gbde.8 (123017) | gbde.8 (129327) |
---|---|
1.\" 2.\" Copyright (c) 2002 Poul-Henning Kamp 3.\" Copyright (c) 2002 Networks Associates Technology, Inc. 4.\" All rights reserved. 5.\" 6.\" This software was developed for the FreeBSD Project by Poul-Henning Kamp 7.\" and NAI Labs, the Security Research Division of Network Associates, Inc. 8.\" under DARPA/SPAWAR contract N66001-01-C-8035 ("CBOSS"), as part of the --- 15 unchanged lines hidden (view full) --- 24.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30.\" SUCH DAMAGE. 31.\" | 1.\" 2.\" Copyright (c) 2002 Poul-Henning Kamp 3.\" Copyright (c) 2002 Networks Associates Technology, Inc. 4.\" All rights reserved. 5.\" 6.\" This software was developed for the FreeBSD Project by Poul-Henning Kamp 7.\" and NAI Labs, the Security Research Division of Network Associates, Inc. 8.\" under DARPA/SPAWAR contract N66001-01-C-8035 ("CBOSS"), as part of the --- 15 unchanged lines hidden (view full) --- 24.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30.\" SUCH DAMAGE. 31.\" |
32.\" $FreeBSD: head/sbin/gbde/gbde.8 123017 2003-11-27 20:54:51Z phk $ | 32.\" $FreeBSD: head/sbin/gbde/gbde.8 129327 2004-05-17 08:35:43Z ru $ |
33.\" 34.Dd October 19, 2002 35.Dt GBDE 8 36.Os 37.Sh NAME 38.Nm gbde 39.Nd operation and management utility for Geom Based Disk Encryption 40.Sh SYNOPSIS --- 126 unchanged lines hidden (view full) --- 167To initialize a device, using default parameters: 168.Pp 169.Dl "gbde init /dev/ad0s1f -L /etc/ad0s1f.lock" 170.Pp 171To attach an encrypted device: 172.Pp 173.Dl "gbde attach ad0s1f -l /etc/ad0s1f.lock" 174.Pp | 33.\" 34.Dd October 19, 2002 35.Dt GBDE 8 36.Os 37.Sh NAME 38.Nm gbde 39.Nd operation and management utility for Geom Based Disk Encryption 40.Sh SYNOPSIS --- 126 unchanged lines hidden (view full) --- 167To initialize a device, using default parameters: 168.Pp 169.Dl "gbde init /dev/ad0s1f -L /etc/ad0s1f.lock" 170.Pp 171To attach an encrypted device: 172.Pp 173.Dl "gbde attach ad0s1f -l /etc/ad0s1f.lock" 174.Pp |
175The encrypted device has the suffix ``.bde'' so a typical 176command to create and mount a filesystem would be: | 175The encrypted device has the suffix 176.Pa .bde 177so a typical 178command to create and mount a file system would be: |
177.Pp 178.Dl "newfs /dev/ad0s1f.bde" 179.Dl "mount /dev/ad0s1f.bde /secret" 180.Pp 181To detach an encrypted device: 182.Pp 183.Dl "gbde detach ad0s1f" 184.Pp 185Please notice that detaching an encrypted device corresponds to | 179.Pp 180.Dl "newfs /dev/ad0s1f.bde" 181.Dl "mount /dev/ad0s1f.bde /secret" 182.Pp 183To detach an encrypted device: 184.Pp 185.Dl "gbde detach ad0s1f" 186.Pp 187Please notice that detaching an encrypted device corresponds to |
186physically removing it, do not forget to unmount the filesystem first. | 188physically removing it, do not forget to unmount the file system first. |
187.Pp 188To initialize the second key using a detached lockfile and a trivial 189pass-phrase: 190.Pp 191.Dl "gbde setkey ad0s1f -n 2 -P foo -L key2.lockfile" 192.Pp 193To destroy all copies of the masterkey: 194.Pp --- 19 unchanged lines hidden --- | 189.Pp 190To initialize the second key using a detached lockfile and a trivial 191pass-phrase: 192.Pp 193.Dl "gbde setkey ad0s1f -n 2 -P foo -L key2.lockfile" 194.Pp 195To destroy all copies of the masterkey: 196.Pp --- 19 unchanged lines hidden --- |