diff --git a/homepage/knowledge/linux.html b/homepage/knowledge/linux.html index 86cd322..58385f4 100644 --- a/homepage/knowledge/linux.html +++ b/homepage/knowledge/linux.html @@ -16,7 +16,7 @@
@@ -144,19 +144,21 @@ Use mkfs(8)
for creating filesystems and mount(8)
for
e2fsprogs
is needed for the dm_mod
kernel module used for LUKS partition decryption.
-To format a partition for LUKS, determine the physical block device location for that partition and run cryptsetup luksFormat [partition]
.
+To format a partition to a LUKS volume, determine the physical block device location for that partition and run cryptsetup luksFormat [partition]
.
The passphrase used can be changed or removed after creation.
-To open a LUKS partition, use cryptsetup luksOpen [partition] [name]
.
+To open a LUKS volume, use cryptsetup luksOpen [partition] [name]
.
This name is the name the decrypted block device location will take in /dev/mapper/
.
-Before the decrypted block device has a filesystem it'll just be cleared space - use mkfs.[filesystem] /dev/mapper/[name]
.
-To mount an opened LUKS partition, use mount(8)
as normal, just with the decrypted block device location.
+Before the decrypted block device has a filesystem it'll just be cleared space - format as normal but use the decrypted block device location.
-To close an open LUKS partition, umount(8)
it if it's open and cryptsetup luksClose [name]
.
+To mount a partition in an opened LUKS volume, use mount(8)
as normal, just with the decrypted block device location.
+
+To close an open LUKS volume, umount(8)
any mapped and mounted partitions from the volume and cryptsetup luksClose [name]
.
To make the LUKS partition openable via keyfile, first make a keyfile (dd if=/dev/urandom of=/root/keyfile bs=1024 count=4
seems to work), and optionally make it readable by root only (chmod 0400 [keyfile]
).