1
2zuluCrypt-cli(1) General Commands Manual zuluCrypt-cli(1)
3
4
5
7 zuluCrypt-cli - command line interface frontend to cryptsetup and
8 tcplay
9
10
12 meaning of symbols:
13 <> = required option
14 [] = optional argument
15 * = default option
16 | = alternatives for the same option
17 {} = not allowed option
18 zuluCrypt-cli --test
19 zuluCrypt-cli -E <d> <e> <p|f|h>
20 zuluCrypt-cli -D <d> <e> <p|f|h>
21 zuluCrypt-cli -o <d> <m> [e] <p|f|h>
22 zuluCrypt-cli -O <d> {m} [e] <p|f|h>
23 zuluCrypt-cli -q <d>
24 zuluCrypt-cli -i <d>
25 zuluCrypt-cli -c <d> <p|f|h> [ktzg]
26 zuluCrypt-cli -r <-d> <p|f|h>
27 zuluCrypt-cli -a <d> <<y|u> <l|n>>|<h>
28 zuluCrypt-cli -b <d>
29 zuluCrypt-cli -w <d> d argument must be something like: UUID=
30 zuluCrypt-cli -P <d> d device must be mapper path at /dev/mapper/
31 zuluCrypt-cli -X <d>
32 zuluCrypt-cli -J <d>
33 zuluCrypt-cli -R <d> <f>
34 zuluCrypt-cli -B <d> <f>
35 zuluCrypt-cli -A
36 zuluCrypt-cli -S
37 zuluCrypt-cli -N
38
39 examples:
40 create volume: zuluCrypt-cli -c -d /dev/sdc1 -z ext4 -t luks -p xxx
41 open volume : zuluCrypt-cli -o -d /dev/sdc1 -m sdc1 -e ro -p xxx
42 close volume ; zuluCrypt-cli -q -d /dev/sdc1
43 remove key ; zuluCrypt-cli -r -d /dev/sdc1 -p xxx
44 add key : zuluCrypt-cli -a -d /dev/sdc1 -y xxx -l yyy
45 get device path from mapper : zuluCrypt-cli -P -d /dev/mapper/zulu‐
46 Crypt-sdc1
47 check if partition with UUID is present : zuluCrypt-cli -w -d UUID=
48
49
51 zuluCrypt is a front end to cryptsetup. It aims to simplify using
52 cryptsetup volumes by creating a simple to use command line interface
53 and a Qt based GUI front end to the command line.
54
55 The command line program is called "zuluCrypt-cli", the Qt based GUI is
56 called "zuluCrypt-gui". The cli part of the program is an suid program
57 to allow management of the volumes without setting up sudo with appro‐
58 priate permissions first or requiring root's password.
59
60 The GUI part of the program calls the cli part for its operations.
61
62 This tool will create volumes only in non system partitions.
63
64 System partition is a partition with an active entry in /etc/fstab and
65 /etc/crypttab
66
67
68
70 usage: zuluCrypt-cli <operation> <options specific to the operation>
71 operation list:
72 -c create an encrypted volume
73 -o open and encrypted volume
74 -O open an encrypted volume but do not mount it( -m therefore
75 not needed )
76 -q close an opened encrypted volume
77 -r remove a key from luks volume
78 -a add a key to luks volume
79 -i check if a device contain a luks volume
80 -s check if a device is opened and print its properties if it
81 is
82 -b show status of each slot of luks volume."0"=empty,"1"=occu‐
83 pied,"2"=invalid slot,"3"=last occupied
84 -A print the list of all partitions on the system
85 -N print a list of non system partitions on the system( parti‐
86 tions with no active entries in /etc/fstab and /etc/crypttab
87 -T print a detailed list of mounted partitions.Must be used
88 with -A or -S or -N
89 -Z print a detailed list of unmounted partitions.Must be used
90 with -A or -S or -N
91 -S print a list of system partitions on the system( partitions
92 with active entries in /etc/fstab and /etc/crypttab
93 -w check if UUID matches UUID of any partition
94 -P get device path from mapper( located at /dev/mapper )
95 -L print a list of all opened volumes and their mount point.The
96 list is not formatted
97 -X open a device pointed by argument -d and write random data
98 to it hiding data previously written to device
99 -W check if a device is a truecrypt device or not,required
100 argument are -p or -f
101 -U print UUID of a given device,required argument: -d
102 -H compare a header on a luks device to a backup
103 header,required arg: -d and -f
104 -M create a publicly accessible "mirror" of the mount point in
105 "/run/media/public/" from the original created in "/run/media/pri‐
106 vate/$USER/"
107 -J create a plain mapper owned by the user who run the command
108 on a device pointed by argument -d
109 -B create a luks or truecrypt header backup
110 -R restore a luks or truecrypt header on a device from backup
111 NOTE
112 A system partition is defined as a partition with an active entry in
113 /etc/fstab and/or /etc/crypttab.
114 An active entry is an entry that is not commented out.
115
116 options that goes with above operations:
117 -G module name to use to get a passphrase to open a volume
118 -e mode for opening volumes(ro*/rw) when used with -o/-O. path
119 to destination file when used with -E/-D
120 -e mode for managing a truecrypt header when used with
121 -B/-R.Options can be "fde" for volumes that use whole disk
122 encryption,"sys" for a windows system volume.The volume is
123 assumed to be a normal one when the option is not set.
124 -k do not ask for confirmation when doing dangerous operations
125 -d path to a file or partition with encrypted volume
126 -m path component to be added to mount point pre‐
127 fix(/run/media/private/$USER or /home/$USER)
128 -z file system type installed(ext2,ext3,ext4* etc) or or
129 luks/tcrypt header backup path
130 -t type of volume (vera,plain/luks*). "vera" is a necessary
131 argument when opening a VeraCrypt volume
132 -g options to be used when creating a volume.
133 default for luks are: "/dev/urandom.aes.xts-
134 plain64.256.sha1"
135 default for tcrypt are: "/dev/urandom.aes.xts-
136 plain64.256.ripemd160"
137 possible combination for tcrypt: "/dev/urandom.ser‐
138 pent:twofish:aes.xts-plain64.256.whirlpool"
139 -h get passphrase interactively
140 -p passphrase
141 -f path to keyfile
142 -F path to normal truecrypt multiple keyfiles.Multiple keyfiles
143 are added by setting the option multiple times.
144 -V path to hidden truecrypt multiple keyfiles.Multiple keyfiles
145 are added by setting the option multiple times.
146 -y passphrase already in the volume(required by -a if -u is
147 absent and -h is also absent)
148 -u path to keyfile with passphrase already in the vol‐
149 ume(required by -a if -y is absent and -h is also absent)
150 -l passphrase to be added(required by -a if -n is absent and -h
151 is also absent)
152 -n path to keyfile with a passphrase to be added (required by
153 -a if -l is absent and -h is also absent)
154
155
157 Copyright (c) 2011-2013
158 name : Francis Banyikwa
159 email: mhogomchungu@gmail.com
160
161 This program is free software: you can redistribute it and/or modify it
162 under the terms of the GNU General Public License as published by the
163 Free Software Foundation, either version 2 of the License, or (at your
164 option) any later version. This program is distributed in the hope
165 that it will be useful, but WITHOUT ANY WARRANTY; without even the
166 implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PUR‐
167 POSE. See the GNU General Public License for more details. You should
168 have received a copy of the GNU General Public License along with this
169 program. If not, see <http://www.gnu.org/licenses/>.
170
171
173 Last change: Fri Jan 9 14:43:08 EAT 2015
174
175
176
177 zuluCrypt-cli(1)