-
Notifications
You must be signed in to change notification settings - Fork 13
feature luks
Feature adds the ability to boot from LUKS partition.
-
no-luks
disables crypto LUKS detection. -
luks-key=
<keypath>[:<keydev>][:<luksdev>]
key for luks device on removable devicepkcs11:<pkcs11-path>[:<luksdev>]
key for luks device on smart-card device-
keypath
is a path to key file to look for. -
keydev
is a device on which key file resides (see device spec). - If
luksdev
is given, the specified key will only be applied for that LUKS device. Possible values are the same as for keydev. Unless you have several LUKS devices, you don’t have to specify this parameter. -
pkcs11-path
is a path to data object on pkcs11 device in format: [serial=];id=|label=-
serial
is smart card serial number -
id
is id of data object -
label
is application label of data object
-
-
-
luks-key-format=<format>
defines the format of the key file (possible values:plain
,raw
) -
luks-discard
is an array of luks devices specified in same format in luksdev to which discard operation is perfomed (is essential for SSD). -
luks-ignore
specifies which luks device should be ignored by initrd to decrypt. -
luks-dev
- the parameter allows you to specify a device if there are more than one partitions in the luks system (see device spec). -
luks-crypttab=<1|0>
- do not check, if LUKS partition is in/etc/crypttab
.
These configs cannot be put into the initramfs at the same time. A /etc/luks.keys
will take precedence over /etc/crypttab
.
The /etc/crypttab
file describes encrypted block devices that are set up during
system boot.
NOTE You don't need to put this config manually. If
/etc/crypttab
is present in the system and if theluks
feature is active then the config file will be parsed and copied. The keys specified in crypttab will also be copied.
Empty lines and lines starting with the "#" character are ignored. Each of the remaining lines describes one encrypted block device. Fields are delimited by white space.
Format:
volume device keyspec options
The first two fields are mandatory, the remaining two are optional.
-
voulume
is the name of the resulting volume with decrypted data; its block device is set up below/dev/mapper/
. -
device
- a path to the underlying block device or file, or a specification of a block device via "UUID=" followed by the UUID. -
keyspec
specifies an absolute path to a file with the encryption key. Optionally, the path may be followed by ":" and an /etc/fstab style device specification e.g. starting with "LABEL=" or similar); in which case the path is taken relative to the specified device's file system root. If the field is not present or is "none" or "-", a key file named after the volume to unlock (i.e. the first column of the line), suffixed with .key is automatically loaded from the /etc/cryptsetup-keys.d/ and /run/cryptsetup-keys.d/ directories, if present. Otherwise, the password has to be manually entered during system boot. For swap encryption, /dev/urandom may be used as key file, resulting in a randomized key. -
The fourth field, if present, is a comma-delimited list of options.
See crypttab(5).
You can put the /etc/luks.keys
file in initramfs and then you do not need to
specify boot options. The file describes which keys for which LUKS partitions to use
and where to find them.
The file contains entries separated by a single tab character. Each entry describes one key file.
key-path[<TAB>key-device[<TAB>luks-device]]
The key-device
and luks-device
fields are optional. If only the key-path
is specified, then the key will be used to all found LUKS partitions. If the key
is on a separate device (key-device
), then key-path
must be specified from
the root of this device.
Luks key on device:
luks-key=keys/luks.key:UUID='eee52cfb-4029-423b-8736-b494a252c387'
Luks key on the smart card:
luks-key=pkcs11:label=luks-key luks-key-format=raw
- Get Started
- Initramfs Runtime
- Image Generation
- Contributing
- FAQ
- Presentations