~ecryptfs/ecryptfs/trunk

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
=pod

=head1 NAME

eCryptfs - an enterprise-class cryptographic filesystem for linux

=head1 SYNOPSIS

B<mount -t ecryptfs>
[I<SRC DIR>]
[I<DST DIR>]
B<-o>
[I<OPTIONS>]

=head1 DESCRIPTION

eCryptfs is a POSIX-compliant enterprise-class stacked cryptographic
filesystem for Linux. It is derived from Erez Zadok's Cryptfs, implemented
through the FiST framework for generating stacked filesystems. eCryptfs
extends Cryptfs to provide advanced key management and policy features.
eCryptfs stores cryptographic metadata in the header of each file written,
so that encrypted files can be copied between hosts; the file will be
decryptable with the proper key, and there is no need to keep track of any
additional information aside from what is already in the encrypted file
itself. Think of eCryptfs as a sort of "gnupgfs."

=head1 OPTIONS

=head2 STANDARD OPTIONS

=over 10

=item B<key=(keytype):[Key Options]>

Specify the type of key to be used when mounting eCryptfs.

=item B<cipher=(cipher)>

Specify the symmetric cipher to be used on a per file basis

=item B<ecryptfs_key_bytes=(key_bytes)>

Specify the keysize to be used with the selected cipher. If the cipher
only has one keysize the keysize does not need to be specified.

=item B<passthrough>

Allows for non-eCryptfs files to be read and written from within an
eCryptfs mount. This option is turned off by default.

=item B<verbosity=(level)>
Seting verbosity prevents eCryptfs from interactively requesting for options
to be entered.  The mount will fail if an essential option is absent.

=head2 KEY OPTIONS

=item B<passwd=(passphrase)>

The actual password is password. Since the password is visible to utilities
(like ps under Unix) this form should only be used where security is not
important.

=item B<passfile=(filename)>

The password should be specified in a file with B<passwd=(passphrase)>. It is
highly reccomended that the file be stored on a secure medium such as a
personal usb key.

=item B<passfd=(file descriptor)>

The password is specified through the specified file descriptor.

=item B<passstdin>

The user types their passphrase in through stdin.

=item B<salt=(hex value)>

The salt should be specified as a 16 digit hex value. 

=item B<keyfile=(filename)>

The filename should be the filename of a file containing an RSA SSL key.

=head1 SEE ALSO

L<mount(8)|mount(8)>

=head1 NOTES

Do not run eCryptfs in higher verbosity levels
unless you are doing so for the sole purpose of development, since
secret values will be written out to the system log in that case.

=head1 BUGS

Please send bug reports to the lead developer, an eCryptfs mailing
list hosted from SourceForge, or to the SourceForge bug tracker for
the eCryptfs project. For kernel bugs, please follow the procedure
detailed in Documentation/oops-tracing.txt to help us figure out what
is happening.


=cut