1CRYPTSETUP-REENCRYPT(8) Maintenance Commands CRYPTSETUP-REENCRYPT(8)
2
3
4
6 cryptsetup-reencrypt - tool for offline LUKS device re-encryption
7
9 cryptsetup-reencrypt <options> <device>
10
12 Cryptsetup-reencrypt can be used to change reencryption parameters
13 which otherwise require full on-disk data change (re-encryption).
14
15 You can regenerate volume key (the real key used in on-disk encryption
16 unclocked by passphrase), cipher, cipher mode.
17
18 Cryptsetup-reencrypt reencrypts data on LUKS device in-place. During
19 reencryption process the LUKS device is marked unavailable.
20
21 NOTE: If you're looking for LUKS2 online reencryption manual please
22 read cryptsetup(8) man page instead (see reencrypt action). This page
23 is for legacy offline reencryption utility only.
24
25 WARNING: The cryptsetup-reencrypt program is not resistant to hardware
26 or kernel failures during reencryption (you can lose your data in this
27 case).
28
29 ALWAYS BE SURE YOU HAVE RELIABLE BACKUP BEFORE USING THIS TOOL.
30 The reencryption can be temporarily suspended (by TERM signal or by
31 using ctrl+c) but you need to retain temporary files named
32 LUKS-<uuid>.[log|org|new]. LUKS device is unavailable until reencryp‐
33 tion is finished though.
34
35 Current working directory must be writable and temporary files created
36 during reencryption must be present.
37
38 For more info about LUKS see cryptsetup(8).
39
41 To start (or continue) re-encryption for <device> use:
42
43 cryptsetup-reencrypt <device>
44
45 <options> can be [--batch-mode, --block-size, --cipher | --keep-key,
46 --debug, --device-size, --hash, --header, --iter-time |
47 --pbkdf-force-iterations, --key-file, --key-size, --key-slot, --key‐
48 file-offset, --keyfile-size, --master-key-file, --tries, --pbkdf,
49 --pbkdf-memory, --pbkdf-parallel, --progress-frequency, --use-directio,
50 --use-random | --use-urandom, --use-fsync, --uuid, --verbose, --write-
51 log]
52
53 To encrypt data on (not yet encrypted) device, use --new in combination
54 with --reduce-device-size or with --header option for detached header.
55
56 To remove encryption from device, use --decrypt.
57
58 For detailed description of encryption and key file options see crypt‐
59 setup(8) man page.
60
61 --batch-mode, -q
62 Suppresses all warnings and reencryption progress output.
63
64 --block-size, -B value
65 Use re-encryption block size of <value> in MiB.
66
67 Values can be between 1 and 64 MiB.
68
69 --cipher, -c <cipher-spec>
70 Set the cipher specification string.
71
72 --debug
73 Run in debug mode with full diagnostic logs. Debug output lines
74 are always prefixed by '#'.
75
76 --decrypt
77 Remove encryption (decrypt already encrypted device and remove
78 LUKS header).
79
80 WARNING: This is destructive operation and cannot be reverted.
81
82 --device-size size[units]
83 Instead of real device size, use specified value.
84
85 It means that only specified area (from the start of the device
86 to the specified size) will be reencrypted.
87
88 If no unit suffix is specified, the size is in bytes.
89
90 Unit suffix can be S for 512 byte sectors, K/M/G/T (or
91 KiB,MiB,GiB,TiB) for units with 1024 base or KB/MB/GB/TB for
92 1000 base (SI scale).
93
94 WARNING: This is destructive operation.
95
96 --hash, -h <hash-spec>
97 Specifies the hash used in the LUKS1 key setup scheme and volume
98 key digest.
99
100 NOTE: if this parameter is not specified, default hash algorithm
101 is always used for new LUKS1 device header.
102
103 NOTE: with LUKS2 format this option is only relevant when new
104 keyslot pbkdf algorithm is set to PBKDF2 (see --pbkdf).
105
106 --header <LUKS header file>
107 Use a detached (separated) metadata device or file where the
108 LUKS header is stored. This option allows one to store cipher‐
109 text and LUKS header on different devices.
110
111 WARNING: There is no check whether the ciphertext device speci‐
112 fied actually belongs to the header given. If used with --new
113 option, the header file will created (or overwritten). Use with
114 care.
115
116 --iter-time, -i <milliseconds>
117 The number of milliseconds to spend with PBKDF2 passphrase pro‐
118 cessing for the new LUKS header.
119
120 --keep-key
121 Do not change encryption key, just reencrypt the LUKS header and
122 keyslots.
123
124 This option can be combined only with --hash, --iter-time,
125 --pbkdf-force-iterations, --pbkdf (LUKS2 only), --pbkdf-memory
126 (Argon2i/id and LUKS2 only) and --pbkdf-parallel (Argon2i/id and
127 LUKS2 only) options.
128
129 --key-file, -d name
130 Read the passphrase from file.
131
132 WARNING: --key-file option can be used only if there is only one
133 active keyslot, or alternatively, also if --key-slot option is
134 specified (then all other keyslots will be disabled in new LUKS
135 device).
136
137 If this option is not used, cryptsetup-reencrypt will ask for
138 all active keyslot passphrases.
139
140 --key-size, -s <bits>
141 Set key size in bits. The argument has to be a multiple of 8.
142
143 The possible key-sizes are limited by the cipher and mode used.
144
145 If you are increasing key size, there must be enough space in
146 the LUKS header for enlarged keyslots (data offset must be large
147 enough) or reencryption cannot be performed.
148
149 If there is not enough space for keyslots with new key size, you
150 can destructively shrink device with --reduce-device-size
151 option.
