1pmt-ehd(8) pam_mount pmt-ehd(8)
2
3
4
6 pmt-ehd - create an encrypted disk image
7
9 pmt-ehd [-DFx] [-c fscipher] [-h digest] [-i cipher] [-k fscipher_key‐
10 bits] [-t fstype] -f container_path -p fskey_path -s size_in_mb
11
13 Mandatory options that are absent are inquired interactively, and pmt-
14 ehd will exit if stdin is not a terminal.
15
16 -D Turn on debugging strings.
17
18 -F Force operation that would otherwise ask for interactive confir‐
19 mation. Multiple -F can be specified to apply more force.
20
21 -c cipher
22 The cipher to be used for the filesystem. This can take any
23 value that cryptsetup(8) recognizes, usually in the form of
24 "cipher-mode[-extras]". Recommended are aes-cbc-essiv:sha256
25 (this is the default) or blowfish-cbc-essiv:sha256.
26
27 -f path
28 Store the new disk image at path. If the file already exists,
29 pmt-ehd will prompt before overwriting unless -F is given. If
30 path refers to a symlink, pmt-ehd will act even more cautious.
31
32 -h digest
33 Digest used for fskey derivation from the password. This can
34 take any value that OpenSSL recognizes. The default is sha1.
35
36 -i cipher
37 Cipher used for the filesystem key (not the encrypted filesystem
38 itself). This can take any value that OpenSSL recognizes, usu‐
39 ally in the form of "cipher-keysize-mode". Recommended is
40 aes-256-cbc (this is the default).
41
42 -k keybits
43 The keysize for the cipher specified with -c. Some ciphers sup‐
44 port multiple keysizes, AES for example is available with at
45 least the keysizes 192 and 256. Example: -c aes-cbc-
46 essiv:sha256 -k 192.
47
48 -p path
49 Store the filesystem key at path. The filesystem key is the
50 ultimate key to open the encrypted filesystem, and the fs key
51 itself is encrypted with your password.
52
53 -s size
54 The initial size of the encrypted filesystem, in megabytes. This
55 option is ignored when the filesystem is created on a block
56 device.
57
58 -t fstype
59 Filesystem to use for the encrypted filesystem. Defaults to xfs.
60
61 -u user
62 Give the container and fskey files to user (because the program
63 is usually runs as root, and the files would otherwise retain
64 root ownership).
65
66 -x Do not initialize the container with random bytes. This may
67 impact secrecy.
68
69 Description
70 pmt-ehd can be used to create a new encrypted container, and replaces
71 the previous mkehd script as well as any HOWTOs that explain how to do
72 it manually. Without any arguments, pmt-ehd will interactively ask for
73 all missing parameters. To create a container with a size of 256 MB,
74 use:
75
76 pmt-ehd -f /home/user.key -p /home/user.enc -s 256
77
78
79
80pam_mount 2008-09-16 pmt-ehd(8)