-
-
Notifications
You must be signed in to change notification settings - Fork 15
feature luks
Feature adds the ability to boot from LUKS partition.
-
no-luksdisables crypto LUKS detection. -
luks-key=<keypath>[:<keydev>][:<luksdev>]key for luks device on removable devicepkcs11:<pkcs11-path>[:<luksdev>]key for luks device on smart-card device-
keypathis a path to key file to look for. -
keydevis a device on which key file resides (see device spec). - If
luksdevis given, the specified key will only be applied for that LUKS device. Possible values are the same as for keydev. Unless you have several LUKS devices, you don’t have to specify this parameter. -
pkcs11-pathis a path to data object on pkcs11 device in format: [serial=];id=|label=-
serialis smart card serial number -
idis id of data object -
labelis application label of data object
-
-
-
luks-key-format=<format>defines the format of the key file (possible values:plain,raw) -
luks-discardis an array of luks devices specified in same format in luksdev to which discard operation is perfomed (is essential for SSD). -
luks-ignorespecifies which luks device should be ignored by initrd to decrypt. -
luks-dev- the parameter allows you to specify a device if there are more than one partitions in the luks system (see device spec). -
luks-crypttab=<1|0>- do not check, if LUKS partition is in/etc/crypttab.
These configs cannot be put into the initramfs at the same time. A /etc/luks.keys
will take precedence over /etc/crypttab.
The /etc/crypttab file describes encrypted block devices that are set up during
system boot.
NOTE You don't need to put this config manually. If
/etc/crypttabis present in the system and if theluksfeature is active then the config file will be parsed and copied. The keys specified in crypttab will also be copied.
Empty lines and lines starting with the "#" character are ignored. Each of the remaining lines describes one encrypted block device. Fields are delimited by white space.
Format:
volume device keyspec options
The first two fields are mandatory, the remaining two are optional.
-
voulumeis the name of the resulting volume with decrypted data; its block device is set up below/dev/mapper/. -
device- a path to the underlying block device or file, or a specification of a block device via "UUID=" followed by the UUID. -
keyspecspecifies an absolute path to a file with the encryption key. Optionally, the path may be followed by ":" and an /etc/fstab style device specification e.g. starting with "LABEL=" or similar); in which case the path is taken relative to the specified device's file system root. If the field is not present or is "none" or "-", a key file named after the volume to unlock (i.e. the first column of the line), suffixed with .key is automatically loaded from the /etc/cryptsetup-keys.d/ and /run/cryptsetup-keys.d/ directories, if present. Otherwise, the password has to be manually entered during system boot. For swap encryption, /dev/urandom may be used as key file, resulting in a randomized key. -
The fourth field, if present, is a comma-delimited list of options.
See crypttab(5).
You can put the /etc/luks.keys file in initramfs and then you do not need to
specify boot options. The file describes which keys for which LUKS partitions to use
and where to find them.
The file contains entries separated by a single tab character. Each entry describes one key file.
key-path[<TAB>key-device[<TAB>luks-device]]
The key-device and luks-device fields are optional. If only the key-path
is specified, then the key will be used to all found LUKS partitions. If the key
is on a separate device (key-device), then key-path must be specified from
the root of this device.
Luks key on device:
luks-key=keys/luks.key:UUID='eee52cfb-4029-423b-8736-b494a252c387'
Luks key on the smart card:
luks-key=pkcs11:label=luks-key luks-key-format=raw
- Get Started
- Initramfs Runtime
- Image Generation
- Contributing
- FAQ
- Presentations