blob: 39d2cd257e41ca9616f81d76e1e322c77f0809fb (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
|
Template: cryptsetup-nuke-password/password
Type: password
_Description: Nuke password:
If you setup a “nuke password”, you will be able to type this password
at the early-boot prompt asking your passphrase to unlock your
luks-encrypted partitions. Instead of decrypting the partitions, typing
this password will instead wipe the encryption keys from the luks
container so that it is no longer possible to unlock the encrypted
partitions.
.
This provides a relatively stealth way to make your data unreadable in
case you fear that your computer is going to be seized.
.
If you want to cancel this operation or disable any nuke password already
configured, simply enter an empty password. If needed, you will be given
the option to pick between both choices.
Template: cryptsetup-nuke-password/password-again
Type: password
_Description: Re-enter password to verify:
Please enter the same nuke password again to verify that you have typed it
correctly.
Template: cryptsetup-nuke-password/password-mismatch
Type: error
_Description: Password input error
The two passwords you entered were not the same. Please try again.
Template: cryptsetup-nuke-password/already-configured
Type: select
Default: overwrite
Choices-C: keep, overwrite, remove
__Choices: Keep the current password, Overwrite the current password, Remove the current password
_Description: A nuke password is already configured, what should be done?
The existence of /etc/cryptsetup-nuke-password/password_hash suggests
that a nuke password is already configured. If you decide to keep the
current nuke password, nothing will be done. If you decide to overwrite the
current nuke password, you will be asked for a new password and it will
replace the currently configured one. If you decide to remove the
nuke password, you will not be asked for a new password and the currently
configured password will be disabled.
|