1bda92397SAlex Hornung.\" 2bda92397SAlex Hornung.\" Copyright (c) 2010 3bda92397SAlex Hornung.\" The DragonFly Project. All rights reserved. 4bda92397SAlex Hornung.\" 5bda92397SAlex Hornung.\" Redistribution and use in source and binary forms, with or without 6bda92397SAlex Hornung.\" modification, are permitted provided that the following conditions 7bda92397SAlex Hornung.\" are met: 8bda92397SAlex Hornung.\" 9bda92397SAlex Hornung.\" 1. Redistributions of source code must retain the above copyright 10bda92397SAlex Hornung.\" notice, this list of conditions and the following disclaimer. 11bda92397SAlex Hornung.\" 2. Redistributions in binary form must reproduce the above copyright 12bda92397SAlex Hornung.\" notice, this list of conditions and the following disclaimer in 13bda92397SAlex Hornung.\" the documentation and/or other materials provided with the 14bda92397SAlex Hornung.\" distribution. 15bda92397SAlex Hornung.\" 3. Neither the name of The DragonFly Project nor the names of its 16bda92397SAlex Hornung.\" contributors may be used to endorse or promote products derived 17bda92397SAlex Hornung.\" from this software without specific, prior written permission. 18bda92397SAlex Hornung.\" 19bda92397SAlex Hornung.\" THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS 20bda92397SAlex Hornung.\" ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT 21bda92397SAlex Hornung.\" LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS 22bda92397SAlex Hornung.\" FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE 23bda92397SAlex Hornung.\" COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, 24bda92397SAlex Hornung.\" INCIDENTAL, SPECIAL, EXEMPLARY OR CONSEQUENTIAL DAMAGES (INCLUDING, 25bda92397SAlex Hornung.\" BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; 26bda92397SAlex Hornung.\" LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED 27bda92397SAlex Hornung.\" AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, 28bda92397SAlex Hornung.\" OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT 29bda92397SAlex Hornung.\" OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30bda92397SAlex Hornung.\" SUCH DAMAGE. 31bda92397SAlex Hornung.\" 32bda92397SAlex Hornung.Dd October 22, 2010 33bda92397SAlex Hornung.Dt CRYPTTAB 5 34bda92397SAlex Hornung.Os 35bda92397SAlex Hornung.Sh NAME 36bda92397SAlex Hornung.Nm crypttab 37bda92397SAlex Hornung.Nd encrypted disk device table 38bda92397SAlex Hornung.Sh DESCRIPTION 39bda92397SAlex HornungThe 40bda92397SAlex Hornung.Nm 41bda92397SAlex Hornungfile contains a list of the encrypted disk devices of the system. Each 42bda92397SAlex Hornungencrypted volume is described on a separate line; fields on each line are 43bda92397SAlex Hornungseparated by tabs or spaces. 44bda92397SAlex Hornung.Pp 45bda92397SAlex HornungThe first field, 46bda92397SAlex Hornung.Pq Fa name , 47bda92397SAlex Hornungcontains the name of the resultant crypto volume device, which will 48bda92397SAlex Hornungbe a node in 49bda92397SAlex Hornung.Pa /dev/mapper 50bda92397SAlex Hornungwith the given 51bda92397SAlex Hornung.Pa name . 52bda92397SAlex Hornung.Pp 53bda92397SAlex HornungThe second field, 54bda92397SAlex Hornung.Pq Fa device , 55bda92397SAlex Hornungis the underlying device on which the crypto volume resides and must be 56bda92397SAlex Hornunga full device path to a node in 57bda92397SAlex Hornung.Pa /dev . 58bda92397SAlex Hornung.Pp 59bda92397SAlex HornungThe third field, 60bda92397SAlex Hornung.Pq Fa keyfile , 61bda92397SAlex Hornungis either the value 62bda92397SAlex Hornung.It Pa none 63bda92397SAlex Hornungor the full path on the file system to a keyfile to unlock the crypto 64bda92397SAlex Hornungvolume. 65bda92397SAlex HornungIf 66bda92397SAlex Hornung.It Pa none 67bda92397SAlex Hornungis specified, the system will prompt for a password during the boot 68bda92397SAlex Hornungsequence. 69bda92397SAlex Hornung.Pp 70bda92397SAlex HornungThe fourth field, 71bda92397SAlex Hornung.Pq Fa options , 72bda92397SAlex Hornungis currently unused on 73bda92397SAlex Hornung.Dx 74bda92397SAlex Hornungand should be either omitted or set to 75bda92397SAlex Hornung.It Pa none . 76*2400401dSAlex Hornung.Pp 77*2400401dSAlex HornungNote that the 78*2400401dSAlex Hornung.Nm 79*2400401dSAlex Hornungfile on 80*2400401dSAlex Hornung.Dx 81*2400401dSAlex Hornungcurrently only supports LUKS volumes and not raw 82*2400401dSAlex Hornung.Xr cryptsetup 8 83*2400401dSAlex Hornungvolumes. 84bda92397SAlex Hornung.Sh FILES 85bda92397SAlex Hornung.Bl -tag -width ".Pa /etc/crypttab" -compact 86bda92397SAlex Hornung.It Pa /etc/crypttab 87bda92397SAlex HornungThe 88bda92397SAlex Hornung.Nm 89bda92397SAlex Hornungfile resides in 90bda92397SAlex Hornung.Pa /etc . 91bda92397SAlex Hornung.El 92bda92397SAlex Hornung.Sh EXAMPLES 93bda92397SAlex HornungThe following line specifies a crypto volume without a keyfile, so 94bda92397SAlex Hornungthat a password will be prompted during the boot sequence. Upon 95bda92397SAlex Hornungsuccessful entry of the password the device 96bda92397SAlex Hornung.Pa /dev/mapper/vol1 97bda92397SAlex Hornungwill be created. 98bda92397SAlex Hornung.Pp 99bda92397SAlex Hornung.Dl "vol1 /dev/da0s1b none none" 100bda92397SAlex Hornung.Pp 101bda92397SAlex HornungThe next example is as the one before but using a keyfile on 102bda92397SAlex Hornung.Pa /boot 103bda92397SAlex Hornunginstead of an interactive password prompt. 104bda92397SAlex Hornung.Pp 105bda92397SAlex Hornung.Dl "vol1 /dev/da0s1b /boot/keyfile.0 none" 106bda92397SAlex Hornung.Sh SEE ALSO 107bda92397SAlex Hornung.Xr cryptsetup 8 108bda92397SAlex Hornung.Sh HISTORY 109bda92397SAlex HornungThe 110bda92397SAlex Hornung.Nm 111bda92397SAlex Hornungfile format appeared in 112bda92397SAlex Hornung.Dx 2.9 . 113