diff options
Diffstat (limited to 'templates/man5/crypttab.5.pot')
-rw-r--r-- | templates/man5/crypttab.5.pot | 2692 |
1 files changed, 2692 insertions, 0 deletions
diff --git a/templates/man5/crypttab.5.pot b/templates/man5/crypttab.5.pot new file mode 100644 index 00000000..97d641e2 --- /dev/null +++ b/templates/man5/crypttab.5.pot @@ -0,0 +1,2692 @@ +# SOME DESCRIPTIVE TITLE +# Copyright (C) YEAR Free Software Foundation, Inc. +# This file is distributed under the same license as the PACKAGE package. +# FIRST AUTHOR <EMAIL@ADDRESS>, YEAR. +# +#, fuzzy +msgid "" +msgstr "" +"Project-Id-Version: PACKAGE VERSION\n" +"POT-Creation-Date: 2024-03-01 16:54+0100\n" +"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n" +"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n" +"Language-Team: LANGUAGE <LL@li.org>\n" +"Language: \n" +"MIME-Version: 1.0\n" +"Content-Type: text/plain; charset=UTF-8\n" +"Content-Transfer-Encoding: 8bit\n" + +#. type: TH +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "CRYPTTAB" +msgstr "" + +#. type: TH +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +#, no-wrap +msgid "systemd 255" +msgstr "" + +#. type: TH +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +#, no-wrap +msgid "crypttab" +msgstr "" + +#. ----------------------------------------------------------------- +#. * MAIN CONTENT STARTS HERE * +#. ----------------------------------------------------------------- +#. type: SH +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "NAME" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "crypttab - Configuration for encrypted block devices" +msgstr "" + +#. type: SH +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +#, no-wrap +msgid "SYNOPSIS" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "/etc/crypttab" +msgstr "" + +#. type: SH +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "DESCRIPTION" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"The /etc/crypttab file describes encrypted block devices that are set up " +"during system boot\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Empty lines and lines starting with the \"#\" character are ignored\\&. Each " +"of the remaining lines describes one encrypted block device\\&. Fields are " +"delimited by white space\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "Each line is in the form" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +#, no-wrap +msgid "I<volume-name> I<encrypted-device> I<key-file> I<options>\n" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "The first two fields are mandatory, the remaining two are optional\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Setting up encrypted block devices using this file supports four encryption " +"modes: LUKS, TrueCrypt, BitLocker and plain\\&. See B<cryptsetup>(8) for " +"more information about each mode\\&. When no mode is specified in the " +"options field and the block device contains a LUKS signature, it is opened " +"as a LUKS device; otherwise, it is assumed to be in raw dm-crypt (plain " +"mode) format\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "The four fields of /etc/crypttab are defined as follows:" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"The first field contains the name of the resulting volume with decrypted " +"data; its block device is set up below /dev/mapper/\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"The second field contains a path to the underlying block device or file, or " +"a specification of a block device via \"UUID=\" followed by the UUID\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"The third field specifies an absolute path to a file with the encryption " +"key\\&. Optionally, the path may be followed by \":\" and an /etc/fstab " +"style device specification (e\\&.g\\&. starting with \"LABEL=\" or similar); " +"in which case the path is taken relative to the specified device\\*(Aqs file " +"system root\\&. If the field is not present or is \"none\" or \"-\", a key " +"file named after the volume to unlock (i\\&.e\\&. the first column of the " +"line), suffixed with \\&.key is automatically loaded from the /etc/" +"cryptsetup-keys\\&.d/ and /run/cryptsetup-keys\\&.d/ directories, if " +"present\\&. Otherwise, the password has to be manually entered during system " +"boot\\&. For swap encryption, /dev/urandom may be used as key file, " +"resulting in a randomized key\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"If the specified key file path refers to an B<AF_UNIX> stream socket in the " +"file system, the key is acquired by connecting to the socket and reading it " +"from the connection\\&. This allows the implementation of a service to " +"provide key information dynamically, at the moment when it is needed\\&. For " +"details see below\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"The fourth field, if present, is a comma-delimited list of options\\&. The " +"supported options are listed below\\&." +msgstr "" + +#. type: SH +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +#, no-wrap +msgid "KEY ACQUISITION" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Six different mechanisms for acquiring the decryption key or passphrase " +"unlocking the encrypted volume are supported\\&. Specifically:" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Most prominently, the user may be queried interactively during volume " +"activation (i\\&.e\\&. typically at boot), asking them to type in the " +"necessary passphrases\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"The (unencrypted) key may be read from a file on disk, possibly on removable " +"media\\&. The third field of each line encodes the location, for details see " +"above\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"The (unencrypted) key may be requested from another service, by specifying " +"an B<AF_UNIX> file system socket in place of a key file in the third " +"field\\&. For details see above and below\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"The key may be acquired via a PKCS#11 compatible hardware security token or " +"smartcard\\&. In this case an encrypted key is stored on disk/removable " +"media, acquired via B<AF_UNIX>, or stored in the LUKS2 JSON token metadata " +"header\\&. The encrypted key is then decrypted by the PKCS#11 token with an " +"RSA key stored on it, and then used to unlock the encrypted volume\\&. Use " +"the B<pkcs11-uri=> option described below to use this mechanism\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Similarly, the key may be acquired via a FIDO2 compatible hardware security " +"token (which must implement the \"hmac-secret\" extension)\\&. In this case " +"a key generated randomly during enrollment is stored on disk/removable " +"media, acquired via B<AF_UNIX>, or stored in the LUKS2 JSON token metadata " +"header\\&. The random key is hashed via a keyed hash function (HMAC) on the " +"FIDO2 token, using a secret key stored on the token that never leaves it\\&. " +"The resulting hash value is then used as key to unlock the encrypted " +"volume\\&. Use the B<fido2-device=> option described below to use this " +"mechanism\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Similarly, the key may be acquired via a TPM2 security chip\\&. In this case " +"a (during enrollment) randomly generated key \\(em encrypted by an " +"asymmetric key derived from the TPM2 chip\\*(Aqs seed key \\(em is stored on " +"disk/removable media, acquired via B<AF_UNIX>, or stored in the LUKS2 JSON " +"token metadata header\\&. Use the B<tpm2-device=> option described below to " +"use this mechanism\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"For the latter five mechanisms the source for the key material used for " +"unlocking the volume is primarily configured in the third field of each /etc/" +"crypttab line, but may also configured in /etc/cryptsetup-keys\\&.d/ and /" +"run/cryptsetup-keys\\&.d/ (see above) or in the LUKS2 JSON token header (in " +"case of the latter three)\\&. Use the B<systemd-cryptenroll>(1) tool to " +"enroll PKCS#11, FIDO2 and TPM2 devices in LUKS2 volumes\\&." +msgstr "" + +#. type: SH +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +#, no-wrap +msgid "SUPPORTED OPTIONS" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "The following options may be used in the fourth field of each line:" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "B<cipher=>" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Specifies the cipher to use\\&. See B<cryptsetup>(8) for possible values " +"and the default value of this option\\&. A cipher with unpredictable IV " +"values, such as \"aes-cbc-essiv:sha256\", is recommended\\&. Embedded commas " +"in the cipher specification need to be escaped by preceding them with a " +"backslash, see example below\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "Added in version 186\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "B<discard>" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Allow discard requests to be passed through the encrypted block device\\&. " +"This improves performance on SSD storage but has security implications\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "Added in version 207\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "B<hash=>" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Specifies the hash to use for password hashing\\&. See B<cryptsetup>(8) for " +"possible values and the default value of this option\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "B<header=>" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Use a detached (separated) metadata device or file where the