gbde.8 (105543) | gbde.8 (106407) |
---|---|
1.\" 2.\" Copyright (c) 2002 Poul-Henning Kamp 3.\" Copyright (c) 2002 Networks Associates Technology, Inc. 4.\" All rights reserved. 5.\" 6.\" This software was developed for the FreeBSD Project by Poul-Henning Kamp 7.\" and NAI Labs, the Security Research Division of Network Associates, Inc. 8.\" under DARPA/SPAWAR contract N66001-01-C-8035 ("CBOSS"), as part of the 9.\" DARPA CHATS research program. 10.\" 11.\" Redistribution and use in source and binary forms, with or without 12.\" modification, are permitted provided that the following conditions 13.\" are met: 14.\" 1. Redistributions of source code must retain the above copyright 15.\" notice, this list of conditions and the following disclaimer. 16.\" 2. Redistributions in binary form must reproduce the above copyright 17.\" notice, this list of conditions and the following disclaimer in the 18.\" documentation and/or other materials provided with the distribution. | 1.\" 2.\" Copyright (c) 2002 Poul-Henning Kamp 3.\" Copyright (c) 2002 Networks Associates Technology, Inc. 4.\" All rights reserved. 5.\" 6.\" This software was developed for the FreeBSD Project by Poul-Henning Kamp 7.\" and NAI Labs, the Security Research Division of Network Associates, Inc. 8.\" under DARPA/SPAWAR contract N66001-01-C-8035 ("CBOSS"), as part of the 9.\" DARPA CHATS research program. 10.\" 11.\" Redistribution and use in source and binary forms, with or without 12.\" modification, are permitted provided that the following conditions 13.\" are met: 14.\" 1. Redistributions of source code must retain the above copyright 15.\" notice, this list of conditions and the following disclaimer. 16.\" 2. Redistributions in binary form must reproduce the above copyright 17.\" notice, this list of conditions and the following disclaimer in the 18.\" documentation and/or other materials provided with the distribution. |
19.\" 3. The names of the authors may not be used to endorse or promote 20.\" products derived from this software without specific prior written 21.\" permission. | |
22.\" 23.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 24.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 25.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 26.\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 27.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 28.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 29.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 30.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 31.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 32.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 33.\" SUCH DAMAGE. 34.\" | 19.\" 20.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 21.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 22.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 23.\" ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 24.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30.\" SUCH DAMAGE. 31.\" |
35.\" $FreeBSD: head/sbin/gbde/gbde.8 105543 2002-10-20 19:20:26Z chris $ | 32.\" $FreeBSD: head/sbin/gbde/gbde.8 106407 2002-11-04 09:27:01Z phk $ |
36.\" 37.Dd October 19, 2002 38.Os 39.Dt gbde 8 40.Sh NAME 41.Nm gbde 42.Nd Operation and management utility for Geom Based Disk Encryption. 43.Sh SYNOPSIS --- 20 unchanged lines hidden (view full) --- 64.Op Fl p Ar pass-phrase 65.Op Fl L Ar new-lockfile 66.Op Fl P Ar new-pass-phrase 67.Nm 68.Cm destroy 69.Ar destination 70.Op Fl n Ar key 71.Op Fl l Ar lockfile | 33.\" 34.Dd October 19, 2002 35.Os 36.Dt gbde 8 37.Sh NAME 38.Nm gbde 39.Nd Operation and management utility for Geom Based Disk Encryption. 40.Sh SYNOPSIS --- 20 unchanged lines hidden (view full) --- 61.Op Fl p Ar pass-phrase 62.Op Fl L Ar new-lockfile 63.Op Fl P Ar new-pass-phrase 64.Nm 65.Cm destroy 66.Ar destination 67.Op Fl n Ar key 68.Op Fl l Ar lockfile |
69.Op Fl p Ar pass-phrase |
|
