diff options
author | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-15 19:43:11 +0000 |
---|---|---|
committer | Daniel Baumann <daniel.baumann@progress-linux.org> | 2024-04-15 19:43:11 +0000 |
commit | fc22b3d6507c6745911b9dfcc68f1e665ae13dbc (patch) | |
tree | ce1e3bce06471410239a6f41282e328770aa404a /upstream/fedora-rawhide/man8/systemd-cryptsetup.8 | |
parent | Initial commit. (diff) | |
download | manpages-l10n-fc22b3d6507c6745911b9dfcc68f1e665ae13dbc.tar.xz manpages-l10n-fc22b3d6507c6745911b9dfcc68f1e665ae13dbc.zip |
Adding upstream version 4.22.0.upstream/4.22.0
Signed-off-by: Daniel Baumann <daniel.baumann@progress-linux.org>
Diffstat (limited to 'upstream/fedora-rawhide/man8/systemd-cryptsetup.8')
-rw-r--r-- | upstream/fedora-rawhide/man8/systemd-cryptsetup.8 | 157 |
1 files changed, 157 insertions, 0 deletions
diff --git a/upstream/fedora-rawhide/man8/systemd-cryptsetup.8 b/upstream/fedora-rawhide/man8/systemd-cryptsetup.8 new file mode 100644 index 00000000..cfa85bc0 --- /dev/null +++ b/upstream/fedora-rawhide/man8/systemd-cryptsetup.8 @@ -0,0 +1,157 @@ +'\" t +.TH "SYSTEMD\-CRYPTSETUP" "8" "" "systemd 255" "systemd-cryptsetup" +.\" ----------------------------------------------------------------- +.\" * Define some portability stuff +.\" ----------------------------------------------------------------- +.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ +.\" http://bugs.debian.org/507673 +.\" http://lists.gnu.org/archive/html/groff/2009-02/msg00013.html +.\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ +.ie \n(.g .ds Aq \(aq +.el .ds Aq ' +.\" ----------------------------------------------------------------- +.\" * set default formatting +.\" ----------------------------------------------------------------- +.\" disable hyphenation +.nh +.\" disable justification (adjust text to left margin only) +.ad l +.\" ----------------------------------------------------------------- +.\" * MAIN CONTENT STARTS HERE * +.\" ----------------------------------------------------------------- +.SH "NAME" +systemd-cryptsetup, systemd-cryptsetup@.service \- Full disk decryption logic +.SH "SYNOPSIS" +.HP \w'\fBsystemd\-cryptsetup\fR\ 'u +\fBsystemd\-cryptsetup\fR [OPTIONS...] attach VOLUME SOURCE\-DEVICE [KEY\-FILE] [CONFIG] +.HP \w'\fBsystemd\-cryptsetup\fR\ 'u +\fBsystemd\-cryptsetup\fR [OPTIONS...] detach VOLUME +.PP +systemd\-cryptsetup@\&.service +.PP +system\-systemd\ex2dcryptsetup\&.slice +.SH "DESCRIPTION" +.PP +systemd\-cryptsetup +is used to set up (with +\fBattach\fR) and tear down (with +\fBdetach\fR) access to an encrypted block device\&. It is primarily used via +systemd\-cryptsetup@\&.service +during early boot, but may also be be called manually\&. The positional arguments +\fIVOLUME\fR, +\fISOURCEDEVICE\fR, +\fIKEY\-FILE\fR, and +\fICRYPTTAB\-OPTIONS\fR +have the same meaning as the fields in +\fBcrypttab\fR(5)\&. +.PP +systemd\-cryptsetup@\&.service +is a service responsible for providing access to encrypted block devices\&. It is instantiated for each device that requires decryption\&. +.PP +systemd\-cryptsetup@\&.service +instances are part of the +system\-systemd\ex2dcryptsetup\&.slice +slice, which is destroyed only very late in the shutdown procedure\&. This allows the encrypted devices to remain up until filesystems have been unmounted\&. +.PP +systemd\-cryptsetup@\&.service +will ask for hard disk passwords via the +\m[blue]\fBpassword agent logic\fR\m[]\&\s-2\u[1]\d\s+2, in order to query the user for the password using the right mechanism at boot and during runtime\&. +.PP +At early boot and when the system manager configuration is reloaded, +/etc/crypttab +is translated into +systemd\-cryptsetup@\&.service +units by +\fBsystemd-cryptsetup-generator\fR(8)\&. +.PP +In order to unlock a volume a password or binary key is required\&. +systemd\-cryptsetup@\&.service +tries to acquire a suitable password or binary key via the following mechanisms, tried in order: +.sp +.RS 4 +.ie n \{\ +\h'-04' 1.\h'+01'\c +.\} +.el \{\ +.sp -1 +.IP " 1." 4.2 +.\} +If a key file is explicitly configured (via the third column in +/etc/crypttab), a key read from it is used\&. If a PKCS#11 token, FIDO2 token or TPM2 device is configured (using the +\fIpkcs11\-uri=\fR, +\fIfido2\-device=\fR, +\fItpm2\-device=\fR +options) the key is decrypted before use\&. +.RE +.sp +.RS 4 +.ie n \{\ +\h'-04' 2.\h'+01'\c +.\} +.el \{\ +.sp -1 +.IP " 2." 4.2 +.\} +If no key file is configured explicitly this way, a key file is automatically loaded from +/etc/cryptsetup\-keys\&.d/\fIvolume\fR\&.key +and +/run/cryptsetup\-keys\&.d/\fIvolume\fR\&.key, if present\&. Here too, if a PKCS#11/FIDO2/TPM2 token/device is configured, any key found this way is decrypted before use\&. +.RE +.sp +.RS 4 +.ie n \{\ +\h'-04' 3.\h'+01'\c +.\} +.el \{\ +.sp -1 +.IP " 3." 4.2 +.\} +If the +\fItry\-empty\-password\fR +option is specified then unlocking the volume with an empty password is attempted\&. +.RE +.sp +.RS 4 +.ie n \{\ +\h'-04' 4.\h'+01'\c +.\} +.el \{\ +.sp -1 +.IP " 4." 4.2 +.\} +The kernel keyring is then checked for a suitable cached password from previous attempts\&. +.RE +.sp +.RS 4 +.ie n \{\ +\h'-04' 5.\h'+01'\c +.\} +.el \{\ +.sp -1 +.IP " 5." 4.2 +.\} +Finally, the user is queried for a password, possibly multiple times, unless the +\fIheadless\fR +option is set\&. +.RE +.PP +If no suitable key may be acquired via any of the mechanisms describes above, volume activation fails\&. +.SH "SEE ALSO" +.PP +\fBsystemd\fR(1), +\fBsystemd-cryptsetup-generator\fR(8), +\fBcrypttab\fR(5), +\fBsystemd-cryptenroll\fR(1), +\fBcryptsetup\fR(8), +\m[blue]\fBTPM2 PCR Measurements Made by systemd\fR\m[]\&\s-2\u[2]\d\s+2 +.SH "NOTES" +.IP " 1." 4 +password agent logic +.RS 4 +\%https://systemd.io/PASSWORD_AGENTS/ +.RE +.IP " 2." 4 +TPM2 PCR Measurements Made by systemd +.RS 4 +\%https://systemd.io/TPM2_PCR_MEASUREMENTS +.RE |