header " +"containing the master key(s) is stored\\&. This option is only relevant for " +"LUKS and TrueCrypt/VeraCrypt devices\\&. See B<cryptsetup>(8) for possible " +"values and the default value of this option\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Optionally, the path may be followed by \":\" and an /etc/fstab device " +"specification (e\\&.g\\&. starting with \"UUID=\" or similar); in which " +"case, the path is relative to the device file system root\\&. The device " +"gets mounted automatically for LUKS device activation duration only\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "Added in version 219\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "B<keyfile-offset=>" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Specifies the number of bytes to skip at the start of the key file\\&. See " +"B<cryptsetup>(8) for possible values and the default value of this " +"option\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "Added in version 187\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "B<keyfile-size=>" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Specifies the maximum number of bytes to read from the key file\\&. See " +"B<cryptsetup>(8) for possible values and the default value of this " +"option\\&. This option is ignored in plain encryption mode, as the key file " +"size is then given by the key size\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "Added in version 188\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "B<keyfile-erase>" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"If enabled, the specified key file is erased after the volume is activated " +"or when activation fails\\&. This is in particular useful when the key file " +"is only acquired transiently before activation (e\\&.g\\&. via a file in /" +"run/, generated by a service running before activation), and shall be " +"removed after use\\&. Defaults to off\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "Added in version 246\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "B<key-slot=>" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Specifies the key slot to compare the passphrase or key against\\&. If the " +"key slot does not match the given passphrase or key, but another would, the " +"setup of the device will fail regardless\\&. This option implies B<luks>\\&. " +"See B<cryptsetup>(8) for possible values\\&. The default is to try all key " +"slots in sequential order\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "Added in version 209\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "B<keyfile-timeout=>" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Specifies the timeout for the device on which the key file resides or the " +"device used as the key file, and falls back to a password if it could not be " +"accessed\\&. See B<systemd-cryptsetup-generator>(8) for key files on " +"external devices\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "Added in version 243\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "B<luks>" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Force LUKS mode\\&. When this mode is used, the following options are " +"ignored since they are provided by the LUKS header on the device: " +"B<cipher=>, B<hash=>, B<size=>\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "B<bitlk>" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Decrypt BitLocker drive\\&. Encryption parameters are deduced by cryptsetup " +"from BitLocker header\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "B<_netdev>" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Marks this cryptsetup device as requiring network\\&. It will be started " +"after the network is available, similarly to B<systemd.mount>(5) units " +"marked with B<_netdev>\\&. The service unit to set up this device will be " +"ordered between remote-fs-pre\\&.target and remote-cryptsetup\\&.target, " +"instead of cryptsetup-pre\\&.target and cryptsetup\\&.target\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Hint: if this device is used for a mount point that is specified in " +"B<fstab>(5), the B<_netdev> option should also be used for the mount " +"point\\&. Otherwise, a dependency loop might be created where the mount " +"point will be pulled in by local-fs\\&.target, while the service to " +"configure the network is usually only started I<after> the local file system " +"has been mounted\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "Added in version 235\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "B<noauto>" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"This device will not be added to cryptsetup\\&.target\\&. This means that it " +"will not be automatically unlocked on boot, unless something else pulls it " +"in\\&. In particular, if the device is used for a mount point, it\\*(Aqll be " +"unlocked automatically during boot, unless the mount point itself is also " +"disabled with B<noauto>\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "B<nofail>" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"This device will not be a hard dependency of cryptsetup\\&.target\\&. " +"It\\*(Aqll still be pulled in and started, but the system will not wait for " +"the device to show up and be unlocked, and boot will not fail if this is " +"unsuccessful\\&. Note that other units that depend on the unlocked device " +"may still fail\\&. In particular, if the device is used for a mount point, " +"the mount point itself also needs to have the B<nofail> option, or the boot " +"will fail if the device is not unlocked successfully\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "B<offset=>" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Start offset in the backend device, in 512-byte sectors\\&. This option is " +"only relevant for plain devices\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "Added in version 220\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "B<plain>" +msgstr "" + +#. type: Plain text +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +msgid "Force plain encryption mode\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "B<read-only>, B<readonly>" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "Set up the encrypted block device in read-only mode\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "B<same-cpu-crypt>" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Perform encryption using the same CPU that IO was submitted on\\&. The " +"default is to use an unbound workqueue so that encryption work is " +"automatically balanced between available CPUs\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "This requires kernel 4\\&.0 or newer\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "Added in version 242\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "B<submit-from-crypt-cpus>" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Disable offloading writes to a separate thread after encryption\\&. There " +"are some situations where offloading write requests from the encryption " +"threads to a dedicated thread degrades performance significantly\\&. The " +"default is to offload write requests to a dedicated thread because it " +"benefits the CFQ scheduler to have writes submitted using the same " +"context\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "B<no-read-workqueue>" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Bypass dm-crypt internal workqueue and process read requests " +"synchronously\\&. The default is to queue these requests and process them " +"asynchronously\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "This requires kernel 5\\&.9 or newer\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "Added in version 248\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "B<no-write-workqueue>" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Bypass dm-crypt internal workqueue and process write requests " +"synchronously\\&. The default is to queue these requests and process them " +"asynchronously\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "B<skip=>" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"How many 512-byte sectors of the encrypted data to skip at the beginning\\&. " +"This is different from the B<offset=> option with respect to the sector " +"numbers used in initialization vector (IV) calculation\\&. Using B<offset=> " +"will shift the IV calculation by the same negative amount\\&. Hence, if " +"B<offset=>I<n> is given, sector I<n> will get a sector number of 0 for the " +"IV calculation\\&. Using B<skip=> causes sector I<n> to also be the first " +"sector of the mapped device, but with its number for IV generation being " +"I<n>\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "This option is only relevant for plain devices\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "B<size=>" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Specifies the key size in bits\\&. See B<cryptsetup>(8) for possible values " +"and the default value of this option\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "B<sector-size=>" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Specifies the sector size in bytes\\&. See B<cryptsetup>(8) for possible " +"values and the default value of this option\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "Added in version 240\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "B<swap>" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"The encrypted block device will be used as a swap device, and will be " +"formatted accordingly after setting up the encrypted block device, with " +"B<mkswap>(8)\\&. This option implies B<plain>\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"WARNING: Using the B<swap> option will destroy the contents of the named " +"partition during every boot, so make sure the underlying block device is " +"specified correctly\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "B<tcrypt>" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Use TrueCrypt encryption mode\\&. When this mode is used, the following " +"options are ignored since they are provided by the TrueCrypt header on the " +"device or do not apply: B<cipher=>, B<hash=>, B<keyfile-offset=>, B<keyfile-" +"size=>, B<size=>\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"When this mode is used, the passphrase is read from the key file given in " +"the third field\\&. Only the first line of this file is read, excluding the " +"new line character\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Note that the TrueCrypt format uses both passphrase and key files to derive " +"a password for the volume\\&. Therefore, the passphrase and all key files " +"need to be provided\\&. Use B<tcrypt-keyfile=> to provide the absolute path " +"to all key files\\&. When using an empty passphrase in combination with one " +"or more key files, use \"/dev/null\" as the password file in the third " +"field\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "Added in version 206\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "B<tcrypt-hidden>" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "Use the hidden TrueCrypt volume\\&. This option implies B<tcrypt>\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"This will map the hidden volume that is inside of the volume provided in the " +"second field\\&. Please note that there is no protection for the hidden " +"volume if the outer volume is mounted instead\\&. See B<cryptsetup>(8) for " +"more information on this limitation\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "B<tcrypt-keyfile=>" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Specifies the absolute path to a key file to use for a TrueCrypt volume\\&. " +"This implies B<tcrypt> and can be used more than once to provide several key " +"files\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"See the entry for B<tcrypt> on the behavior of the passphrase and key files " +"when using TrueCrypt encryption mode\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "B<tcrypt-system>" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Use TrueCrypt in system encryption mode\\&. This option implies B<tcrypt>\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "B<tcrypt-veracrypt>" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Check for a VeraCrypt volume\\&. VeraCrypt is a fork of TrueCrypt that is " +"mostly compatible, but uses different, stronger key derivation algorithms " +"that cannot be detected without this flag\\&. Enabling this option could " +"substantially slow down unlocking, because VeraCrypt\\*(Aqs key derivation " +"takes much longer than TrueCrypt\\*(Aqs\\&. This option implies B<tcrypt>\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "Added in version 232\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "B<veracrypt-pim=>" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Specifies a custom Personal Iteration Multiplier (PIM) value, which can " +"range from 0\\&.\\&.2147468 for standard veracrypt volumes and 0\\&." +"\\&.65535 for veracrypt system volumes\\&. A value of 0 will imply the " +"VeraCrypt default\\&. This option is only effective when B<tcrypt-veracrypt> " +"is set\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Note that VeraCrypt enforces a minimal allowed PIM value depending on the " +"password strength and the hash algorithm used for key derivation, however " +"B<veracrypt-pim=> is not checked against these bounds\\&. See " +"\\m[blue]B<Veracrypt Personal Iterations " +"Multiplier>\\m[]\\&\\s-2\\u[1]\\d\\s+2 documentation for more information\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "Added in version 254\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "B<timeout=>" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Specifies the timeout for querying for a password\\&. If no unit is " +"specified, seconds is used\\&. Supported units are s, ms, us, min, h, d\\&. " +"A timeout of 0 waits indefinitely (which is the default)\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "B<tmp=>" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"The encrypted block device will be prepared for using it as /tmp/; it will " +"be formatted using B<mkfs>(8)\\&. Takes a file system type as argument, such " +"as \"ext4\", \"xfs\" or \"btrfs\"\\&. If no argument is specified defaults " +"to \"ext4\"\\&. This option implies B<plain>\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"WARNING: Using the B<tmp> option will destroy the contents of the named " +"partition during every boot, so make sure the underlying block device is " +"specified correctly\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "B<tries=>" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Specifies the maximum number of times the user is queried for a password\\&. " +"The default is 3\\&. If set to 0, the user is queried for a password " +"indefinitely\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "B<headless=>" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Takes a boolean argument, defaults to false\\&. If true, never query " +"interactively for the password/PIN\\&. Useful for headless systems\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "Added in version 249\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "B<verify>" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"If the encryption password is read from console, it has to be entered twice " +"to prevent typos\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "B<password-echo=yes|no|masked>" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Controls whether to echo passwords or security token PINs that are read from " +"console\\&. Takes a boolean or the special string \"masked\"\\&. The default " +"is B<password-echo=masked>\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"If enabled, the typed characters are echoed literally\\&. If disabled, the " +"typed characters are not echoed in any form, the user will not get feedback " +"on their input\\&. If set to \"masked\", an asterisk (\"*\") is echoed for " +"each character typed\\&. Regardless of which mode is chosen, if the user " +"hits the tabulator key (\"↹\") at any time, or the backspace key (\"⌫\") " +"before any other data has been entered, then echo is turned off\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "B<pkcs11-uri=>" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Takes either the special value \"auto\" or an \\m[blue]B<RFC7512 PKCS#11 " +"URI>\\m[]\\&\\s-2\\u[2]\\d\\s+2 pointing to a private RSA key which is used " +"to decrypt the encrypted key specified in the third column of the line\\&. " +"This is useful for unlocking encrypted volumes through PKCS#11 compatible " +"security tokens or smartcards\\&. See below for an example how to set up " +"this mechanism for unlocking a LUKS2 volume with a YubiKey security token\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"If specified as \"auto\" the volume must be of type LUKS2 and must carry " +"PKCS#11 security token metadata in its LUKS2 JSON token section\\&. In this " +"mode the URI and the encrypted key are automatically read from the LUKS2 " +"JSON token header\\&. Use B<systemd-cryptenroll>(1) as simple tool for " +"enrolling PKCS#11 security tokens or smartcards in a way compatible with " +"\"auto\"\\&. In this mode the third column of the line should remain empty " +"(that is, specified as \"-\")\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"The specified URI can refer directly to a private RSA key stored on a token " +"or alternatively just to a slot or token, in which case a search for a " +"suitable private RSA key will be performed\\&. In this case if multiple " +"suitable objects are found the token is refused\\&. The encrypted key " +"configured in the third column of the line is passed as is (i\\&.e\\&. in " +"binary form, unprocessed) to RSA decryption\\&. The resulting decrypted key " +"is then Base64 encoded before it is used to unlock the LUKS volume\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Use B<systemd-cryptenroll --pkcs11-token-uri=list> to list all suitable " +"PKCS#11 security tokens currently plugged in, along with their URIs\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Note that many newer security tokens that may be used as PKCS#11 security " +"token typically also implement the newer and simpler FIDO2 standard\\&. " +"Consider using B<fido2-device=> (described below) to enroll it via FIDO2 " +"instead\\&. Note that a security token enrolled via PKCS#11 cannot be used " +"to unlock the volume via FIDO2, unless also enrolled via FIDO2, and vice " +"versa\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "Added in version 245\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "B<fido2-device=>" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Takes either the special value \"auto\" or the path to a \"hidraw\" device " +"node (e\\&.g\\&. /dev/hidraw1) referring to a FIDO2 security token that " +"implements the \"hmac-secret\" extension (most current hardware security " +"tokens do)\\&. See below for an example how to set up this mechanism for " +"unlocking an encrypted volume with a FIDO2 security token\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"If specified as \"auto\" the FIDO2 token device is automatically discovered, " +"as