blob: 1f2edef4c57ad16351226ce505f95c5247a7d172 [file] [log] [blame]
Mauro Carvalho Chehabb02a17c2020-02-17 17:11:59 +01001.. SPDX-License-Identifier: GPL-2.0
2
3======================================================
Michael Halcrow237fead2006-10-04 02:16:22 -07004eCryptfs: A stacked cryptographic filesystem for Linux
Mauro Carvalho Chehabb02a17c2020-02-17 17:11:59 +01005======================================================
Michael Halcrow237fead2006-10-04 02:16:22 -07006
7eCryptfs is free software. Please see the file COPYING for details.
8For documentation, please see the files in the doc/ subdirectory. For
9building and installation instructions please see the INSTALL file.
10
Mauro Carvalho Chehabb02a17c2020-02-17 17:11:59 +010011:Maintainer: Phillip Hellewell
12:Lead developer: Michael A. Halcrow <mhalcrow@us.ibm.com>
13:Developers: Michael C. Thompson
14 Kent Yoder
15:Web Site: http://ecryptfs.sf.net
Michael Halcrow237fead2006-10-04 02:16:22 -070016
17This software is currently undergoing development. Make sure to
18maintain a backup copy of any data you write into eCryptfs.
19
20eCryptfs requires the userspace tools downloadable from the
21SourceForge site:
22
23http://sourceforge.net/projects/ecryptfs/
24
25Userspace requirements include:
Mauro Carvalho Chehabb02a17c2020-02-17 17:11:59 +010026
27- David Howells' userspace keyring headers and libraries (version
28 1.0 or higher), obtainable from
29 http://people.redhat.com/~dhowells/keyutils/
30- Libgcrypt
Michael Halcrow237fead2006-10-04 02:16:22 -070031
32
Mauro Carvalho Chehabc44166f2020-03-20 16:11:02 +010033.. note::
Michael Halcrow237fead2006-10-04 02:16:22 -070034
Mauro Carvalho Chehabc44166f2020-03-20 16:11:02 +010035 In the beta/experimental releases of eCryptfs, when you upgrade
36 eCryptfs, you should copy the files to an unencrypted location and
37 then copy the files back into the new eCryptfs mount to migrate the
38 files.
Michael Halcrow237fead2006-10-04 02:16:22 -070039
40
Mauro Carvalho Chehabb02a17c2020-02-17 17:11:59 +010041Mount-wide Passphrase
42=====================
Michael Halcrow237fead2006-10-04 02:16:22 -070043
44Create a new directory into which eCryptfs will write its encrypted
45files (i.e., /root/crypt). Then, create the mount point directory
Mauro Carvalho Chehabb02a17c2020-02-17 17:11:59 +010046(i.e., /mnt/crypt). Now it's time to mount eCryptfs::
Michael Halcrow237fead2006-10-04 02:16:22 -070047
Mauro Carvalho Chehabb02a17c2020-02-17 17:11:59 +010048 mount -t ecryptfs /root/crypt /mnt/crypt
Michael Halcrow237fead2006-10-04 02:16:22 -070049
50You should be prompted for a passphrase and a salt (the salt may be
51blank).
52
Mauro Carvalho Chehabb02a17c2020-02-17 17:11:59 +010053Try writing a new file::
Michael Halcrow237fead2006-10-04 02:16:22 -070054
Mauro Carvalho Chehabb02a17c2020-02-17 17:11:59 +010055 echo "Hello, World" > /mnt/crypt/hello.txt
Michael Halcrow237fead2006-10-04 02:16:22 -070056
57The operation will complete. Notice that there is a new file in
58/root/crypt that is at least 12288 bytes in size (depending on your
59host page size). This is the encrypted underlying file for what you
60just wrote. To test reading, from start to finish, you need to clear
61the user session keyring:
62
63keyctl clear @u
64
65Then umount /mnt/crypt and mount again per the instructions given
66above.
67
Mauro Carvalho Chehabb02a17c2020-02-17 17:11:59 +010068::
69
70 cat /mnt/crypt/hello.txt
Michael Halcrow237fead2006-10-04 02:16:22 -070071
72
Mauro Carvalho Chehabb02a17c2020-02-17 17:11:59 +010073Notes
74=====
Michael Halcrow237fead2006-10-04 02:16:22 -070075
76eCryptfs version 0.1 should only be mounted on (1) empty directories
77or (2) directories containing files only created by eCryptfs. If you
78mount a directory that has pre-existing files not created by eCryptfs,
79then behavior is undefined. Do not run eCryptfs in higher verbosity
80levels unless you are doing so for the sole purpose of debugging or
81development, since secret values will be written out to the system log
82in that case.
83
84
85Mike Halcrow
86mhalcrow@us.ibm.com