From e733cdb6a89ab79d5784cbbe00c793394e2a1409 Mon Sep 17 00:00:00 2001 From: Deven Blake Date: Sun, 1 May 2022 00:16:17 -0400 Subject: [PATCH] polish --- homepage/knowledge/linux.html | 14 ++++++++------ 1 file changed, 8 insertions(+), 6 deletions(-) diff --git a/homepage/knowledge/linux.html b/homepage/knowledge/linux.html index 86cd322..58385f4 100644 --- a/homepage/knowledge/linux.html +++ b/homepage/knowledge/linux.html @@ -16,7 +16,7 @@

linux

-

updated 2022-04-30

+

updated 2022-05-01


ACPI client

@@ -144,19 +144,21 @@ Use mkfs(8) for creating filesystems and mount(8) for e2fsprogs is needed for the dm_mod kernel module used for LUKS partition decryption.

-To format a partition for LUKS, determine the physical block device location for that partition and run cryptsetup luksFormat [partition]. +To format a partition to a LUKS volume, determine the physical block device location for that partition and run cryptsetup luksFormat [partition]. The passphrase used can be changed or removed after creation.

-To open a LUKS partition, use cryptsetup luksOpen [partition] [name]. +To open a LUKS volume, use cryptsetup luksOpen [partition] [name]. This name is the name the decrypted block device location will take in /dev/mapper/. -Before the decrypted block device has a filesystem it'll just be cleared space - use mkfs.[filesystem] /dev/mapper/[name].

-To mount an opened LUKS partition, use mount(8) as normal, just with the decrypted block device location. +Before the decrypted block device has a filesystem it'll just be cleared space - format as normal but use the decrypted block device location.

-To close an open LUKS partition, umount(8) it if it's open and cryptsetup luksClose [name]. +To mount a partition in an opened LUKS volume, use mount(8) as normal, just with the decrypted block device location. +

+

+To close an open LUKS volume, umount(8) any mapped and mounted partitions from the volume and cryptsetup luksClose [name].

To make the LUKS partition openable via keyfile, first make a keyfile (dd if=/dev/urandom of=/root/keyfile bs=1024 count=4 seems to work), and optionally make it readable by root only (chmod 0400 [keyfile]).