it is plugged in\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"FIDO2 volume unlocking requires a client ID hash (CID) to be configured via " +"B<fido2-cid=> (see below) and a key to pass to the security token\\*(Aqs " +"HMAC functionality (configured in the line\\*(Aqs third column) to " +"operate\\&. If not configured and the volume is of type LUKS2, the CID and " +"the key are read from LUKS2 JSON token metadata instead\\&. Use B<systemd-" +"cryptenroll>(1) as simple tool for enrolling FIDO2 security tokens, " +"compatible with this automatic mode, which is only available for LUKS2 " +"volumes\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Use B<systemd-cryptenroll --fido2-device=list> to list all suitable FIDO2 " +"security tokens currently plugged in, along with their device nodes\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"This option implements the following mechanism: the configured key is hashed " +"via they HMAC keyed hash function the FIDO2 device implements, keyed by a " +"secret key embedded on the device\\&. The resulting hash value is Base64 " +"encoded and used to unlock the LUKS2 volume\\&. As it should not be possible " +"to extract the secret from the hardware token, it should not be possible to " +"retrieve the hashed key given the configured key \\(em without possessing " +"the hardware token\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Note that many security tokens that implement FIDO2 also implement PKCS#11, " +"suitable for unlocking volumes via the B<pkcs11-uri=> option described " +"above\\&. Typically the newer, simpler FIDO2 standard is preferable\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "B<fido2-cid=>" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Takes a Base64 encoded FIDO2 client ID to use for the FIDO2 unlock " +"operation\\&. If specified, but B<fido2-device=> is not, B<fido2-" +"device=auto> is implied\\&. If B<fido2-device=> is used but B<fido2-cid=> is " +"not, the volume must be of LUKS2 type, and the CID is read from the LUKS2 " +"JSON token header\\&. Use B<systemd-cryptenroll>(1) for enrolling a FIDO2 " +"token in the LUKS2 header compatible with this automatic mode\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "B<fido2-rp=>" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Takes a string, configuring the FIDO2 Relying Party (rp) for the FIDO2 " +"unlock operation\\&. If not specified \"io\\&.systemd\\&.cryptsetup\" is " +"used, except if the LUKS2 JSON token header contains a different value\\&. " +"It should normally not be necessary to override this\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "B<tpm2-device=>" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Takes either the special value \"auto\" or the path to a device node (e\\&." +"g\\&. /dev/tpmrm0) referring to a TPM2 security chip\\&. See below for an " +"example how to set up this mechanism for unlocking an encrypted volume with " +"a TPM2 chip\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Use B<tpm2-pcrs=> (see below) to configure the set of TPM2 PCRs to bind the " +"volume unlocking to\\&. Use B<systemd-cryptenroll>(1) as simple tool for " +"enrolling TPM2 security chips in LUKS2 volumes\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"If specified as \"auto\" the TPM2 device is automatically discovered\\&. Use " +"B<systemd-cryptenroll --tpm2-device=list> to list all suitable TPM2 devices " +"currently available, along with their device nodes\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"This option implements the following mechanism: when enrolling a TPM2 device " +"via B<systemd-cryptenroll> on a LUKS2 volume, a randomized key unlocking the " +"volume is generated on the host and loaded into the TPM2 chip where it is " +"encrypted with an asymmetric \"primary\" key pair derived from the " +"TPM2\\*(Aqs internal \"seed\" key\\&. Neither the seed key nor the primary " +"key are permitted to ever leave the TPM2 chip \\(em however, the now " +"encrypted randomized key may\\&. It is saved in the LUKS2 volume JSON token " +"header\\&. When unlocking the encrypted volume, the primary key pair is " +"generated on the TPM2 chip again (which works as long as the chip\\*(Aqs " +"seed key is correctly maintained by the TPM2 chip), which is then used to " +"decrypt (on the TPM2 chip) the encrypted key from the LUKS2 volume JSON " +"token header saved there during enrollment\\&. The resulting decrypted key " +"is then used to unlock the volume\\&. When the randomized key is encrypted " +"the current values of the selected PCRs (see below) are included in the " +"operation, so that different PCR state results in different encrypted keys " +"and the decrypted key can only be recovered if the same PCR state is " +"reproduced\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "B<tpm2-pcrs=>" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Takes a \"+\" separated list of numeric TPM2 PCR (i\\&.e\\&. \"Platform " +"Configuration Register\") indexes to bind the TPM2 volume unlocking to\\&. " +"This option is only useful when TPM2 enrollment metadata is not available in " +"the LUKS2 JSON token header already, the way B<systemd-cryptenroll> writes " +"it there\\&. If not used (and no metadata in the LUKS2 JSON token header " +"defines it), defaults to a list of a single entry: PCR 7\\&. Assign an empty " +"string to encode a policy that binds the key to no PCRs, making the key " +"accessible to local programs regardless of the current PCR state\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "B<tpm2-pin=>" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Takes a boolean argument, defaults to \"false\"\\&. Controls whether TPM2 " +"volume unlocking is bound to a PIN in addition to PCRs\\&. Similarly, this " +"option is only useful when TPM2 enrollment metadata is not available\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "Added in version 251\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "B<tpm2-signature=>" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Takes an absolute path to a TPM2 PCR JSON signature file, as produced by the " +"B<systemd-measure>(1) tool\\&. This permits locking LUKS2 volumes to any " +"PCR values for which a valid signature matching a public key specified at " +"key enrollment time can be provided\\&. See B<systemd-cryptenroll>(1) for " +"details on enrolling TPM2 PCR public keys\\&. If this option is not " +"specified but it is attempted to unlock a LUKS2 volume with a signed TPM2 " +"PCR enrollment a suitable signature file tpm2-pcr-signature\\&.json is " +"searched for in /etc/systemd/, /run/systemd/, /usr/lib/systemd/ (in this " +"order)\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "Added in version 252\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "B<tpm2-pcrlock=>" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Takes an absolute path to a TPM2 pcrlock policy file, as produced by the " +"B<systemd-pcrlock>(1) tool\\&. This permits locking LUKS2 volumes to a " +"local policy of allowed PCR values with variants\\&. See B<systemd-" +"cryptenroll>(1) for details on enrolling TPM2 pcrlock policies\\&. If this " +"option is not specified but it is attempted to unlock a LUKS2 volume with a " +"TPM2 pcrlock enrollment a suitable signature file pcrlock\\&.json is " +"searched for in /run/systemd/ and /var/lib/systemd/ (in this order)\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "Added in version 255\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "B<tpm2-measure-pcr=>" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Controls whether to measure the volume key of the encrypted volume to a TPM2 " +"PCR\\&. If set to \"no\" (which is the default) no PCR extension is done\\&. " +"If set to \"yes\" the volume key is measured into PCR 15\\&. If set to a " +"decimal integer in the range 0\\&...23 the volume key is measured into the " +"specified PCR\\&. The volume key is measured along with the activated volume " +"name and its UUID\\&. This functionality is particularly useful for the " +"encrypted volume backing the root file system, as it then allows later TPM " +"objects to be securely bound to the root file system and hence the specific " +"installation\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "Added in version 253\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "B<tpm2-measure-bank=>" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Selects one or more TPM2 PCR banks to measure the volume key into, as " +"configured with B<tpm2-measure-pcr=> above\\&. Multiple banks may be " +"specified, separated by a colon character\\&. If not specified automatically " +"determines available and used banks\\&. Expects a message digest name (e\\&." +"g\\&. \"sha1\", \"sha256\", \\&...) as argument, to identify the bank\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "B<token-timeout=>" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Specifies how long to wait at most for configured security devices (i\\&." +"e\\&. FIDO2, PKCS#11, TPM2) to show up\\&. Takes a time value in seconds " +"(but other time units may be specified too, see B<systemd.time>(7) for " +"supported formats)\\&. Defaults to 30s\\&. Once the specified timeout " +"elapsed authentication via password is attempted\\&. Note that this timeout " +"applies to waiting for the security device to show up \\(em it does not " +"apply to the PIN prompt for the device (should one be needed) or similar\\&. " +"Pass 0 to turn off the time-out and wait forever\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "Added in version 