ecryptfs man page on SuSE

Man page or keyword search:  
man Server   14857 pages
apropos Keyword Search (all sections)
Output format
SuSE logo
[printable version]

ecryptfs(7)			   eCryptfs			   ecryptfs(7)

NAME
       eCryptfs - an enterprise-class cryptographic filesystem for linux

SYNOPSIS
       mount -t ecryptfs [SRC DIR] [DST DIR] -o [OPTIONS]

DESCRIPTION
       eCryptfs	 is  a	POSIX-compliant enterprise-class stacked cryptographic
       filesystem for Linux. It is derived from Erez Zadok's  Cryptfs,	imple‐
       mented  through	the FiST framework for generating stacked filesystems.
       eCryptfs extends Cryptfs to provide advanced key management and	policy
       features.  eCryptfs stores cryptographic metadata in the header of each
       file written, so that encrypted files can be copied between hosts;  the
       file  will  be decryptable with the proper key, and there is no need to
       keep track of any additional information aside from what is already  in
       the encrypted file itself. Think of eCryptfs as a sort of "gnupgfs."

OPTIONS
       STANDARD OPTIONS

       key=(keytype):[KEY MODULE OPTIONS]
	      Specify the type of key to be used when mounting eCryptfs.

       ecryptfs_cipher=(cipher)
	      Specify the symmetric cipher to be used on a per file basis

       ecryptfs_key_bytes=(key_bytes)
	      Specify  the keysize to be used with the selected cipher. If the
	      cipher only has one keysize the keysize  does  not  need	to  be
	      specified.

       ecryptfs_passthrough
	      Allows for non-eCryptfs files to be read and written from within
	      an eCryptfs mount. This option is turned off by default.

       no_sig_cache
	      Do not check the mount key signature against the values  in  the
	      user's  ~/.ecryptfs/sig-cache.txt	 file. This is useful for such
	      things as non-interactive	 setup	scripts,  so  that  the	 mount
	      helper  does  not stop and prompt the user in the event that the
	      key sig is not in the cache.

       ecryptfs_encrypted_view
	      This option, when set, will have eCryptfs return	the  encrypted
	      versions of the lower files, rather than decrypt encrypted files
	      and return the decrypted data from the lower files. This options
	      is useful for such things as backup utilities.

       ecryptfs_xattr
	      Store  the metadata in the extended attribute of the lower files
	      rather than the header region of the lower files.

       KEY MODULE OPTIONS

	      Parameters that apply to individual key modules have  the	 alias
	      for the key module in the prefix of the parameter name. Key mod‐
	      ules are pluggable, and which key modules are available  on  any
	      given  system is dependent upon whatever happens to be installed
	      in /usr/lib*/ecryptfs/. By default, this includes, at a minimum,
	      "passphrase" and "openssl."

       passphrase_passwd=(passphrase)
	      The  actual  password is password. Since the password is visible
	      to utilities (like ps under Unix) this form should only be  used
	      where security is not important.

       passphrase_passwd_file=(filename)
	      The    password	should	 be   specified	  in   a   file	  with
	      passwd=(passphrase). It is highly reccomended that the  file  be
	      stored on a secure medium such as a personal usb key.

       passphrase_passwd_fd=(file descriptor)
	      The password is specified through the specified file descriptor.

       passphrase_salt=(hex value)
	      The salt should be specified as a 16 digit hex value.

       openssl_keyfile=(filename)
	      The  filename should be the filename of a file containing an RSA
	      SSL key.

       openssl_passwd_file=(filename)
	      The password should be specified in a file with passwd=(openssl-
	      password). It is highly reccomended that the file be stored on a
	      secure medium such as a personal usb key.

       openssl_passwd_fd=(file descriptor)
	      The password is specified through the specified file descriptor.

       openssl_passwd=(password)
	      The password can be specified on the  command  line.  Since  the
	      password	is  visible  in	 the process list, it is highly recom‐
	      mended to use this option only for testing purposes.

EXAMPLE
       The following command will layover mount eCryptfs  on  /secret  with  a
       passphrase  contained  in  a  file  stored  on  secure media mounted at
       /mnt/secureusb/.

       mount		      -t		  ecryptfs		    -o
       key=passphrase:passphrase_passwd_file=/mnt/secureusb/passwd_file.txt
       /secret /secret

       Where	    passwd_file.txt	   contains	   the	      contents
       "passphrase_passwd=[passphrase]".

SEE ALSO
       mount(8)

       /usr/share/doc/ecryptfs-utils/ecryptfs-faq.html

       http://ecryptfs.sourceforge.net/

NOTES
       Do  not run eCryptfs in higher verbosity levels unless you are doing so
       for the sole purpose of development, since secret values will be	 writ‐
       ten out to the system log in that case. Make certain that your eCryptfs
       mount covers all locations where your applications may write  sensitive
       data.  In addition, use dm-crypt to encrypt your swap space with a ran‐
       dom key on boot.

BUGS
       Please send bug reports to the lead developer, an eCryptfs mailing list
       hosted  from  SourceForge,  or  to  the SourceForge bug tracker for the
       eCryptfs project. For kernel bugs, please follow the procedure detailed
       in Documentation/oops-tracing.txt to help us figure out what is happen‐
       ing.

AUTHOR
       This manpage was	 (re-)written  by  Dustin  Kirkland  <kirkland@canoni‐
       cal.com> for Ubuntu systems (but may be used by others).	 Permission is
       granted to copy, distribute and/or modify this document under the terms
       of  the GNU General Public License, Version 2 or any later version pub‐
       lished by the Free Software Foundation.

       On Debian systems, the complete text of the GNU General Public  License
       can be found in /usr/share/common-licenses/GPL.

ecryptfs-utils			  2008-07-21			   ecryptfs(7)
[top]

List of man pages available for SuSE

Copyright (c) for man pages and the logo by the respective OS vendor.

For those who want to learn more, the polarhome community provides shell access and support.

[legal] [privacy] [GNU] [policy] [cookies] [netiquette] [sponsors] [FAQ]
Tweet
Polarhome, production since 1999.
Member of Polarhome portal.
Based on Fawad Halim's script.
....................................................................
Vote for polarhome
Free Shell Accounts :: the biggest list on the net