% luks, encryption, disk, dm-crypt, fde # Check if device is LUKS sudo cryptsetup isLuks # LUKS info sudo cryptsetup luksDump # Create LUKS volume sudo cryptsetup luksFormat # Create LUKS2 volume (recommended) sudo cryptsetup luksFormat --type luks2 # Create LUKS with specific cipher sudo cryptsetup luksFormat --cipher aes-xts-plain64 --key-size 512 --hash sha512 # Open LUKS volume sudo cryptsetup luksOpen # Open LUKS (alternative syntax) sudo cryptsetup open # Close LUKS volume sudo cryptsetup luksClose # Add key to LUKS sudo cryptsetup luksAddKey # Add key from file sudo cryptsetup luksAddKey # Remove key sudo cryptsetup luksRemoveKey # Kill key slot sudo cryptsetup luksKillSlot # Change passphrase sudo cryptsetup luksChangeKey # Create filesystem on opened LUKS sudo mkfs.ext4 /dev/mapper/ # Mount LUKS volume sudo mount /dev/mapper/ # Unmount LUKS volume sudo umount sudo cryptsetup luksClose # Create encrypted file container dd if=/dev/zero of= bs=1M count= sudo cryptsetup luksFormat sudo cryptsetup luksOpen sudo mkfs.ext4 /dev/mapper/ # Backup LUKS header sudo cryptsetup luksHeaderBackup --header-backup-file # Restore LUKS header sudo cryptsetup luksHeaderRestore --header-backup-file # Erase LUKS header (DESTROYS DATA!) sudo cryptsetup luksErase # Check LUKS status sudo cryptsetup status # Benchmark encryption cryptsetup benchmark # Auto-mount with /etc/crypttab # none luks # Auto-mount with keyfile # luks # Full disk encryption install (Ubuntu) # Select "Encrypt the new Ubuntu installation" during install # Encrypt home directory (ecryptfs - legacy) sudo apt install ecryptfs-utils ecryptfs-migrate-home -u # LUKS on LVM sudo pvcreate /dev/mapper/ sudo vgcreate /dev/mapper/ sudo lvcreate -l 100%FREE -n # Resize LUKS volume (grow) sudo cryptsetup resize sudo resize2fs /dev/mapper/ # Create encrypted swap sudo cryptsetup luksFormat sudo cryptsetup luksOpen cryptswap sudo mkswap /dev/mapper/cryptswap sudo swapon /dev/mapper/cryptswap # VeraCrypt CLI - create volume veracrypt -t -c # VeraCrypt CLI - mount veracrypt # VeraCrypt CLI - dismount veracrypt -d # VeraCrypt CLI - list mounted veracrypt -l $ device: lsblk -dpno NAME | grep -v loop $ mapper_name: ls /dev/mapper 2>/dev/null | grep -v control $ mount_point: echo "/mnt/encrypted" $ keyfile: echo "/root/keyfile" $ backup_file: echo "luks_header.backup" $ container_file: echo "encrypted_container.img" $ size_mb: echo "1024" $ slot_number: echo "0\n1\n2\n3\n4\n5\n6\n7" $ username: whoami $ vg_name: echo "encrypted_vg" $ lv_name: echo "data" $ volume_file: find ~ -name "*.hc" -o -name "*.tc" 2>/dev/null | head -5