250\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "B<try-empty-password=>" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Takes a boolean argument\\&. If enabled, right before asking the user for a " +"password it is first attempted to unlock the volume with an empty " +"password\\&. This is useful for systems that are initialized with an " +"encrypted volume with only an empty password set, which shall be replaced " +"with a suitable password during first boot, but after activation\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "B<x-systemd\\&.device-timeout=>" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Specifies how long systemd should wait for a block device to show up before " +"giving up on the entry\\&. The argument is a time in seconds or explicitly " +"specified units of \"s\", \"min\", \"h\", \"ms\"\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "Added in version 216\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "B<x-initrd\\&.attach>" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Setup this encrypted block device in the initrd, similarly to B<systemd." +"mount>(5) units marked with B<x-initrd\\&.mount>\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Although it\\*(Aqs not necessary to mark the mount entry for the root file " +"system with B<x-initrd\\&.mount>, B<x-initrd\\&.attach> is still recommended " +"with the encrypted block device containing the root file system as otherwise " +"systemd will attempt to detach the device during the regular system shutdown " +"while it\\*(Aqs still in use\\&. With this option the device will still be " +"detached but later after the root file system is unmounted\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"All other encrypted block devices that contain file systems mounted in the " +"initrd should use this option\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"At early boot and when the system manager configuration is reloaded, this " +"file is translated into native systemd units by B<systemd-cryptsetup-" +"generator>(8)\\&." +msgstr "" + +#. type: SH +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +#, no-wrap +msgid "AF_UNIX KEY FILES" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"If the key file path (as specified in the third column of /etc/crypttab " +"entries, see above) refers to an B<AF_UNIX> stream socket in the file " +"system, the key is acquired by connecting to the socket and reading the key " +"from the connection\\&. The connection is made from an B<AF_UNIX> socket " +"name in the abstract namespace, see B<unix>(7) for details\\&. The source " +"socket name is chosen according the following format:" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +#, no-wrap +msgid "B<NUL> I<RANDOM> /cryptsetup/ I<VOLUME>\n" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"In other words: a B<NUL> byte (as required for abstract namespace sockets), " +"followed by a random string (consisting of alphanumeric characters only), " +"followed by the literal string \"/cryptsetup/\", followed by the name of the " +"volume to acquire they key for\\&. For example, for the volume \"myvol\":" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +#, no-wrap +msgid "\\e0d7067f78d9827418/cryptsetup/myvol\n" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Services listening on the B<AF_UNIX> stream socket may query the source " +"socket name with B<getpeername>(2), and use this to determine which key to " +"send, allowing a single listening socket to serve keys for multiple " +"volumes\\&. If the PKCS#11 logic is used (see above), the socket source name " +"is picked in similar fashion, except that the literal string \"/cryptsetup-" +"pkcs11/\" is used\\&. And similarly for FIDO2 (\"/cryptsetup-fido2/\") and " +"TPM2 (\"/cryptsetup-tpm2/\")\\&. A different path component is used so that " +"services providing key material know that the secret key was not requested " +"directly, but instead an encrypted key that will be decrypted via the " +"PKCS#11/FIDO2/TPM2 logic to acquire the final secret key\\&." +msgstr "" + +#. type: SH +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "EXAMPLES" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "B<Example\\ \\&1.\\ \\&/etc/crypttab example>" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"Set up four encrypted block devices\\&. One using LUKS for normal storage, " +"another one for usage as a swap device and two TrueCrypt volumes\\&. For the " +"fourth device, the option string is interpreted as two options " +"\"cipher=xchacha12,aes-adiantum-plain64\", \"keyfile-timeout=10s\"\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +#, no-wrap +msgid "" +"luks UUID=2505567a-9e27-4efe-a4d5-15ad146c258b\n" +"swap /dev/sda7 /dev/urandom swap\n" +"truecrypt /dev/sda2 /etc/container_password tcrypt\n" +"hidden /mnt/tc_hidden /dev/null tcrypt-hidden,tcrypt-keyfile=/etc/keyfile\n" +"external /dev/sda3 keyfile:LABEL=keydev keyfile-timeout=10s,cipher=xchacha12\\e,aes-adiantum-plain64\n" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "B<Example\\ \\&2.\\ \\&Yubikey-based PKCS#11 Volume Unlocking Example>" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"The PKCS#11 logic allows hooking up any compatible security token that is " +"capable of storing RSA decryption keys for unlocking an encrypted volume\\&. " +"Here\\*(Aqs an example how to set up a Yubikey security token for this " +"purpose on a LUKS2 volume, using B<ykmap>(1) from the yubikey-manager " +"project to initialize the token and B<systemd-cryptenroll>(1) to add it in " +"the LUKS2 volume:" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +#, no-wrap +msgid "# SPDX-License-Identifier: MIT-0\n" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +#, no-wrap +msgid "" +"# Destroy any old key on the Yubikey (careful!)\n" +"ykman piv reset\n" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +#, no-wrap +msgid "" +"# Generate a new private/public key pair on the device, store the public key in\n" +"# \\*(Aqpubkey\\&.pem\\*(Aq\\&.\n" +"ykman piv generate-key -a RSA2048 9d pubkey\\&.pem\n" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +#, no-wrap +msgid "" +"# Create a self-signed certificate from this public key, and store it on the\n" +"# device\\&. The \"subject\" should be an arbitrary user-chosen string to identify\n" +"# the token with\\&.\n" +"ykman piv generate-certificate --subject \"Knobelei\" 9d pubkey\\&.pem\n" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +#, no-wrap +msgid "" +"# We don\\*(Aqt need the public key anymore, let\\*(Aqs remove it\\&. Since it is not\n" +"# security sensitive we just do a regular \"rm\" here\\&.\n" +"rm pubkey\\&.pem\n" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +#, no-wrap +msgid "" +"# Enroll the freshly initialized security token in the LUKS2 volume\\&. Replace\n" +"# /dev/sdXn by the partition to use (e\\&.g\\&. /dev/sda1)\\&.\n" +"sudo systemd-cryptenroll --pkcs11-token-uri=auto /dev/sdXn\n" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +#, no-wrap +msgid "" +"# Test: Let\\*(Aqs run systemd-cryptsetup to test if this all worked\\&.\n" +"sudo systemd-cryptsetup attach mytest /dev/sdXn - pkcs11-uri=auto\n" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +#, no-wrap +msgid "" +"# If that worked, let\\*(Aqs now add the same line persistently to /etc/crypttab,\n" +"# for the future\\&. We don\\*(Aqt want to use the (unstable) /dev/sdX name, so let\\*(Aqs\n" +"# figure out a stable link:\n" +"udevadm info -q -r symlink /dev/sdXn\n" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +#, no-wrap +msgid "" +"# Now add the line using the by-uuid symlink to /etc/crypttab:\n" +"sudo bash -c \\*(Aqecho \"mytest /dev/disk/by-uuid/\\&.\\&.\\&. - pkcs11-uri=auto\" E<gt>E<gt>/etc/crypttab\\*(Aq\n" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +#, no-wrap +msgid "" +"# Depending on your distribution and encryption setup, you may need to manually\n" +"# regenerate your initramfs to be able to use a Yubikey / PKCS#11 token to\n" +"# unlock the partition during early boot\\&.\n" +"# More information at https://unix\\&.stackexchange\\&.com/a/705809\\&.\n" +"# On Fedora based systems:\n" +"sudo dracut --force\n" +"# On Debian based systems:\n" +"sudo update-initramfs -u\n" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "A few notes on the above:" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "We use RSA2048, which is the longest key size current Yubikeys support" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"We use Yubikey key slot 9d, since that\\*(Aqs apparently the keyslot to use " +"for decryption purposes, see \\m[blue]B<Yubico PIV certificate " +"slots>\\m[]\\&\\s-2\\u[3]\\d\\s+2\\&." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "B<Example\\ \\&3.\\ \\&FIDO2 Volume Unlocking Example>" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"The FIDO2 logic allows using any compatible FIDO2 security token that " +"implements the \"hmac-secret\" extension for unlocking an encrypted " +"volume\\&. Here\\*(Aqs an example how to set up a FIDO2 security token for " +"this purpose for a LUKS2 volume, using B<systemd-cryptenroll>(1):" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +#, no-wrap +msgid "" +"# Enroll the security token in the LUKS2 volume\\&. Replace /dev/sdXn by the\n" +"# partition to use (e\\&.g\\&. /dev/sda1)\\&.\n" +"sudo systemd-cryptenroll --fido2-device=auto /dev/sdXn\n" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +#, no-wrap +msgid "" +"# Test: Let\\*(Aqs run systemd-cryptsetup to test if this worked\\&.