Icon Encrypted Removable Storage

From Wiki³
Jump to: navigation, search

Use an SD Card or USB flash drive in order to bolster your disk space is never a bad idea. It can be a great place to storage things that you need between machines (files too big for constant transfer over the network) or for just general storage. This will take you through adding one with LUKS and ext4 in order to hopefully keep your data safe and free from corruption.
First re-partition the drive, for all of the examples in this tutorial I will be using an SD Card. If I refer to something as SD Card just think of this as the drive you are using. You will also need to locate the proper device node for the drive you are using, mine just so happens to be /dev/mmcblk0. You can find the device node with lsblk.

Icon Partitioning

It might be necessary to install the proper package for GPT disk management.

# pacaur -S gptfdisk

Begin by partitioning the disk, for simplicity I will do a single partition scheme.

Wipe the current partition table and create a new GPT partition table with protected MBR.

# sudo sgdisk -Z -o /dev/mmcblk0

Create the necessary partition and give it a label.

# sudo sgdisk -n 1:0:-0 -t 1:8300 /dev/mmcblk0
# sudo sgdisk -c 1:"SD Card" /dev/mmcblk0

Icon LUKS

Setup LUKS on the SD Card; confirm to erase by typing YES (take note of the caps) and then set a password.

# sudo cryptsetup luksFormat /dev/mmcblk0p1
IconWARNING: DO NOT forget the password to the partition or all of the data inside will be irretrievable!

Decrypt the LUKS partition, giving it a name. For the tutorial I will use sdcard.

# sudo cryptsetup luksOpen /dev/mmcblk0p1 sdcard

Icon Formatting

For the filesystem I will be using F2FS (Flash-Friendly File System). F2FS, originally developed by Samsung, is a file system intended for NAND-based flash memory equipped with Flash Transition Layer. However if you would like to use ext4 instead that option is available.

Icon F2FS

First make sure f2fs-tools is installed.

# yaourt -S f2fs-tools

Then format the decrypted LUKS container.

# sudo mkfs.f2fs /dev/mapper/sdcard

Icon ext4

First format the decrypted LUKS container.

# sudo mkfs.ext4 /dev/mapper/sdcard

Tune the filesystem to remove the journal and put it into writeback mode.

# sudo tune2fs -o journal_data_writeback /dev/mapper/sdcard
# sudo tune2fs -O ^has_journal /dev/mapper/sdcard
# sudo e2fsck -f /dev/mapper/sdcard

Icon Keyfile

If you are already using LUKS for full system encryption you can store a keyfile on your encrypted system to auto-unlock your removable media.

Create a keyfile for the SD Card in the root folder and set the proper permissions.

# sudo dd if=/dev/urandom of=/root/keyfile bs=1024 count=4
# sudo chmod 0400 /root/keyfile

Then add the keyfile to the LUKS partition.

# sudo cryptsetup luksAddKey /dev/mmcblk0p1 /root/keyfile

Icon Decrypt/Mount on Boot

Make a folder for your drive and set your current user to the owner.

# sudo mkdir /mnt/sdcard && sudo chown kyau:users /mnt/sdcard

Get the UUID of the partition and add a line to /etc/crypttab so that it gets decrypted on boot. Change the keyfile location to none if no keyfile was made.

# lsblk -f
# sudoedit /etc/crypttab

sdcard UUID=XXXXUUID-LUKS-SDXX-CARD-XXXXXXXXXXXX /root/keyfile

Finally add a line to /etc/fstab so that it also gets automatically mounted on boot.

# sudoedit /etc/fstab

F2FS:

/dev/mapper/sdcard /mnt/sdcard f2fs rw,noatime,nodiratime,active_logs=6 0 0

ext4:

/dev/mapper/sdcard /mnt/sdcard ext4 defaults,noatime,nodiratime,data=writeback 0 0