Skip to content
boyska edited this page Jan 23, 2012 · 8 revisions

Tomb model scheme See at full size

The tomb

The tomb is just a file containing luks with an ext3 filesystem inside. The only way to open the luks device is through a keyfile to be used as key material. Let's call this file LuksKey.

The key

LuksKey is itself symmetrically encrypted using gpg -c using user passphrase

Procedure

Creating

A random file is created. It's added to luks as a keyfile. It's then encrypted with gpg -c: this is the tombkey

Opening

the tombkey is decripted using gpg -d; the password is provided by the user. The output of gpg is LuksKey; it is passed to luks as --key-file

Clone this wiki locally