verschlüsselte Ubuntu Partition mounten
Sunday, November 10th, 2019… mit udisksctl (ubuntu 18.04)
sudo apt install libblockdev-crypto2
sudo systemctl restart udisks2.service
udisksctlunlock -b /dev/sdb5
Passphrase:
Unlocked /dev/sdb5 as /dev/dm-3.
ls -la /dev/mapper
udisksctl mount -b /dev/mapper/kubuntu--vg-root
wieder aushängen:udisksctl unmount -b /dev/mapper/kubuntu--vg-root
…mit cryptsetup:
sudo cryptsetup luksFormat -c aes-xts-plain64 -s 512 -h sha512 -y /dev/PARTITION
sudo cryptsetup luksOpen /dev/PATITION NAME
sudo mkfs.ext4 /dev/mapper/NAME
Quelle: https://wiki.ubuntuusers.de/LUKS/
Option für /etc/crypttab:
noauto
Entirely ignore the device at the boot process. It’s still possible
to map the device manually using cryptdisks_start.