From b12bd993c83a1306ae3b953f089ccc63604a8f33 Mon Sep 17 00:00:00 2001 From: =?utf8?q?Zbigniew=20J=C4=99drzejewski-Szmek?= Date: Thu, 24 Sep 2020 15:08:44 +0200 Subject: [PATCH] man: describe comma escaping in crypttab(5) --- man/crypttab.xml | 28 +++++++++++++++------------- 1 file changed, 15 insertions(+), 13 deletions(-) diff --git a/man/crypttab.xml b/man/crypttab.xml index ee54499bfe7..c6498700baa 100644 --- a/man/crypttab.xml +++ b/man/crypttab.xml @@ -60,10 +60,10 @@ device or file, or a specification of a block device via UUID= followed by the UUID. - The third field specifies an absolute path to a file to read the encryption key from. Optionally, + The third field specifies an absolute path to a file with the encryption key. Optionally, the path may be followed by : and an fstab device specification (e.g. starting with - LABEL= or similar); in which case, the path is relative to the device file system - root. If the field is not present or set to none or -, a key file + LABEL= or similar); in which case the path is taken relative to the device file system + root. If the field is not present or is none or -, a key file named after the volume to unlock (i.e. the first column of the line), suffixed with .key is automatically loaded from the /etc/cryptsetup-keys.d/ and /run/cryptsetup-keys.d/ directories, if present. Otherwise, the password has to @@ -78,12 +78,12 @@ - Specifies the cipher to use. See - cryptsetup8 - for possible values and the default value of this option. A - cipher with unpredictable IV values, such as - aes-cbc-essiv:sha256, is - recommended. + Specifies the cipher to use. See cryptsetup8 + for possible values and the default value of this option. A cipher with unpredictable IV values, such + as aes-cbc-essiv:sha256, is recommended. Embedded commas in the cipher + specification need to be escaped by preceding them with a backslash, see example below. + @@ -498,15 +498,17 @@ Examples /etc/crypttab example - Set up four encrypted block devices. One using LUKS for - normal storage, another one for usage as a swap device and two - TrueCrypt volumes. + Set up four encrypted block devices. One using LUKS for normal storage, another one for usage as + a swap device and two TrueCrypt volumes. For the fourth device, the option string is interpreted as two + options cipher=xchacha12,aes-adiantum-plain64, + keyfile-timeout=10s. luks UUID=2505567a-9e27-4efe-a4d5-15ad146c258b swap /dev/sda7 /dev/urandom swap truecrypt /dev/sda2 /etc/container_password tcrypt hidden /mnt/tc_hidden /dev/null tcrypt-hidden,tcrypt-keyfile=/etc/keyfile -external /dev/sda3 keyfile:LABEL=keydev keyfile-timeout=10s +external /dev/sda3 keyfile:LABEL=keydev keyfile-timeout=10s,cipher=xchacha12\,aes-adiantum-plain64 + -- 2.39.2