projects
/
grml-crypt.git
/ blobdiff
commit
grep
author
committer
pickaxe
?
search:
re
summary
|
shortlog
|
log
|
commit
|
commitdiff
|
tree
raw
|
inline
| side by side
Bump Standards-Version to 3.9.4
[grml-crypt.git]
/
grml-crypt.8.txt
diff --git
a/grml-crypt.8.txt
b/grml-crypt.8.txt
index
07bb54e
..
34a4dc2
100644
(file)
--- a/
grml-crypt.8.txt
+++ b/
grml-crypt.8.txt
@@
-32,9
+32,9
@@
ACTIONS
Commands: [losetup], dd, cryptsetup luksFormat, cryptsetup
luksOpen, [dd], mkfs, [mount]
Commands: [losetup], dd, cryptsetup luksFormat, cryptsetup
luksOpen, [dd], mkfs, [mount]
-*start <device/file>
<mountpoint>
*::
+*start <device/file>
[mountpoint]
*::
Starts an encrypted <device/file> and mounts it to the given
Starts an encrypted <device/file> and mounts it to the given
- mountpoint. Commands: [losetup], cryptsetup luksOpen, mount
+
or a default
mountpoint. Commands: [losetup], cryptsetup luksOpen, mount
*stop <mountpoint>*::
Stops an encrypted filesystem mounted at <mountpoint>. Even the
*stop <mountpoint>*::
Stops an encrypted filesystem mounted at <mountpoint>. Even the
@@
-82,7
+82,7
@@
Shows what is going on (more v => more out).
*-F*::
Only for action start: Run fsck on the filesystem before mounting it to
*-F*::
Only for action start: Run fsck on the filesystem before mounting it to
- the given mountpoint.
+ the given mountpoint.
If given twice, use fsck's -f option as well.
*-m*::
Additional arguments passed through to mount. Could be like "'-o noatime'".
*-m*::
Additional arguments passed through to mount. Could be like "'-o noatime'".
@@
-128,20
+128,20
@@
INITIALISATION MODES
EXAMPLES
--------
EXAMPLES
--------
-*grml-crypt -t xfs -o format /dev/hda4 /m
nt
/tmp*::
+*grml-crypt -t xfs -o format /dev/hda4 /m
edia
/tmp*::
Formats /dev/hda4 with xfs and applies optimized initialisation rules and
Formats /dev/hda4 with xfs and applies optimized initialisation rules and
- mounts it to /m
nt
/tmp
+ mounts it to /m
edia
/tmp
-*grml-crypt -t ext2 -z format /home/user/test.img /m
nt
/tmp*::
+*grml-crypt -t ext2 -z format /home/user/test.img /m
edia
/tmp*::
Creates /home/user/test.img with 10MB and applies only insecure
initialisation rules. Creates an ext2 filesystem on it and mounts it to
Creates /home/user/test.img with 10MB and applies only insecure
initialisation rules. Creates an ext2 filesystem on it and mounts it to
- /m
nt
/tmp.
+ /m
edia
/tmp.
-*grml-crypt -f -S 256 -C aes-plain -I 2 -A --verify-passphrase -m \'-o noatime\' -vvv format img /m
nt
/tmp*::
+*grml-crypt -f -S 256 -C aes-plain -I 2 -A --verify-passphrase -m \'-o noatime\' -vvv format img /m
edia
/tmp*::
Reuses the image img with no initialisation. The encryption is established
with aes-plain with 256 bit keysize and an iteration time of 2 seconds.
Cryptsetup is advised to verify the password by asking for it twice. Mounts
Reuses the image img with no initialisation. The encryption is established
with aes-plain with 256 bit keysize and an iteration time of 2 seconds.
Cryptsetup is advised to verify the password by asking for it twice. Mounts
- it to /m
nt
/tmp with '-o noatime'. And prints what is going on (-vvv).
+ it to /m
edia
/tmp with '-o noatime'. And prints what is going on (-vvv).
ENCRYPT AN USBSTICK
ENCRYPT AN USBSTICK
@@
-153,11
+153,11
@@
ENCRYPT AN USBSTICK
could give the format action a mountpoint too. In this case your
crypto-partition gets mounted on that mountpoint as well.
could give the format action a mountpoint too. In this case your
crypto-partition gets mounted on that mountpoint as well.
-*grml-crypt start /dev/external1 /m
nt
/tmp*::
+*grml-crypt start /dev/external1 /m
edia
/tmp*::
Asks you for the right passphrase for your crypto-partition
Asks you for the right passphrase for your crypto-partition
- and tries to mount it to /m
nt
/tmp.
+ and tries to mount it to /m
edia
/tmp.
-*grml-crypt stop /m
nt
/tmp*::
+*grml-crypt stop /m
edia
/tmp*::
Removes your crypto-partition cleanly out of the system
(umount, cryptsetup luksClose, [losetup -d]).
Removes your crypto-partition cleanly out of the system
(umount, cryptsetup luksClose, [losetup -d]).
@@
-165,20
+165,20
@@
ENCRYPT AN USBSTICK
ENCRYPTED LOOPFILESYSTEM ON USBSTICK
------------------------------------
ENCRYPTED LOOPFILESYSTEM ON USBSTICK
------------------------------------
-*mount /m
nt
/external1*::
- Mounts your usb-stick on /m
nt
/external1 (please verify!).
+*mount /m
edia
/external1*::
+ Mounts your usb-stick on /m
edia
/external1 (please verify!).
-*grml-crypt -o -t vfat -s 50 format /m
nt/external1/secure.img /mnt
/tmp*::
+*grml-crypt -o -t vfat -s 50 format /m
edia/external1/secure.img /media
/tmp*::
Creates a 50MB big file, encrypted with the default options
and vfat (also known as fat32). The optimized initialisation mode will
be used for this file (without -o this could take REALLY LONG). This
Creates a 50MB big file, encrypted with the default options
and vfat (also known as fat32). The optimized initialisation mode will
be used for this file (without -o this could take REALLY LONG). This
- command _also_ starts your cryptofile and mounts it on /m
nt
/tmp.
+ command _also_ starts your cryptofile and mounts it on /m
edia
/tmp.
-*grml-crypt stop /m
nt
/tmp*::
+*grml-crypt stop /m
edia
/tmp*::
Removes your crypto-partition cleanly out of the system
(umount, cryptsetup luksClose, [losetup -d]).
Removes your crypto-partition cleanly out of the system
(umount, cryptsetup luksClose, [losetup -d]).
-*umount /m
nt
/external1*::
+*umount /m
edia
/external1*::
Guess what? ;)
Guess what? ;)