📄 truecrypt.1
字号:
.\" DO NOT MODIFY THIS FILE! It was generated by help2man 1.36..TH TRUECRYPT "1" "May 2007" "truecrypt 4.3a" "User Commands".SH NAMEtruecrypt - manage TrueCrypt volumes.SH SYNOPSIS.B truecrypt[\fIOPTIONS\fR] \fIVOLUME_PATH \fR[\fIMOUNT_DIRECTORY\fR].br.B truecrypt[\fIOPTIONS\fR] \fI-i\fR.br.B truecrypt[\fIOPTIONS\fR] \fI-c | --create | -C | --change \fR[\fIVOLUME_PATH\fR].br.B truecrypt[\fIOPTIONS\fR] \fI-d | --dismount | -l | --list \fR[\fIMAPPED_VOLUME\fR].br.B truecrypt[\fIOPTIONS\fR] \fI--backup-headers | --restore-header FILE \fR[\fIVOLUME\fR].br.B truecrypt[\fIOPTIONS\fR] \fI--properties \fR[\fIVOLUME_PATH\fR].br.B truecrypt[\fIOPTIONS\fR] \fI--keyfile-create FILE\fR.br.B truecrypt\fI-h | --help | --test | -V | --version\fR.SH DESCRIPTIONManages encrypted TrueCrypt volumes, which can be mapped as virtual blockdevices and used as any other standard block device. All data being readfrom a mapped TrueCrypt volume is transparently decrypted and all data beingwritten to it is transparently encrypted..SH OPTIONSVOLUME_PATH [MOUNT_DIRECTORY].IPOpen a TrueCrypt volume specified by VOLUME_PATH and map it as a block device/dev/mapper/truecryptN. N is the first available device number if nototherwise specified with \fB\-N\fR. Filesystem of the mapped volume is mounted atMOUNT_DIRECTORY if specified. To open a hidden volume, specify its passwordand/or keyfiles (the outer volume cannot be mapped at the same time).See also EXAMPLES and options \fB\-\-display\-password\fR, \fB\-\-filesystem\fR, \fB\-k\fR, \fB\-M\fR, \fB\-p\fR, \fB\-P\fR,\fB\-\-password\-tries\fR, \fB\-r\fR, \fB\-u\fR, \fB\-\-update\-time\fR. Note that passing some of the optionsmay affect security (see options \fB\-i\fR and \fB\-p\fR for more information).This command requires administrator privileges (sudo(8) is used if available)..PP\fB\-\-backup\-headers\fR BACKUP_FILE [VOLUME_PATH].IPBackup headers of a volume specified by VOLUME_PATH to a file BACKUP_FILE.Volume path is requested from user if not specified on command line. Bothnormal/outer and hidden volume headers are stored in the backup file evenif there is no hidden volume within the volume (to preserve plausibledeniability). When restoring the volume header, it is possible to selectwhich header is to be restored. See also \fB\-\-restore\-header\fR..PP\fB\-c\fR, \fB\-\-create\fR [VOLUME_PATH].IPCreate a new volume. Most options are requested from user if not specifiedon command line. Hidden volume can be created only in an existing file ordevice. Size of the hidden volume should not exceed the free space of thefilesystem on the outer volume. Hidden volume protection (see option \fB\-P\fR)should be used to update the outer volume contents after the hidden volumeis created. WARNING: To prevent data corruption, you should follow theinstructions in the EXAMPLES section on how to create a hidden volume.See also options \fB\-\-cluster\fR, \fB\-\-disable\-progress\fR, \fB\-\-display\-keys\fR,\fB\-\-encryption\fR, \fB\-k\fR, \fB\-\-filesystem\fR, \fB\-\-hash\fR, \fB\-p\fR, \fB\-\-random\-source\fR, \fB\-\-quick\fR, \fB\-\-size\fR,\fB\-\-type\fR. Note that passing some of the options may affect security (see option\fB\-p\fR for more information)..PP\fB\-C\fR, \fB\-\-change\fR [VOLUME_PATH].IPChange a password and/or keyfile(s) of a volume. Volume path and passwords arerequested from user if not specified on command line. PKCS\-5 PRF HMAC hashalgorithm can be changed with option \fB\-\-hash\fR. See also options \fB\-k\fR,\fB\-\-keyfile\-add\fR, \fB\-p\fR, \fB\-\-random\-source\fR, \fB\-v\fR..PP\fB\-d\fR, \fB\-\-dismount\fR [MAPPED_VOLUME].IPDismount and unmap mapped volumes. If MAPPED_VOLUME is not specified, allvolumes are dismounted and unmapped. See below for a description ofMAPPED_VOLUME.This command requires administrator privileges (sudo(8) is used if available)..PP\fB\-h\fR, \fB\-\-help\fR.IPDisplay help information..PP\fB\-i\fR, \fB\-\-interactive\fR.IPMap and mount a volume interactively. Options which may affect security arerequested from the user. See option \fB\-p\fR for more information.This command requires administrator privileges (sudo(8) is used if available)..PP\fB\-l\fR, \fB\-\-list\fR [MAPPED_VOLUME].IPDisplay a list of mapped volumes. If MAPPED_VOLUME is not specified, allvolumes are listed. By default, the list contains only volume path and mappeddevice name pairs. A more detailed list can be enabled by verbose outputoption (\fB\-v\fR). See below for a description of MAPPED_VOLUME.This command requires administrator privileges (sudo(8) is used if available)..PP\fB\-\-keyfile\-create\fR FILE.IPCreate a new keyfile using the random number generator. FILE argument specifiesthe output file..PP\fB\-\-properties\fR [VOLUME_PATH].IPDisplay properties of a volume specified by VOLUME_PATH..PP\fB\-\-restore\-header\fR BACKUP_FILE [VOLUME_PATH].IPRestore header of a volume specified by VOLUME_PATH from a file BACKUP_FILE.Volume path is requested from user if not specified on command line.Type of the restored volume header (normal/hidden) is requested from user ifnot specified with \fB\-\-type\fR. See also \fB\-\-backup\-headers\fR..PP\fB\-\-test\fR.IPTest all internal algorithms used in the process of encryption and decryption..PP\fB\-V\fR, \fB\-\-version\fR.IPDisplay program version and legal notices..SS "MAPPED_VOLUME:".IPSpecifies a mapped or mounted volume. One of the following forms can be used:.IP1) Path to the encrypted TrueCrypt volume..IP2) Mount directory of the volume's filesystem (if mounted)..IP3) Device number of the mapped volume..IP4) Device name of the mapped volume..PP\fB\-\-cluster\fR SIZE.IPUse specified cluster size when creating a new volume. SIZE defines the numberof sectors per cluster..PP\fB\-\-disable\-progress\fR.IPDisable display of progress information during creation of a new volume..PP\fB\-\-display\-keys\fR.IPDisplay encryption keys generated during creation of a new volume..PP\fB\-\-display\-password\fR.IPDisplay password characters while typing..PP\fB\-\-encryption\fR ENCRYPTION_ALGORITHM.IPUse specified encryption algorithm when creating a new volume..PP\fB\-\-filesystem\fR TYPE.IPFilesystem type to mount. The TYPE argument is passed to mount(8) commandwith option \fB\-t\fR. Default type is 'auto'. When creating a new volume, thisoption specifies the filesystem to be created on the new volume..PP\fB\-\-hash\fR HASH.IPUse specified hash algorithm when creating a new volume or changing passwordand/or keyfiles..PP\fB\-k\fR, \fB\-\-keyfile\fR FILE | DIRECTORY.IPUse specified keyfile to open a volume to be mapped (or when changing passwordand/or keyfiles). When a directory is specified, all files inside it will beused (non\-recursively). Additional keyfiles can be specified with multiple \fB\-k\fRoptions. Empty keyfile (\fB\-k\fR '') disables interactive requests for keyfiles(e.g., when creating a new volume). See also option \fB\-K\fR..PP\fB\-K\fR, \fB\-\-keyfile\-protected\fR FILE | DIRECTORY.IPUse specified keyfile to open a hidden volume to be protected. This optionmay be used only when mounting an outer volume with hidden volume protected.See also options \fB\-k\fR and \fB\-P\fR..PP\fB\-\-keyfile\-add\fR