Rechercher une page de manuel
mount.ecryptfs_private
Langue: en
Version: 369215 (fedora - 01/12/10)
Section: 1 (Commandes utilisateur)
NAME
mount.ecryptfs_private - eCryptfs private mount helper.SYNOPSIS
mount.ecryptfs_privateNOTE: This program will not dynamically load the relevant keys. For this reason, it is recommended that users use ecryptfs-mount-private(1) instead!
DESCRIPTION
mount.ecryptfs_private is a mount helper utility for non-root users, who are members of ecryptfs group, to cryptographically mount a private directory, ~/Private.If, and only if:
- the private mount passphrase is in their kernel keyring, and
- the current user owns both ~/.Private and ~/Private, and
- ~/Private is not already mounted, then
This program will:
- mount ~/.Private onto ~/Private
- as an ecryptfs filesystem
- using the AES cipher
- with a key length of 16 bytes
- using the passphrase whose signature is in ~/.ecryptfs/Private.sig
The only setuid operation in this program is the call to mount(8).
The ecryptfs-setup-private(1) utility will create the ~/.Private and ~/Private directories, generate a mount passphrase, wrap the passphrase, and write the ~/.ecryptfs/Private.sig.
The system administrator can add the pam_ecryptfs.so module to the PAM stack which will automatically use the login passphrase to unwrap the mount passphrase, add the passphrase to the user's kernel keyring, and automatically perform the mount. See pam_ecryptfs(8).
FILES
~/.Private - underlying directory containing encrypted data~/Private - mountpoint containing decrypted data (when mounted)
~/.ecryptfs/Private.sig - file containing signature of mountpoint passphrase
~/.ecryptfs/wrapped-passphrase - mount passphrase, encrypted with the login passphrase
SEE ALSO
- ecryptfs(7), ecryptfs-rewrap-passphrase(1), ecryptfs-setup-private(1), keyctl(1), mount(8), umount.ecryptfs_private(1), pam_ecryptfs(8)
- /usr/share/doc/ecryptfs-utils/ecryptfs-faq.html
- http://launchpad.net/ecryptfs/
AUTHOR
This manpage and the mount.ecryptfs_private utility was written by Dustin Kirkland <kirkland@canonical.com> for Ubuntu systems (but may be used by others). Permission is granted to copy, distribute and/or modify this document under the terms of the GNU General Public License, Version 2 or any later version published by the Free Software Foundation.On Debian systems, the complete text of the GNU General Public License can be found in /usr/share/common-licenses/GPL.
Contenus ©2006-2024 Benjamin Poulain
Design ©2006-2024 Maxime Vantorre