include("site.inc"); $template = new Page; $template->initCommon(); $template->displayHeader(); ?>
Fedora Core 6 provides basic support for encrypted swap partitions
and non-root file systems. To use it, add entries to
/etc/crypttab
and reference the created devices in
/etc/fstab
.
Encrypted FS Support Unavailable During Install | |
---|---|
Enable file system encryption after installation. Anaconda does not have support for creating encrypted block devices. |
The following example shows an /etc/crypttab
entry for a
swap partition:
my_swap /dev/hdb1 /dev/urandom swap,cipher=aes-cbc-essiv:sha256
This creates an encrypted block device /dev/mapper/my_swap
, which can be
referenced in /etc/fstab
. The next example
shows an entry for a filesystem volume:
my_volume /dev/hda5 /etc/volume_key cipher=aes-cbc-essiv:sha256
The /etc/volume_key
file contains a plaintext
encryption key. You can also specify none
as the
key file name, and the system instead asks for the encryption key
during boot.
The recommended method is to use LUKS for file system volumes:
Create the encrypted volume using cryptsetup
luksFormat
Add the necessary entry to /etc/crypttab
Set up the volume manually using cryptsetup
luksOpen
or reboot
Create a filesystem on the encrypted volume
Set up an /etc/fstab
entry