⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 readme

📁 cryptoboot is set of tools for disk encryption on Unix. It is especially suited to encrypt root par
💻
字号:
I What is cryptoboot?It is set of tools for disk encryption on Unix. It is especially suitedto encrypt root partition, so _everything_ (except kernel andcryptoboot inself) is encrypted.Cryptoboot does its job using external "drivers" for actualcrypto work. Currently it supports loop-AES by Jari Ruusu on Linux,but I hope future versions will support Linux dm_crypt, NetBSD's cgd,FreeBSD's geom, OpenBSD's encrypted vnd and maybe Linux cryptoloopand ppdd. The architecture is extendable (xml configuration file),so maybe some day there will show support for Windows CompuSec(to access Windows drives from Unix).Features include:- key hierarchy	* multiple users - you decide who can access your disks,		easily grant/revoke access	* security - if user passphrase is compromissed revoke access		for this user and your data is safe.		FIXME: write more on this topic- easy administration  * one can easily encrypt/decrypt devices and menage users using		simple CLI interface (fdisk like, but with readline bells		and whistles)- standards:	* xml	* pkcs#5 pbkdf for passphrase based key derivation		(salt + interation count)Initial encryption of devices is performed using kernel driver,not userland tool. It is faster in runtime, but your kernelneeds to support that particular crypto driver.This process is very similiar to:# dd if=/dev/hda1 of=/dev/loop0although it is better at error handling. I use cryptoboot on my ownmachine, so I needed fault-awardness. For example bad-sectors areskipped, as opposed to simple dd method, where entire process stops.II How to install cryptoboot on linux machine without initrd support.At first you need to compile cryptoboot tools.Currently cryptoboot requires:- openssl library- libxml2- ncruses- cdk (curses developement kit)- readlineCompilation:$ makeThen prepare boot partition, which will contain:* kernel* modules required for encryption and token access  Currently only one crypto driver is supported by cryptoboot	- loop-AES in 64 key mode; this mode is also known as	"multi-key-v2 on disk format"; only 128 bit AES is supported for now.	Refer to loop-AES README for installation instructions.* base system with at least:	sh, mount, insmod, mkfs.ext2, cp, some text editor* cryptoboot tools* optional: cmatrix and required files (ncurses, fonts etc.)Configure your bootloader to boot from this partition and reboot.Now, after you have booted and got shell follow these steps.1. Prepare token. Assuming your token is on /dev/sda:   a) Create partition on token - for example /dev/sda1 (see [1])	 b) Create filesystem on it - for example ext2:	    # mkfs.ext2 /dev/sda1	 c) Mount it:	    # mount /dev/sda1 /mnt	 d) Copy template token configuration to it:	    # cp templates/cryptoken.xml /mnt/	 e) Umount token:	    # umount /mnt0. Create cryptotab.xml from templates/cryptotab.xml. You need to   change following attributes in <token> element:	 dev="/dev/sda1"	 fstype="ext2"	 mnt="/mnt" (this directory must exist on boot partition)	 file="cryptoken.xml"1. Create master key:   # masterkeycfg create2. Create first user on token:   # cryptokencfg	 Type 'add' and enter user data. After that type 'save' and 'quit'.3. Add user you have created to cryptotab:   # cryptousercfg	 Type 'add', insert token, select user you have added.	 Then enter the password. User should be added to cryptotab.	 This operation should also update <encmagic> element in cryptotab,	 so after login and master password decryption it will be verified.	 Type 'save' and 'quit'.4. Now you can encrypt your partitions:   # cryptodevcfg	 Type 'encrypt', select partition, driver you want, and virtual	 device.	 You have to be carefull at this step, because interuption	 in the middle of encryption will result in data loss.	 (well, you can manually restart encryption from the middle using	  external tools, but it is not so easy)5. Remove master key from shared memory:   # masterkeycfg clean6. Modify cryptoboot script, to mount right device as root   filesystem. Check it to see if right modules are loaded etc.7. Modify your bootloader configuration to load /sbin/cryptoboot   instead of /sbin/init. Reboot your machine.8. If everything went good, you will be prompted for token,   user and password after the kernel boots. Then cryptoboot	 will setup all devices, mount the root as '/' and pass	 control to /sbin/init from encrypted device.9. Boot scripts will complain, because your fstab entries   point to encrypted partitions. You should change these	 entries to virtual devices, as configured in cryptotab.	 After that, reboot your system.10. That's all. If you want to encrypt/decrypt partitions    use 'cryptodevcfg', to manage token use 'cryptokencfg'		and to add/remove users who are allowed to initialise		device encryption on this machine use 'cryptousercfg'.Tools cryptokencfg and cryptousercfg could be safely used inmultiuser mode. But cryptodevcfg should be used only, whendevices it operates on are not in use.Note on passphrase choosing.When attacker has access to your cryptoken.xml and cryptotab.xmlonly good passphrase can protect your data.I recomend diceware method (www.diceware.com). Passphrasesgenerated using this scheme are easy to remember and secure.III ContactContact me thru my sourceforge email alias c09@users.sourceforge.net---------[1] Note: if you want to use usb drive in Windows it is smart					to create 2 partitions. Make the first one big to hold					your files, while the second on could be very small.					It will contains your cryptoken.xml.					Second partition won't be visible from windows in					default mode, so you can't destroy your keys by					accident.

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -