Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
managing_hard_drive_encryption_on_linux [2023/09/19 15:36] – ac1mde | managing_hard_drive_encryption_on_linux [2023/10/23 14:42] (current) – ac1mde | ||
---|---|---|---|
Line 1: | Line 1: | ||
====Hard drive encryption on Linux==== | ====Hard drive encryption on Linux==== | ||
- | We are required to use hard drive encryption on all devices allocated to members of the department, so that if the device is lost or stolen, the data is inaccessible. Unlike on Windows and Mac, with Linux it is necessary to set a passphrase to decrypt the hard drive on boot-up. | + | We are required to use hard drive encryption on all devices allocated to members of the department, so that if the device is lost or stolen, the data is inaccessible. Unlike on Windows and Mac, with Linux it is necessary to set a passphrase to decrypt the hard drive on boot-up. |
These passphrases are randomly generated so are hard to remember. It is possible, however, to add your own passphrase to the drive encryption, so it can be unlocked with something that's easy to remember. It could even be the same passphrase as your DCS login, although re-using passphrases is generally discouraged. | These passphrases are randomly generated so are hard to remember. It is possible, however, to add your own passphrase to the drive encryption, so it can be unlocked with something that's easy to remember. It could even be the same passphrase as your DCS login, although re-using passphrases is generally discouraged. | ||
Line 8: | Line 8: | ||
< | < | ||
- | ac1mde@dcs31652:~$ sudo cat / | + | user@computer:~$ sudo cat / |
nvme0n1p3_crypt UUID=fd11d274-d095-4a29-a5aa-9e06514a18fe none luks, | nvme0n1p3_crypt UUID=fd11d274-d095-4a29-a5aa-9e06514a18fe none luks, | ||
</ | </ | ||
- | The encrypted partition is nvme0n1p3_crypt (//yours will likely be different!// | + | Copy the UUID it shows you and use it in this command: |
< | < | ||
- | sudo cryptsetup luksAddKey | + | sudo cryptsetup luksAddKey |
</ | </ | ||
- | //Make sure you use your own device | + | //Make sure you use your own UUID instead of the one in the example.// |
It will ask for the currently set passphrase, and then you can enter your own that you want to use. To check you can use it, reboot the computer and enter your new passphrase when it asks to unlock the drive. | It will ask for the currently set passphrase, and then you can enter your own that you want to use. To check you can use it, reboot the computer and enter your new passphrase when it asks to unlock the drive. | ||
Assuming it works, the final stage is to dispose of any hard copies you may have of the original hard-to-remember passphrase! | Assuming it works, the final stage is to dispose of any hard copies you may have of the original hard-to-remember passphrase! | ||