72.Op Fl L Ar lockfile | 70.Op Fl L Ar lockfile |
71.Sh NOTICE 72.Pp 73Please be aware that this code has not yet received much review 74and analysis by qualified cryptographers and therefore should be considered 75a slightly suspect experimental facility. 76.Pp 77We cannot at this point guarantee that the on-disk format will not change 78in response to reviews or bug-fixes, so potential users are adviced to 79be prepared that 80.Xr dump 8 / 81.Xr restore 8 82based migrations may be called for in the future. |
|
73.Sh DESCRIPTION | 83.Sh DESCRIPTION |
74The | |
75.Nm 76program is the only official operation and management interface for the 77.Xr gbde 4 78GEOM based disk encryption kernel facility. 79The interaction between the 80.Nm 81program and the kernel part is not a published interface. 82.Pp --- 40 unchanged lines hidden (view full) --- 123of the parameters can be interactively edited. 124.Pp 125The 126.Fl p Ar pass-phrase 127argument 128specifies the pass-phrase used to opening the device. 129If not specified, the controlling terminal will be used to prompt the user 130for the pass-phrase. | 84.Nm 85program is the only official operation and management interface for the 86.Xr gbde 4 87GEOM based disk encryption kernel facility. 88The interaction between the 89.Nm 90program and the kernel part is not a published interface. 91.Pp --- 40 unchanged lines hidden (view full) --- 132of the parameters can be interactively edited. 133.Pp 134The 135.Fl p Ar pass-phrase 136argument 137specifies the pass-phrase used to opening the device. 138If not specified, the controlling terminal will be used to prompt the user 139for the pass-phrase. |
140Be aware that using this option may exposed the pass-phrase to other 141users who happen to run 142.Xr 143ps 1 144or similar while the command is running. |
|
131.Pp 132The 133.Fl P Ar new-pass-phrase 134argument 135can be used to specify the new pass-phrase to the | 145.Pp 146The 147.Fl P Ar new-pass-phrase 148argument 149can be used to specify the new pass-phrase to the |
150.Cm init 151and |
|
136.Cm setkey | 152.Cm setkey |
137subcommand. | 153subcommands. |
138If not specified, the user is prompted for the new pass-phrase on the 139controlling terminal. | 154If not specified, the user is prompted for the new pass-phrase on the 155controlling terminal. |
156Be aware that using this option may exposed the pass-phrase to other 157users who happen to run 158.Xr 159ps 1 160or similar while the command is running. |
|
140.Sh EXAMPLES 141To initialize a device, using default parameters: 142.Dl # gbde init /dev/ad0s1f -l /etc/ad0s1f.lock 143.Pp 144To attach an encrypted device: 145.Dl # gbde attach ad0s1f -l /etc/ad0s1f.lock 146.Pp 147To detach an encrypted device: --- 15 unchanged lines hidden (view full) --- 163.Re 164.Sh HISTORY 165This software was developed for the FreeBSD Project by Poul-Henning Kamp 166and NAI Labs, the Security Research Division of Network Associates, Inc. 167under DARPA/SPAWAR contract N66001-01-C-8035 ("CBOSS"), as part of the 168DARPA CHATS research program. 169.Sh AUTHORS 170.An "Poul-Henning Kamp" Aq phk@FreeBSD.org | 161.Sh EXAMPLES 162To initialize a device, using default parameters: 163.Dl # gbde init /dev/ad0s1f -l /etc/ad0s1f.lock 164.Pp 165To attach an encrypted device: 166.Dl # gbde attach ad0s1f -l /etc/ad0s1f.lock 167.Pp 168To detach an encrypted device: --- 15 unchanged lines hidden (view full) --- 184.Re 185.Sh HISTORY 186This software was developed for the FreeBSD Project by Poul-Henning Kamp 187and NAI Labs, the Security Research Division of Network Associates, Inc. 188under DARPA/SPAWAR contract N66001-01-C-8035 ("CBOSS"), as part of the 189DARPA CHATS research program. 190.Sh AUTHORS 191.An "Poul-Henning Kamp" Aq phk@FreeBSD.org |
192.Sh BUGS 193The cryptographic algorithms and the over-all design has not been 194attacked mercilessly for over 10 years by a gang or cryptoanalysts. |
|