All Projects → JohnTroony → LUKS-OPs

JohnTroony / LUKS-OPs

Licence: GPL-2.0 license
A bash script to automate the most basic usage of LUKS volumes in Linux VPS

Programming Languages

shell
77523 projects

Projects that are alternatives of or similar to LUKS-OPs

pam panic
A PAM module that protects sensitive data and provides a panic function for emergency situations. Authentication through passwords or removable media.
Stars: ✭ 35 (+16.67%)
Mutual labels:  luks, luks-partition
trezorLuks
A wrapper around "cryptsetup" to use a key from a Trezor device instead of a password
Stars: ✭ 20 (-33.33%)
Mutual labels:  luks, cryptsetup
unlock-luks-partition
Unlock a LUKS partition via SSH
Stars: ✭ 31 (+3.33%)
Mutual labels:  luks, luks-partition
ansible-archlinux
Automated arch linux desktop environment
Stars: ✭ 56 (+86.67%)
Mutual labels:  luks, dm-crypt
u2f-luks
No description or website provided.
Stars: ✭ 29 (-3.33%)
Mutual labels:  luks
arch-config
Scripts and Ansible playbook to setup Arch Linux on ZFS.
Stars: ✭ 36 (+20%)
Mutual labels:  luks
arch-install
A highly configurable script automatically installing Arch Linux.
Stars: ✭ 32 (+6.67%)
Mutual labels:  luks
luks2crypt
Manage linux luks client devices and escrow recovery keys to crypt-server
Stars: ✭ 32 (+6.67%)
Mutual labels:  luks
tpm futurepcr
Calculate future (next boot) TPM PCRs after a kernel upgrade
Stars: ✭ 19 (-36.67%)
Mutual labels:  luks
disk-encryption-hetzner
Encrypt a hetzner server from the "serverbörse" and unlock it remote via ssh
Stars: ✭ 122 (+306.67%)
Mutual labels:  luks
scripts
Collection of useful scripts for Linux (git, docker, LUKS, Archlinux...)
Stars: ✭ 36 (+20%)
Mutual labels:  luks
open-securekos
Open Secure-K OS is an operating system booting from a USB key in which you can safely create and store your personal and private data. It is a next generation live operating system following liveng patterns. Please refer to Resilient Linux, a fork of Open Secure-K OS which is actively developed.
Stars: ✭ 23 (-23.33%)
Mutual labels:  luks
udiskie-dmenu
Manage removable devices in couple of keystrokes!
Stars: ✭ 30 (+0%)
Mutual labels:  luks
cryptctl
A disk encryption utility that helps setting up LUKS-based disk encryption using randomly generated keys, and keeps all keys on a dedicated key server.
Stars: ✭ 23 (-23.33%)
Mutual labels:  luks
fbind
A versatile Android mounting utility for folders, EXT4 images, LUKS/LUKS2 encrypted volumes, regular partitions and more.
Stars: ✭ 42 (+40%)
Mutual labels:  cryptsetup
dracut-crypt-sshd
dracut initramfs module to start sshd on early boot to enter encryption passphrase from across the internets
Stars: ✭ 25 (-16.67%)
Mutual labels:  dm-crypt
alpine-linux-scripts
Alpine Linux Setup Scripts
Stars: ✭ 38 (+26.67%)
Mutual labels:  luks-partition

LUKS-OPs

Join the chat at https://gitter.im/JohnTroony/LUKS-OPs

What is Luks-Ops?

A bash script to automate the most basic usage of LUKS and Cryptsetup in Linux.

Like:

  • Creating a virtual disk volume with LUKS format.
  • Mounting an existing LUKS volume
  • Unmounting a Single LUKS volume or all LUKS volume in the system.
  • Creating a LUKS encrypted filesystem on removable disks (like USBs)

What Luks-Ops is not?

  • A replacement for LUKS or Cryptsetup.

Why I started writing this script?

  • To encrypt my files on Dropbox
  • To encrypt some files on my VPS
  • To have fun..

Basic Usage

There is an option for a menu:

luks-ops.sh menu

Other options include:

1) luks-ops.sh new DISKNAME 512
2) luks-ops.sh mount /path/to/device MOuntPoint
3) luks-ops.sh unmount-all 
4) luks-ops.sh clean
5) luks-ops.sh usage
  1. Will create a virtual-disk named DISKNAME with size 512 MB
  2. Will mount device at MountPoint
  3. Will unmount all luks volume mounted
  4. Will clean all unfinished setups incase of errors (But I recommend using 4)
  5. Will print help message

Default Options:

  • Virtual-disk size = 512 MB and it's created on /usr/ directory
  • Default filesystem used = ext4
  • Cipher options:
    • Creating LUKS1: aes-xts-plain64, Key: 256 bits, LUKS header hashing: sha1, RNG: /dev/urandom
    • plain: aes-cbc-essiv:sha256, Key: 256 bits, Password hashing: ripemd160 (about-time 😄)
  • Mounting point = /media/luks_* where * is random-string.
  • Others.. NB. You can change /dev/urandom to /dev/zero (speed?)

Dependencies (Install applications:)

  1. dmsetup -- low level logical volume management
  2. cryptsetup -- manage plain dm-crypt and LUKS encrypted volumes

NB: Run as root.

But make sure you read the man pages and other online Doc about LUKS

  • man cryptsetup (or cryptsetup --help)
  • man dmsetup

TODO

  1. Support for multiple user keys
  2. Remote unlocking LUKS encrypted LVM
  3. ZSH completion
  4. [ Include other user requests here ]

Read..

The LUKS website at http://code.google.com/p/cryptsetup/

The cryptsetup FAQ, contained in the distribution package and online at http://code.google.com/p/cryptsetup/wiki/FrequentlyAskedQuestions

The cryptsetup mailing list and list archive, see FAQ entry 1.6.

The LUKS on-disk format specification available at http://code.google.com/p/cryptsetup/wiki/Specification

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].