\n" +"sudo systemd-cryptsetup attach mytest /dev/sdXn - fido2-device=auto\n" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +#, no-wrap +msgid "" +"# Now add the line using the by-uuid symlink to /etc/crypttab:\n" +"sudo bash -c \\*(Aqecho \"mytest /dev/disk/by-uuid/\\&.\\&.\\&. - fido2-device=auto\" E<gt>E<gt>/etc/crypttab\\*(Aq\n" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +#, no-wrap +msgid "" +"# Depending on your distribution and encryption setup, you may need to manually\n" +"# regenerate your initramfs to be able to use a FIDO2 device to unlock the\n" +"# partition during early boot\\&.\n" +"# More information at https://unix\\&.stackexchange\\&.com/a/705809\\&.\n" +"# On Fedora based systems:\n" +"sudo dracut --force\n" +"# On Debian based systems:\n" +"sudo update-initramfs -u\n" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "B<Example\\ \\&4.\\ \\&TPM2 Volume Unlocking Example>" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"The TPM2 logic allows using any TPM2 chip supported by the Linux kernel for " +"unlocking an encrypted volume\\&. Here\\*(Aqs an example how to set up a " +"TPM2 chip for this purpose for a LUKS2 volume, using B<systemd-" +"cryptenroll>(1):" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +#, no-wrap +msgid "" +"# Enroll the TPM2 security chip in the LUKS2 volume, and bind it to PCR 7\n" +"# only\\&. Replace /dev/sdXn by the partition to use (e\\&.g\\&. /dev/sda1)\\&.\n" +"sudo systemd-cryptenroll --tpm2-device=auto --tpm2-pcrs=7 /dev/sdXn\n" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +#, no-wrap +msgid "" +"# Test: Let\\*(Aqs run systemd-cryptsetup to test if this worked\\&.\n" +"sudo systemd-cryptsetup attach mytest /dev/sdXn - tpm2-device=auto\n" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +#, no-wrap +msgid "" +"# Now add the line using the by-uuid symlink to /etc/crypttab:\n" +"sudo bash -c \\*(Aqecho \"mytest /dev/disk/by-uuid/\\&.\\&.\\&. - tpm2-device=auto\" E<gt>E<gt>/etc/crypttab\\*(Aq\n" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +#, no-wrap +msgid "" +"# And now let\\*(Aqs check that automatic unlocking works:\n" +"sudo systemd-cryptsetup detach mytest\n" +"sudo systemctl daemon-reload\n" +"sudo systemctl start cryptsetup\\&.target\n" +"systemctl is-active systemd-cryptsetup@mytest\\&.service\n" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +#, no-wrap +msgid "" +"# Once we have the device which will be unlocked automatically, we can use it\\&.\n" +"# Usually we would create a file system and add it to /etc/fstab:\n" +"sudo mkfs\\&.ext4 /dev/mapper/mytest\n" +"# This prints a \\*(AqFilesystem UUID\\*(Aq, which we can use as a stable name:\n" +"sudo bash -c \\*(Aqecho \"/dev/disk/by-uuid/\\&.\\&.\\&. /var/mytest ext4 defaults,x-systemd\\&.mkdir 0 2\" E<gt>E<gt>/etc/fstab\\*(Aq\n" +"# And now let\\*(Aqs check that the mounting works:\n" +"sudo systemctl daemon-reload\n" +"sudo systemctl start /var/mytest\n" +"systemctl status /var/mytest\n" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +#, no-wrap +msgid "" +"# Depending on your distribution and encryption setup, you may need to manually\n" +"# regenerate your initramfs to be able to use a TPM2 security chip to unlock\n" +"# the partition during early boot\\&.\n" +"# More information at https://unix\\&.stackexchange\\&.com/a/705809\\&.\n" +"# On Fedora based systems:\n" +"sudo dracut --force\n" +"# On Debian based systems:\n" +"sudo update-initramfs -u\n" +msgstr "" + +#. type: SH +#: archlinux debian-bookworm debian-unstable fedora-40 fedora-rawhide +#: mageia-cauldron +#, no-wrap +msgid "SEE ALSO" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"B<systemd>(1), B<systemd-cryptsetup@.service>(8), B<systemd-cryptsetup-" +"generator>(8), B<systemd-cryptenroll>(1), B<fstab>(5), B<cryptsetup>(8), " +"B<mkswap>(8), B<mke2fs>(8)" +msgstr "" + +#. type: SH +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +#, no-wrap +msgid "NOTES" +msgstr "" + +#. type: IP +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +#, no-wrap +msgid " 1." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "Veracrypt Personal Iterations Multiplier" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"\\%https://www.veracrypt.fr/en/" +"Personal%20Iterations%20Multiplier%20%28PIM%29.html" +msgstr "" + +#. type: IP +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +#, no-wrap +msgid " 2." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "RFC7512 PKCS#11 URI" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "\\%https://tools.ietf.org/html/rfc7512" +msgstr "" + +#. type: IP +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +#, no-wrap +msgid " 3." +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "Yubico PIV certificate slots" +msgstr "" + +#. type: Plain text +#: archlinux fedora-40 fedora-rawhide mageia-cauldron +msgid "" +"\\%https://developers.yubico.com/PIV/Introduction/Certificate_slots.html" +msgstr "" + +#. type: TH +#: debian-bookworm +#, no-wrap +msgid "2023-12-18" +msgstr "" + +#. type: TH +#: debian-bookworm +#, no-wrap +msgid "cryptsetup 2:2\\&.6\\&.1-4~deb1" +msgstr "" + +#. type: TH +#: debian-bookworm debian-unstable +#, no-wrap +msgid "cryptsetup manual" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "crypttab - static information about encrypted filesystems" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"The file /etc/crypttab contains descriptive information about encrypted " +"devices\\&. crypttab is only read by programs (e\\&.g\\&. " +"B<cryptdisks_start> and B<cryptdisks_stop>), and not written; it is the duty " +"of the system administrator to properly create and maintain this file\\&. " +"crypttab entries are treated sequentially, so their order matters " +"(dependencies need to listed first)\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"Each encrypted device is described on a separate line\\&. Fields on each " +"line are separated by tabs or spaces\\&. Lines starting with \\*(Aq#\\*(Aq " +"are comments, and blank lines are ignored\\&. Octal sequences \\e0I<num> " +"within a field are decoded, which can be used for values containing spaces " +"or special characters\\&. A backslash which doesn\\*(Aqt start an octal " +"sequence yields undefined behavior\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"The first field, I<target>, describes the mapped device name\\&. It must be " +"a plain filename without any directory components\\&. A mapped device which " +"encrypts/decrypts data to/from the I<source device> will be created at /dev/" +"mapper/target by B<cryptsetup>\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"The second field, I<source device>, describes either the block special " +"device or file that contains the encrypted data\\&. Instead of giving the " +"I<source device> explicitly, the UUID (resp\\&. LABEL, PARTUUID and " +"PARTLABEL) is supported as well, using \\(lqUUID=E<lt>uuidE<gt>\\(rq " +"(resp\\&. \\(lqLABEL=E<lt>labelE<gt>\\(rq, " +"\\(lqPARTUUID=E<lt>partuuidE<gt>\\(rq and " +"\\(lqPARTLABEL=E<lt>partlabelE<gt>\\(rq)\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"The third field, I<key file>, describes the file to use as a key for " +"decrypting the data of the I<source device>\\&. In case of a I<keyscript>, " +"the value of this field is given as argument to the keyscript\\&. Note that " +"the I<entire> key file will be used as the passphrase; the passphrase must " +"I<not> be followed by a newline character\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"It can also be a device name (e\\&.g\\&. /dev/urandom), note however that " +"LUKS requires a persistent key and therefore does I<not> support random data " +"keys\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"If the I<key file> is the string I<none>, a passphrase will be read " +"interactively from the console\\&. In this case, the options check, " +"checkargs and tries may be useful\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"The fourth field, I<options>, is an optional comma-separated list of options " +"and/or flags describing the device type (I<luks>, I<tcrypt>, I<bitlk>, " +"I<fvault2>, or I<plain> which is also the default) and cryptsetup options " +"associated with the encryption process\\&. The supported options are " +"described below\\&. For plain dm-crypt devices the I<cipher>, I<hash> and " +"I<size> options are required\\&. Some options can be changed on active " +"mappings using B<cryptsetup refresh [E<lt>optionsE<gt>] E<lt>nameE<gt>>\\&. " +"Furthermore some options can be permanently written into metadata of LUKS2 " +"headers using cryptsetup\\*(Aqs I<--persistent> flag\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"Note that the first three fields are required and that a missing field will " +"lead to unspecified behaviour\\&." +msgstr "" + +#. type: SH +#: debian-bookworm debian-unstable +#, no-wrap +msgid "ON DIFFERENT CRYPTTAB FORMATS" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"Please note that there are several independent cryptsetup wrappers with " +"their own I<crypttab> format\\&. This manpage covers Debian\\*(Aqs " +"implementation for I<initramfs> scripts and I<SysVinit> init scripts\\&. " +"I<systemd> brings its own I<crypttab> implementation\\&. We try to cover the " +"differences between the I<systemd> and our implementation in this manpage, " +"but if in doubt, better check the I<systemd> B<crypttab>(5) manpage, e\\&." +"g\\&. online at \\m[blue]B<\\%https://www.freedesktop.org/software/systemd/" +"man/crypttab.html>\\m[]\\&." +msgstr "" + +#. type: SH +#: debian-bookworm debian-unstable +#, no-wrap +msgid "OPTIONS" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "I<cipher>=E<lt>cipherE<gt>" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"Encryption algorithm (ignored for LUKS and TCRYPT devices)\\&. See " +"B<cryptsetup -c>\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "I<size>=E<lt>sizeE<gt>" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"Encryption key size (ignored for LUKS and TCRYPT devices)\\&. See " +"B<cryptsetup -s>\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "I<sector-size>=E<lt>bytesE<gt>" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"Sector size\\&. See B<cryptsetup>(8) for possible values and the default " +"value of this option\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "I<hash>=E<lt>hashE<gt>" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"Hash algorithm (ignored for LUKS and TCRYPT devices)\\&. See B<cryptsetup -" +"h>\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "I<offset>=E<lt>offsetE<gt>" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"Start offset (ignored for LUKS and TCRYPT devices)\\&. Uses B<cryptsetup -" +"o>\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "I<skip>=E<lt>skipE<gt>" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"Skip sectors at the beginning (ignored for LUKS and TCRYPT devices)\\&. Uses " +"B<cryptsetup -p>\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "I<keyfile-offset>=E<lt>keyfile-offsetE<gt>" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "Specifies the number of bytes to skip at the start of the key file\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "I<keyfile-size>=E<lt>keyfile-sizeE<gt>" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"Specifies the maximum number of bytes to read from the key file\\&. The " +"default is to read the whole file up to the compiled-in maximum, that can be " +"queried with B<cryptsetup --help>\\&. This option is ignored for plain dm-" +"crypt devices, as the key file size is then given by the encryption key size " +"(option I<size>)\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "I<keyslot>=E<lt>slotE<gt>, I<key-slot>=E<lt>slotE<gt>" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "Key slot (ignored for non-LUKS devices)\\&. See B<cryptsetup -S>\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "I<header>=E<lt>pathE<gt>" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"Detached header file (ignored for plain dm-crypt devices)\\&. See " +"B<cryptsetup --header>\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "I<verify>" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "Verify password\\&. Uses B<cryptsetup -y>\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "I<readonly>, I<read-only>" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "Set up a read-only mapping\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "I<tries>=E<lt>numE<gt>" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"Try to unlock the device E<lt>numE<gt> before failing\\&. It\\*(Aqs " +"particularly useful when using a passphrase or a I<keyscript> that asks for " +"interactive input\\&. If you want to disable retries, pass " +"\\(lqtries=1\\(rq\\&. Default is \\(lq3\\(rq\\&. Setting \\(lqtries=0\\(rq " +"means infinitive retries\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "I<discard>" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "Allow using of discards (TRIM) requests for device\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"Starting with Debian 10 (Buster), this option is added per default to new dm-" +"crypt devices by the Debian Installer\\&. If you don\\*(Aqt care about " +"leaking access patterns (filesystem type, used space) and don\\*(Aqt have " +"hidden truecrypt volumes inside this volume, then it should be safe to " +"enable this option\\&. See the following warning for further information\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"B<WARNING>: Assess the specific security risks carefully before enabling " +"this option\\&. For example, allowing discards on encrypted devices may lead " +"to the leak of information about the ciphertext device (filesystem type, " +"used space etc\\&.) if the discarded blocks can be located easily on the " +"device later\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "I<luks>" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"Force LUKS mode\\&. When this mode is used, the following options are " +"ignored since they are provided by the LUKS header on the device: " +"I<cipher=>, I<hash=>, I<size=>" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "I<plain>" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "I<bitlk>" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"Force BITLK (Windows BitLocker-compatible) mode\\&. WARNING: I<crypttab> " +"support is currently experimental\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "I<fvault2>" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"Force Apple\\*(Aqs FileVault2 mode\\&. Only the (legacy) FileVault2 format " +"based on Core Storage and HFS+ filesystem (introduced in MacOS X 10\\&.7 " +"Lion) is currently supported; the new version of FileVault based on the APFS " +"filesystem used in recent macOS versions is not supported\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "I<tcrypt>" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"Use TrueCrypt encryption mode\\&. When this mode is used, the following " +"options are ignored since they are provided by the TrueCrypt header on the " +"device or do not apply: I<cipher=>, I<hash=>, I<keyfile-offset=>, I<keyfile-" +"size=>, I<size=>" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "I<veracrypt>, I<tcrypt-veracrypt>" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"Use VeraCrypt extension to TrueCrypt device\\&. Only useful in conjunction " +"with I<tcrypt> option (ignored for non-TrueCrypt devices)\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "I<tcrypthidden>, I<tcrypt-hidden>" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "Use hidden TCRYPT header (ignored for non-TCRYPT devices)\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "I<same-cpu-crypt>" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "Perform encryption using the same cpu that IO was submitted on\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "I<submit-from-crypt-cpus>" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "Disable offloading writes to a separate thread after encryption\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "I<no-read-workqueue>, I<no-write-workqueue>" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"Bypass dm-crypt internal workqueue and process read or write requests " +"synchronously\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "I<swap>" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "Run B<mkswap> on the created device\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "This option is ignored for I<initramfs> devices\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "I<tmp>[=E<lt>tmpfsE<gt>]" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"Run B<mkfs> with filesystem type E<lt>tmpfsE<gt> (or ext4 if omitted) on the " +"created device\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "I<check>[=E<lt>checkE<gt>]" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"Check the content of the target device by a suitable program; if the check " +"fails, the device is closed immediately\\&. The program is being run with " +"decrypted volume (target device) as first positional argument and, if the " +"I<checkargs> option is used, its value as second argument\\&. See the " +"CHECKSCRIPTS section for more information\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"The program is either specified by full path or relative to /lib/cryptsetup/" +"checks/\\&. If omitted, then the value of $CRYPTDISKS_CHECK set in /etc/" +"default/cryptdisks is used (blkid by default)\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"This option is specific to the Debian I<crypttab> format\\&. It\\*(Aqs not " +"supported by I<systemd>\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "I<checkargs>=E<lt>argumentsE<gt>" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"Give E<lt>argumentsE<gt> as the second argument to the check script\\&. See " +"the CHECKSCRIPTS section for more information\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "I<initramfs>" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"The initramfs hook processes the root device, any resume devices and any " +"devices with the I<initramfs> option set\\&. These devices are processed " +"within the initramfs stage of boot\\&. As an example, that allows the use of " +"remote unlocking using dropbear\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "I<noearly>" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"The cryptsetup init scripts are invoked twice during the boot process - once " +"before lvm, raid, etc\\&. are started and once again after that\\&. " +"Sometimes you need to start your encrypted disks in a special order\\&. With " +"this option the device is ignored during the first invocation of the " +"cryptsetup init scripts\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"This option is ignored for I<initramfs> devices and specific to the Debian " +"I<crypttab> format\\&. It\\*(Aqs not supported by I<systemd>\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "I<noauto>" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"Entirely ignore the device at the boot process\\&. It\\*(Aqs still possible " +"to map the device manually using cryptdisks_start\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "I<loud>" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"Be loud\\&. Print warnings if a device does not exist\\&. This