keys are stored in one LUKS keyslot.
|
Both these keys are stored in one LUKS keyslot.
|
||||||
|
|
||||||
*WARNING:* All support for authenticated modes is experimental, and only some modes are available now.
|
Support for authenticated modes is experimental, and only some modes are available now.
|
||||||
Note that very few authenticated encryption algorithms are suitable for disk encryption.
|
Note that very few authenticated encryption algorithms are suitable for disk encryption.
|
||||||
You also cannot use CRC32 or other non-cryptographic checksums (other than the special integrity mode "none").
|
You also cannot use CRC32 or other non-cryptographic checksums (other than the special integrity mode "none").
|
||||||
If, for some reason, you want to have integrity control without using authentication mode, then you should separately configure dm-integrity independently of LUKS2.
|
If, for some reason, you want to have integrity control without using authentication mode, then you should separately configure dm-integrity independently of LUKS2.
|
||||||
|
|||||||
@@ -248,7 +248,6 @@ If this flag is not set, checksums will be calculated for previously stored data
|
|||||||
|
|
||||||
== LEGACY COMPATIBILITY OPTIONS
|
== LEGACY COMPATIBILITY OPTIONS
|
||||||
|
|
||||||
*WARNING:*::
|
|
||||||
Do not use these options until you need compatibility with a specific old kernel.
|
Do not use these options until you need compatibility with a specific old kernel.
|
||||||
|
|
||||||
*--integrity-legacy-padding*::
|
*--integrity-legacy-padding*::
|
||||||
|
|||||||
@@ -180,12 +180,12 @@ With --ignore-corruption option, the corruption is only logged.
|
|||||||
With --restart-on-corruption or --panic-on-corruption, the kernel is restarted (panicked) immediately.
|
With --restart-on-corruption or --panic-on-corruption, the kernel is restarted (panicked) immediately.
|
||||||
(You have to provide a way to avoid restart loops.)
|
(You have to provide a way to avoid restart loops.)
|
||||||
+
|
+
|
||||||
*WARNING:* Use these options only for very specific cases.
|
Use these options only for very specific cases.
|
||||||
|
|
||||||
*--ignore-zero-blocks*::
|
*--ignore-zero-blocks*::
|
||||||
Instruct the kernel not to verify blocks expected to contain zeroes and always directly return zeroes instead.
|
Instruct the kernel not to verify blocks expected to contain zeroes and always directly return zeroes instead.
|
||||||
+
|
+
|
||||||
*WARNING:* Use this option only in very specific cases.
|
Use this option only in very specific cases.
|
||||||
|
|
||||||
*--no-superblock*::
|
*--no-superblock*::
|
||||||
Create or use dm-verity without a permanent on-disk superblock.
|
Create or use dm-verity without a permanent on-disk superblock.
|
||||||
|
|||||||
Reference in New Issue
Block a user