Deleted Added
full compact
gbde.8 (105543) gbde.8 (106407)
1.\"
2.\" Copyright (c) 2002 Poul-Henning Kamp
3.\" Copyright (c) 2002 Networks Associates Technology, Inc.
4.\" All rights reserved.
5.\"
6.\" This software was developed for the FreeBSD Project by Poul-Henning Kamp
7.\" and NAI Labs, the Security Research Division of Network Associates, Inc.
8.\" under DARPA/SPAWAR contract N66001-01-C-8035 ("CBOSS"), as part of the
9.\" DARPA CHATS research program.
10.\"
11.\" Redistribution and use in source and binary forms, with or without
12.\" modification, are permitted provided that the following conditions
13.\" are met:
14.\" 1. Redistributions of source code must retain the above copyright
15.\" notice, this list of conditions and the following disclaimer.
16.\" 2. Redistributions in binary form must reproduce the above copyright
17.\" notice, this list of conditions and the following disclaimer in the
18.\" documentation and/or other materials provided with the distribution.
1.\"
2.\" Copyright (c) 2002 Poul-Henning Kamp
3.\" Copyright (c) 2002 Networks Associates Technology, Inc.
4.\" All rights reserved.
5.\"
6.\" This software was developed for the FreeBSD Project by Poul-Henning Kamp
7.\" and NAI Labs, the Security Research Division of Network Associates, Inc.
8.\" under DARPA/SPAWAR contract N66001-01-C-8035 ("CBOSS"), as part of the
9.\" DARPA CHATS research program.
10.\"
11.\" Redistribution and use in source and binary forms, with or without
12.\" modification, are permitted provided that the following conditions
13.\" are met:
14.\" 1. Redistributions of source code must retain the above copyright
15.\" notice, this list of conditions and the following disclaimer.
16.\" 2. Redistributions in binary form must reproduce the above copyright
17.\" notice, this list of conditions and the following disclaimer in the
18.\" documentation and/or other materials provided with the distribution.
19.\" 3. The names of the authors may not be used to endorse or promote
20.\" products derived from this software without specific prior written
21.\" permission.
22.\"
23.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
24.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
25.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
26.\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
27.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
28.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
29.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
30.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
31.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
32.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33.\" SUCH DAMAGE.
34.\"
19.\"
20.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
21.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23.\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
24.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30.\" SUCH DAMAGE.
31.\"
35.\" $FreeBSD: head/sbin/gbde/gbde.8 105543 2002-10-20 19:20:26Z chris $
32.\" $FreeBSD: head/sbin/gbde/gbde.8 106407 2002-11-04 09:27:01Z phk $
36.\"
37.Dd October 19, 2002
38.Os
39.Dt gbde 8
40.Sh NAME
41.Nm gbde
42.Nd Operation and management utility for Geom Based Disk Encryption.
43.Sh SYNOPSIS

--- 20 unchanged lines hidden (view full) ---

64.Op Fl p Ar pass-phrase
65.Op Fl L Ar new-lockfile
66.Op Fl P Ar new-pass-phrase
67.Nm
68.Cm destroy
69.Ar destination
70.Op Fl n Ar key
71.Op Fl l Ar lockfile
33.\"
34.Dd October 19, 2002
35.Os
36.Dt gbde 8
37.Sh NAME
38.Nm gbde
39.Nd Operation and management utility for Geom Based Disk Encryption.
40.Sh SYNOPSIS