FILE | DIRECTORY.IPAdd specified keyfile to a volume when changing its password and/or keyfiles.This option must be also used to keep all previous keyfiles asigned to avolume. See EXAMPLES for more information..PP\fB\-M\fR, \fB\-\-mount\-options\fR OPTIONS.IPFilesystem mount options. The OPTIONS argument is passed to mount(8)command with option \fB\-o\fR. See also options \fB\-r\fR and \fB\-u\fR..PP\fB\-N\fR, \fB\-\-device\-number\fR N.IPUse device number N when mapping a volume as a block device/dev/mapper/truecryptN. Default is the first available device..PP\fB\-\-overwrite\fR.IPOverwrite files without prompting the user for confirmation..PP\fB\-p\fR, \fB\-\-password\fR PASSWORD.IPUse specified password to open a volume. Additional passwords can bespecified with multiple \fB\-p\fR options. An empty password can also be specified('' in most shells). Note that passing a password on the command line ispotentially insecure as the password may be visible in the process list(see ps(1)) and/or stored in a command history file..PP\fB\-\-password\-tries\fR NUMBER.IPPrompt NUMBER of times for a password until the correct password is entered.Default is to prompt three times..PP\fB\-P\fR, \fB\-\-protect\-hidden\fR.IPWrite\-protect a hidden volume when mapping an outer volume. Before mapping theouter volume, the user will be prompted for a password to open the hiddenvolume. The size and position of the hidden volume is then determined and theouter volume is mapped with all sectors belonging to the hidden volumeprotected against write operations. When a write to the protected area isprevented, the whole volume is switched to read\-only mode. Verbose list command(\fB\-vl\fR) can be used to query the state of the hidden volume protection. Warningmessage is displayed when a volume switched to read\-only is being dismounted.See also options \fB\-r\fR and \fB\-i\fR..PP\fB\-\-quick\fR.IPUse quick format when creating a new volume. This option can be used onlywhen creating a device\-hosted volume. Quick format is always used whencreating a hidden volume..PP\fB\-\-random\-source\fR FILE.IPUse FILE as a source of random numbers. Standard input is used if '\-' isspecified..PP\fB\-r\fR, \fB\-\-read\-only\fR.IPMap and mount a volume as read\-only. Write operations to the volume may notfail immediately due to the write buffering performed by the system, but thephysical write will still be prevented..PP\fB\-\-size\fR SIZE.IPUse specified size when creating a new volume. SIZE is defined as number ofbytes or, when a size suffix K/M/G is used, Kilobytes/Megabytes/Gigabytes.Note that size must be a multiple of 512 bytes..PP\fB\-\-type\fR TYPE.IPUse specified volume type when creating a new volume or restoring a volumeheader. TYPE can be 'normal' or 'hidden'..PP\fB\-u\fR, \fB\-\-user\-mount\fR.IPMake a volume being mounted accessible in a non\-administrator account. Somefilesystems (e.g., FAT) do not support Unix\-style access control and it isnecessary to use this option when mounting them. Ownership of the mountedfilesystem is determined by environment variables set by sudo(8) command.Note that Unix\-style filesystems (e.g., ext2) do not support this option..PP\fB\-\-update\-time\fR.IPDo not preserve access and modification timestamps of file containers.By default, timestamps are restored after a volume is unmapped..PP\fB\-v\fR, \fB\-\-verbose\fR.IPEnable verbose output. Multiple \fB\-v\fR options can be specified to increase thelevel of verbosity..SH EXAMPLEStruecrypt /root/volume.tc /mnt/tc.IPMap a volume /root/volume.tc and mount its filesystem at directory /mnt/tc..PPtruecrypt \fB\-u\fR /dev/hda2 /mnt/tc.IPMap a volume /dev/hda2 (first ATA disk, primary partition 2) and mount itsfilesystem at /mnt/tc. Default user\-id is set, which is useful when mountinga filesystem, such as FAT, for use in a non\-administrative account..PPtruecrypt \fB\-i\fR.IPMap and mount a volume. Options are requested interactively..PPtruecrypt \fB\-d\fR.IPDismount and unmap all mapped volumes..PPtruecrypt \fB\-d\fR /root/volume.tc.IPDismount and unmap a volume /root/volume.tc..PPtruecrypt \fB\-d\fR /mnt/tc.IPDismount and unmap a volume mounted at /mnt/tc..PPtruecrypt \fB\-vl\fR.IPDisplay a detailed list of all mapped volumes..PPtruecrypt \fB\-N\fR 1 /dev/hdc1 && mkfs /dev/mapper/truecrypt1.IPMap a volume /dev/hdc1 and create a new filesystem on it..PPtruecrypt \fB\-P\fR /dev/hdc1 /mnt/tc.IPMap and mount outer volume /dev/hdc1 and protect hidden volume within it..PPtruecrypt \fB\-p\fR '' \fB\-p\fR '' \fB\-k\fR key1 \fB\-k\fR key2 \fB\-K\fR key_hidden \fB\-P\fR volume.tc.IPMap outer volume ./volume.tc and protect hidden volume within it.The outer volume is opened with keyfiles ./key1 and ./key2 and thehidden volume with ./key_hidden. Passwords for both volumes are empty..PPtruecrypt \fB\-c\fR.IPCreate a new volume. Options are requested interactively..PPtruecrypt \fB\-c\fR /dev/hda2.IPCreate a new volume hosted at the second primary partition of the firstATA disk..PPtruecrypt \fB\-k\fR keyfile \fB\-\-size\fR 10M \fB\-\-encryption\fR AES \fB\-\-hash\fR SHA\-1 \fB\-c\fR vol.tc.IPCreate a new volume. Options which are not specified on command line arerequested from the user..PPtruecrypt \fB\-\-keyfile\-add\fR keyfile \fB\-C\fR volume.tc.IPChange password and add a new keyfile to volume..PPtruecrypt \fB\-k\fR keyfile \fB\-C\fR volume.tc.IPChange password and remove a keyfile from volume..PPtruecrypt \fB\-k\fR keyfile \fB\-\-keyfile\-add\fR keyfile \fB\-C\fR volume.tc.IPChange password and keep previous keyfile..SS "Creating a hidden volume without risking data corruption:".IP1) Create an outer volume:.IPtruecrypt \fB\-\-type\fR normal \fB\-\-size\fR 100M \fB\-c\fR volume.tc.IP2) Create a hidden volume:.IPtruecrypt \fB\-\-type\fR hidden \fB\-\-size\fR 50M \fB\-c\fR volume.tc.IP3) Mount the outer volume with the hidden volume protected:.IPtruecrypt \fB\-P\fR volume.tc /mnt/tc.IP4) Copy files to the outer volume:.IPcp outer_volume_file.txt /mnt/tc.IP5) Dismount the outer volume:.IPtruecrypt \fB\-d\fR volume.tc.IP6) If a warning message has been displayed in 5), start again from 1). Eithera larger outer volume should be created in 1), or less data should be copiedto the outer volume in 4)..SH DIAGNOSTICSExit status.B 0is returned if all requested actions completed successfully, otherwise.B 1is returned. Kernel module reports errors via system log with facility.BR "kern" ". See".BR "syslogd" "(8) for more information.".SH "REPORTING BUGS"Report bugs at <http://www.truecrypt.org/bugs/>..SH COPYRIGHTCopyright \(co 2003-2007 TrueCrypt Foundation. All Rights Reserved..brCopyright \(co 1998-2000 Paul Le Roux. All Rights Reserved..brCopyright \(co 1999-2006 Dr. Brian Gladman. All Rights Reserved..brCopyright \(co 1995-1997 Eric Young. All Rights Reserved..brCopyright \(co 2001 Markus Friedl. All Rights Reserved..PPReleased under the TrueCrypt Collective License 1.2.SH "SEE ALSO".B http://www.truecrypt.org/docs/.br.B /usr/share/truecrypt/doc/TrueCrypt-User-Guide.pdf.br.BR "mount" "(8), " "umount" "(8), " "losetup" "(8), ".BR "fuser" "(1), " "mkfs" "(8), " "fsck" "(8), " "dmsetup" "(8)"
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -