C.5. Common Post-Installation Tasks
The following sections are about common post-installation tasks.
C.5.1. Set a Randomly Generated Key as an Additional Way to Access an Encrypted Block Device Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
The following sections are about generating keys and adding keys.
C.5.1.1. Generate a Key Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
This will generate a 256-bit key in the file
$HOME/keyfile
.
dd if=/dev/urandom of=$HOME/keyfile bs=32 count=1 chmod 600 $HOME/keyfile
dd if=/dev/urandom of=$HOME/keyfile bs=32 count=1
chmod 600 $HOME/keyfile
C.5.1.2. Add the Key to an Available Keyslot on the Encrypted Device Copy linkLink copied to clipboard!
Copy linkLink copied to clipboard!
cryptsetup luksAddKey <device> ~/keyfile
cryptsetup luksAddKey <device> ~/keyfile