--- 20 unchanged lines hidden (view full) ---

61.Op Fl p Ar pass-phrase
62.Op Fl L Ar new-lockfile
63.Op Fl P Ar new-pass-phrase
64.Nm
65.Cm destroy
66.Ar destination
67.Op Fl n Ar key
68.Op Fl l Ar lockfile
69.Op Fl p Ar pass-phrase
72.Op Fl L Ar lockfile
70.Op Fl L Ar lockfile
71.Sh NOTICE
72.Pp
73Please be aware that this code has not yet received much review
74and analysis by qualified cryptographers and therefore should be considered
75a slightly suspect experimental facility.
76.Pp
77We cannot at this point guarantee that the on-disk format will not change
78in response to reviews or bug-fixes, so potential users are adviced to
79be prepared that
80.Xr dump 8 /
81.Xr restore 8
82based migrations may be called for in the future.
73.Sh DESCRIPTION
83.Sh DESCRIPTION
74The
75.Nm
76program is the only official operation and management interface for the
77.Xr gbde 4
78GEOM based disk encryption kernel facility.
79The interaction between the
80.Nm
81program and the kernel part is not a published interface.
82.Pp

--- 40 unchanged lines hidden (view full) ---

123of the parameters can be interactively edited.
124.Pp
125The
126.Fl p Ar pass-phrase
127argument
128specifies the pass-phrase used to opening the device.
129If not specified, the controlling terminal will be used to prompt the user
130for the pass-phrase.
84.Nm
85program is the only official operation and management interface for the
86.Xr gbde 4
87GEOM based disk encryption kernel facility.
88The interaction between the
89.Nm
90program and the kernel part is not a published interface.
91.Pp

--- 40 unchanged lines hidden (view full) ---

132of the parameters can be interactively edited.
133.Pp
134The
135.Fl p Ar pass-phrase
136argument
137specifies the pass-phrase used to opening the device.
138If not specified, the controlling terminal will be used to prompt the user
139for the pass-phrase.
140Be aware that using this option may exposed the pass-phrase to other
141users who happen to run
142.Xr
143ps 1
144or similar while the command is running.
131.Pp
132The
133.Fl P Ar new-pass-phrase
134argument
135can be used to specify the new pass-phrase to the
145.Pp
146The
147.Fl P Ar new-pass-phrase
148argument
149can be used to specify the new pass-phrase to the
150.Cm init
151and
136.Cm setkey
152.Cm setkey
137subcommand.
153subcommands.
138If not specified, the user is prompted for the new pass-phrase on the
139controlling terminal.
154If not specified, the user is prompted for the new pass-phrase on the
155controlling terminal.
156Be aware that using this option may exposed the pass-phrase to other
157users who happen to run
158.Xr
159ps 1
160or similar while the command is running.
140.Sh EXAMPLES
141To initialize a device, using default parameters:
142.Dl # gbde init /dev/ad0s1f -l /etc/ad0s1f.lock
143.Pp
144To attach an encrypted device:
145.Dl # gbde attach ad0s1f -l /etc/ad0s1f.lock
146.Pp
147To detach an encrypted device:

--- 15 unchanged lines hidden (view full) ---

163.Re
164.Sh HISTORY
165This software was developed for the FreeBSD Project by Poul-Henning Kamp
166and NAI Labs, the Security Research Division of Network Associates, Inc.
167under DARPA/SPAWAR contract N66001-01-C-8035 ("CBOSS"), as part of the
168DARPA CHATS research program.
169.Sh AUTHORS
170.An "Poul-Henning Kamp" Aq phk@FreeBSD.org
161.Sh EXAMPLES
162To initialize a device, using default parameters:
163.Dl # gbde init /dev/ad0s1f -l /etc/ad0s1f.lock
164.Pp
165To attach an encrypted device:
166.Dl # gbde attach ad0s1f -l /etc/ad0s1f.lock
167.Pp
168To detach an encrypted device:

--- 15 unchanged lines hidden (view full) ---

184.Re
185.Sh HISTORY
186This software was developed for the FreeBSD Project by Poul-Henning Kamp
187and NAI Labs, the Security Research Division of Network Associates, Inc.
188under DARPA/SPAWAR contract N66001-01-C-8035 ("CBOSS"), as part of the
189DARPA CHATS research program.
190.Sh AUTHORS
191.An "Poul-Henning Kamp" Aq phk@FreeBSD.org
192.Sh BUGS
193The cryptographic algorithms and the over-all design has not been
194attacked mercilessly for over 10 years by a gang or cryptoanalysts.