option " +"overrides the option I<quiet>\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "I<quiet>" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"Be quiet\\&. Don\\*(Aqt print warnings if a device does not exist\\&. This " +"option overrides the option I<loud>\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "I<keyscript>=E<lt>pathE<gt>" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"The executable at the indicated path is executed with the value of the " +"I<third field> as only argument\\&. The keyscript\\*(Aqs standard output is " +"passed to cryptsetup as decyption key\\&. Its exit status is currently " +"ignored, but no assumption should be made in that regard\\&. When used in " +"initramfs, the executable either needs to be self-contained (i\\&.e\\&. " +"doesn\\*(Aqt rely on any external program which is not present in the " +"initramfs environment) or the dependencies have to added to the initramfs " +"image by other means\\&. The program is either specified by full path or " +"relative to /lib/cryptsetup/scripts/\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"LIMITATIONS: All binaries and files on which the keyscript depends must be " +"available at the time of execution\\&. Special care needs to be taken for " +"encrypted filesystems like /usr or /var\\&. As an example, unlocking " +"encrypted /usr must not depend on binaries from /usr/(s)bin\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"WARNING: With systemd as init system, this option might be ignored\\&. At " +"the time this is written (December 2016), the systemd cryptsetup helper " +"doesn\\*(Aqt support the keyscript option to /etc/crypttab\\&. For the time " +"being, the only option to use keyscripts along with systemd is to force " +"processing of the corresponding crypto devices in the initramfs\\&. See the " +"\\*(Aqinitramfs\\*(Aq option for further information\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"All fields of the appropriate crypttab entry are available to the keyscript " +"as exported environment variables:" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "CRYPTTAB_NAME, _CRYPTTAB_NAME" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "The target name (after resp\\&. before octal sequence decoding)\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "CRYPTTAB_SOURCE, _CRYPTTAB_SOURCE" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"The source device (after resp\\&. before octal sequence decoding and device " +"resolution)\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "CRYPTTAB_KEY, _CRYPTTAB_KEY" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"The value of the third field (after resp\\&. before octal sequence " +"decoding)\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "CRYPTTAB_OPTIONS, _CRYPTTAB_OPTIONS" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"A list of exported crypttab options (after resp\\&. before octal sequence " +"decoding)\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "CRYPTTAB_OPTION_E<lt>optionE<gt>" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"The value of the appropriate crypttab option, with value set to " +"\\*(Aqyes\\*(Aq in case the option is merely a flag\\&. For option aliases, " +"such as \\*(Aqreadonly\\*(Aq and \\*(Aqread-only\\*(Aq, the variable name " +"refers to the first alternative listed (thus " +"\\*(AqCRYPTTAB_OPTION_readonly\\*(Aq in that case)\\&. If the crypttab " +"option name contains \\*(Aq-\\*(Aq characters, then they are replaced with " +"\\*(Aq_\\*(Aq in the exported variable name\\&. For instance, the value of " +"the \\*(AqCRYPTTAB_OPTION_keyfile_offset\\*(Aq environment variable is set " +"to the value of the \\*(Aqkeyfile-offset\\*(Aq crypttab option\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "CRYPTTAB_TRIED" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"Number of previous tries since start of cryptdisks (counts until maximum " +"number of tries is reached)\\&." +msgstr "" + +#. type: SH +#: debian-bookworm debian-unstable +#, no-wrap +msgid "CHECKSCRIPTS" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "I<blkid>" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"Checks for any known filesystem\\&. Supports a filesystem type as argument " +"via E<lt>checkargsE<gt>:" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"no checkargs - succeeds if any valid filesystem is found on the device\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "\"none\" - succeeds if no valid filesystem is found on the device\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"\"ext4\" [or another filesystem type like xfs, swap, crypto_LUKS, \\&.\\&." +"\\&.] - succeeds if ext4 filesystem is found on the device\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "I<un_blkid>" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"Checks for no known filesystem\\&. Supports a filesystem type as argument " +"via E<lt>checkargsE<gt>:" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"no checkargs - succeeds if no valid filesystem is found on the device\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"\"ext4\" [or another filesystem type like xfs, swap, crypto_LUKS, \\&.\\&." +"\\&.] - succeeds if no ext4 filesystem is found on the device\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +#, no-wrap +msgid "" +"# Encrypted swap device\n" +"cswap /dev/sda6 /dev/urandom plain,cipher=aes-xts-plain64,size=256,hash=sha1,swap\n" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +#, no-wrap +msgid "" +"# Encrypted LUKS disk with interactive password, identified by its UUID, discard enabled\n" +"cdisk0 UUID=12345678-9abc-def012345-6789abcdef01 none luks,discard\n" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +#, no-wrap +msgid "" +"# Encrypted TCRYPT disk with interactive password, discard enabled\n" +"tdisk0 /dev/sr0 none tcrypt,discard\n" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +#, no-wrap +msgid "" +"# Encrypted ext4 disk with interactive password, discard enabled\n" +"# - retry 5 times if the check fails\n" +"cdisk1 /dev/sda2 none plain,cipher=aes-xts-plain64,size=256,hash=sha1,check,checkargs=ext4,tries=5,discard\n" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +#, no-wrap +msgid "" +"# Encrypted disk with interactive password, discard enabled\n" +"# - use a nondefault check script\n" +"# - no retries\n" +"cdisk2 /dev/sdc1 none plain,cipher=aes-xts-plain64,size=256,hash=sha1,check=customscript,tries=1,discard\n" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +#, no-wrap +msgid "" +"# Encrypted disk with interactive password, discard enabled\n" +"# - Twofish as the cipher, RIPEMD-160 as the hash\n" +"cdisk3 /dev/sda3 none plain,cipher=twofish,size=256,hash=ripemd160,discard\n" +msgstr "" + +#. type: SH +#: debian-bookworm debian-unstable +#, no-wrap +msgid "ENVIRONMENT" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "I<CRYPTDISKS_ENABLE>" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"Set to I<yes> to run cryptdisks initscripts at startup\\&. Set to I<no> to " +"disable cryptdisks initscripts\\&. Default is I<yes>\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "I<CRYPTDISKS_MOUNT>" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"Specifies the mountpoints that are mounted before cryptdisks is invoked\\&. " +"Takes mountpoints configured in /etc/fstab as arguments\\&. Separate " +"mountpoints by space\\&. This is useful for keys on removable devices, such " +"as cdrom, usbstick, flashcard, etc\\&. Default is unset\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "I<CRYPTDISKS_CHECK>" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"Specifies the default checkscript to be run against the target device, after " +"cryptdisks has been invoked\\&. The target device is passed as the first and " +"only argument to the checkscript\\&. Takes effect if the I<check> option is " +"given in crypttab with no value\\&. See documentation for I<check> option " +"above for more information\\&." +msgstr "" + +#. type: SH +#: debian-bookworm debian-unstable +#, no-wrap +msgid "KNOWN UPGRADE ISSUES" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"The upstream defaults for encryption cipher, hash and keysize have changed " +"several times in the past, and they\\*(Aqre expected to change again in " +"future, for example if security issues arise\\&. On LUKS devices, the used " +"settings are stored in the LUKS header, and thus don\\*(Aqt need to be " +"configured in /etc/crypttab\\&. For plain dm-crypt devices, no information " +"about used cipher, hash and keysize are available at all\\&. Therefore we " +"strongly suggest to configure the cipher, hash and keysize in /etc/crypttab " +"for plain dm-crypt devices, even if they match the current default\\&." +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"B<cryptsetup>(8), B<cryptdisks_start>(8), B<cryptdisks_stop>(8), /usr/share/" +"doc/cryptsetup-initramfs/README\\&.initramfs\\&.gz" +msgstr "" + +#. type: SH +#: debian-bookworm debian-unstable +#, no-wrap +msgid "AUTHOR" +msgstr "" + +#. type: Plain text +#: debian-bookworm debian-unstable +msgid "" +"This manual page was originally written by Bastian Kleineidam " +"E<lt>calvin@debian\\&.orgE<gt> for the Debian distribution of cryptsetup\\&. " +"It has been further improved by Michael Gebetsroither E<lt>michael\\&." +"geb@gmx\\&.atE<gt>, David Härdeman E<lt>david@hardeman\\&.nuE<gt> and Jonas " +"Meurer E<lt>jonas@freesources\\&.orgE<gt>\\&." +msgstr "" + +#. type: TH +#: debian-unstable +#, no-wrap +msgid "2024-02-26" +msgstr "" + +#. type: TH +#: debian-unstable +#, no-wrap +msgid "cryptsetup 2:2\\&.7\\&.0-1" +msgstr "" |