152
153 --key-slot, -S <0-MAX>
154 Specify which key slot is used. For LUKS1, max keyslot number is
155 7. For LUKS2, it's 31.
156
157 WARNING: All other keyslots will be disabled if this option is
158 used.
159
160 --keyfile-offset value
161 Skip value bytes at the beginning of the key file.
162
163 --keyfile-size, -l
164 Read a maximum of value bytes from the key file. Default is to
165 read the whole file up to the compiled-in maximum.
166
167 --master-key-file
168 Use new volume (master) key stored in a file.
169
170 --new, -N
171 Create new header (encrypt not yet encrypted device).
172
173 This option must be used together with --reduce-device-size.
174
175 WARNING: This is destructive operation and cannot be reverted.
176
177 --pbkdf
178 Set Password-Based Key Derivation Function (PBKDF) algorithm for
179 LUKS keyslot. The PBKDF can be: pbkdf2, argon2i for Argon2i or
180 argon2id for Argon2id.
181
182 For LUKS1, only pbkdf2 is accepted (no need to use this option).
183
184 --pbkdf-force-iterations <num>
185 Avoid PBKDF benchmark and set time cost (iterations) directly.
186
187 --pbkdf-memory <number>
188 Set the memory cost for PBKDF (for Argon2i/id the number repre‐
189 sents kilobytes). Note that it is maximal value, PBKDF bench‐
190 mark or available physical memory can decrease it. This option
191 is not available for PBKDF2.
192
193 --pbkdf-parallel <number>
194 Set the parallel cost for PBKDF (number of threads, up to 4).
195 Note that it is maximal value, it is decreased automatically if
196 CPU online count is lower. This option is not available for
197 PBKDF2.
198
199 --progress-frequency <seconds>
200 Print separate line every <seconds> with reencryption progress.
201
202 --reduce-device-size size[units]
203 Enlarge data offset to specified value by shrinking device size.
204
205 This means that last sectors on the original device will be
206 lost, ciphertext data will be effectively shifted by specified
207 number of sectors.
208
209 It can be useful if you e.g. added some space to underlying par‐
210 tition (so last sectors contains no data).
211
212 For units suffix see --device-size parameter description.
213
214 You cannot shrink device more than by 64 MiB (131072 sectors).
215
216 WARNING: This is destructive operation and cannot be reverted.
217 Use with extreme care - shrunk filesystems are usually unrecov‐
218 erable.
219
220 --tries, -T
221 Number of retries for invalid passphrase entry.
222
223 --type <type>
224 Use only while encrypting not yet encrypted device (see --new).
225
226 Specify LUKS version when performing in-place encryption. If the
227 parameter is omitted default value (LUKS1) is used. Type may be
228 one of: luks (default), luks1 or luks2.
229
230 --use-directio
231 Use direct-io (O_DIRECT) for all read/write data operations
232 related to block device undergoing reencryption.
233
234 Useful if direct-io operations perform better than normal
235 buffered operations (e.g. in virtual environments).
236
237 --use-fsync
238 Use fsync call after every written block. This applies for reen‐
239 cryption log files as well.
240
241 --use-random
242
243 --use-urandom
244 Define which kernel random number generator will be used to cre‐
245 ate the volume key.
246
247 --uuid <uuid>
248 Use only while resuming an interrupted decryption process (see
249 --decrypt).
250
251 To find out what <uuid> to pass look for temporary files
252 LUKS-<uuid>.[|log|org|new] of the interrupted decryption
253 process.
254
255 --verbose, -v
256 Print more information on command execution.
257
258 --version
259 Show the program version.
260
261 --write-log
262 Update log file after every block write. This can slow down
263 reencryption but will minimize data loss in the case of system
264 crash.
265
266
268 Cryptsetup-reencrypt returns 0 on success and a non-zero value on
269 error.
270
271 Error codes are: 1 wrong parameters, 2 no permission, 3 out of memory,
272 4 wrong device specified, 5 device already exists or device is busy.
273
275 Reencrypt /dev/sdb1 (change volume key)
276 cryptsetup-reencrypt /dev/sdb1
277
278 Reencrypt and also change cipher and cipher mode
279 cryptsetup-reencrypt /dev/sdb1 -c aes-xts-plain64
280
281 Add LUKS encryption to not yet encrypted device
282
283 First, be sure you have space added to disk.
284
285 Or alternatively shrink filesystem in advance.
286 Here we need 4096 512-bytes sectors (enough for 2x128 bit key).
287
288 fdisk -u /dev/sdb # move sdb1 partition end + 4096 sectors (or
289 use resize2fs or tool for your filesystem and shrink it)
290
291 cryptsetup-reencrypt /dev/sdb1 --new --reduce-device-size 4096S
292
293 Remove LUKS encryption completely
294
295 cryptsetup-reencrypt /dev/sdb1 --decrypt
296
297
299 Report bugs, including ones in the documentation, on the cryptsetup
300 mailing list at <dm-crypt@saout.de> or in the 'Issues' section on LUKS
301 website. Please attach the output of the failed command with the
302 --debug option added.
303
305 Cryptsetup-reencrypt was written by Milan Broz <gmazyland@gmail.com>.
306
308 Copyright © 2012-2019 Milan Broz
309 Copyright © 2012-2019 Red Hat, Inc.
310
311 This is free software; see the source for copying conditions. There is
312 NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR
313 PURPOSE.
314
316 The project website at https://gitlab.com/cryptsetup/cryptsetup
317
318
319
320cryptsetup-reencrypt January 2019 CRYPTSETUP-REENCRYPT(8)