Creating Encrypted Containers in Linux Using Cryptsetup

Written by kinaro | Published 2022/08/26
Tech Story Tags: linux | encryption | linux-tips | cryptsetup | encrypted-containers | containers | containerization | linux-containers

TLDRCryptsetup is a command line utility for encrypting storage devices and volumes. LUKS is the Linux Unified Key System. We create a 4GB container to store sensitive documents (or any info you may wish to keep private) You can use a keyfile to unlock your container or a password. A key file is more secure since it provides a higher entropy than a password. If you lose the key file then you can kiss your data goodbye. After the container is mounted, your regular user does not have the necessary permissions to create files or delete anything.via the TL;DR App

Summary

Cryptsetup is a command line utility for encrypting storage devices and volumes.LUKS is the Linux Unified Key System.

In this guide, we are going to create an encrypted LUKS2 container to store sensitive documents (Or any info you may wish to keep private)

Steps followed

  1. Open the Terminal. You will require sudo privileges to execute the commands.

  2. Next, we create a file that we are going to format as a container.

    dd if=/dev/zero of=~/container.store bs=1 count=0 seek=4G

Now we have a 4GB container that we need to encrypt and mount. You can use a keyfile to unlock your container or a password. A key file is more secure since it provides a higher entropy than a password. But then the question of safe storage arises.

  1. Now we generate a key file to encrypt our container. If you lose the key file then you can kiss your data goodbye

    dd if=/dev/urandom of=~/keyfile bs=1024 count=8

Here we generate an 8KiB keyfile. 1KiB should suffice, but let’s go with 8.4. The next thing is to format the 4GB file as a container and mount it.

cryptsetup luksFormat --type luks2 ~/container.store ~/keyfile
  1. Open the container. It has no filesystem currently, so we can't store anything yet

    cryptsetup luksOpen ~/container.store encrypted --key-file ~/keyfile

  • The file will be mounted under /dev/mapper/encrypted
  1. Next we format the container with a filesystem of our choice. Here I go with btrFS

    mkfs.btrfs /dev/mapper/encrypted -L Private

The filesystem created is given a label of Private7. Mount the newly created filesystem if it isn't automatically mounted already.

mkdir ~/Private
mount /dev/mapper/encrypted ~/Private

Now our container is mounted at ~/home/$USER/Private

  • After the container is mounted, your regular user does not have the necessary permissions to create files or delete anything. This can be solved by:

    cd ~/Private chown $USER:$USER .

Now you should be able to create, modify or delete files in the container.

How to unmount the container

  1. Run the following to unmount the container:

    sudo umount ~/Private

Enter your password when prompted

2. Close the LUKS device

sudo cryptsetup luksClose /dev/mapper/encrypted

Congratulations!! Now you are good to go.

First published on my blog


Published by HackerNoon on 2022/08/26