diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-17 08:06:26 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-17 08:06:26 +0000 |
commit | 1660d4b7a65d9ad2ce0deaa19d35579ca4084ac5 (patch) | |
tree | 6cf8220b628ebd2ccfc1375dd6516c6996e9abcc /man/cryptsetup-luksHeaderBackup.8.adoc | |
parent | Initial commit. (diff) | |
download | cryptsetup-1660d4b7a65d9ad2ce0deaa19d35579ca4084ac5.tar.xz cryptsetup-1660d4b7a65d9ad2ce0deaa19d35579ca4084ac5.zip |
Adding upstream version 2:2.6.1.upstream/2%2.6.1upstream
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'man/cryptsetup-luksHeaderBackup.8.adoc')
-rw-r--r-- | man/cryptsetup-luksHeaderBackup.8.adoc | 35 |
1 files changed, 35 insertions, 0 deletions
diff --git a/man/cryptsetup-luksHeaderBackup.8.adoc b/man/cryptsetup-luksHeaderBackup.8.adoc new file mode 100644 index 0000000..1f57f25 --- /dev/null +++ b/man/cryptsetup-luksHeaderBackup.8.adoc @@ -0,0 +1,35 @@ += cryptsetup-luksHeaderBackup(8) +:doctype: manpage +:manmanual: Maintenance Commands +:mansource: cryptsetup {release-version} +:man-linkstyle: pass:[blue R < >] +:COMMON_OPTIONS: +:ACTION_LUKSHEADERBACKUP: + +== Name + +cryptsetup-luksHeaderBackup - store a binary backup of the LUKS header and keyslot area + +== SYNOPSIS + +*cryptsetup _luksHeaderBackup_ --header-backup-file <file> [<options>] <device>* + +== DESCRIPTION + +Stores a binary backup of the LUKS header and keyslot area. + +*NOTE:* Using '-' as filename writes the header backup to a file named +'-'. + +*<options>* can be [--header, --header-backup-file, --disable-locks]. + +*WARNING:* This backup file and a passphrase valid at the time of backup +allows decryption of the LUKS data area, even if the passphrase was +later changed or removed from the LUKS device. Also note that with a +header backup you lose the ability to securely wipe the LUKS device by +just overwriting the header and key-slots. You either need to securely +erase all header backups in addition or overwrite the encrypted data +area as well. The second option is less secure, as some sectors can +survive, e.g., due to defect management. + +include::man/common_options.adoc[] +include::man/common_footer.adoc[] |