Linux分区加密实操指南
一 方案与准备
sudo apt-get install cryptsetup 或 sudo yum install cryptsetup(部分发行版为 cryptsetup-luks)。fdisk/parted 创建分区(如 /dev/sdb1),确认设备路径无误。二 标准步骤 LUKS 加密分区
sudo fdisk /dev/sdb → 新建分区 → 写入分区表。sudo cryptsetup luksFormat /dev/sdb1sudo cryptsetup luksFormat /dev/sdb1 /etc/cryptfs.keyluksFormat 会清空分区数据,命令确认时输入大写的 YES。sudo cryptsetup luksOpen /dev/sdb1 encrypted_partitionsudo cryptsetup open --key-file=/etc/cryptfs.key /dev/sdb1 encrypted_partitionsudo mkfs.ext4 /dev/mapper/encrypted_partitionsudo mkdir -p /mnt/encrypted_partitionsudo mount /dev/mapper/encrypted_partition /mnt/encrypted_partitionsudo umount /mnt/encrypted_partitionsudo cryptsetup luksClose encrypted_partitionlsblk、cryptsetup status /dev/mapper/encrypted_partition、df -h 查看状态与挂载。三 开机自动解锁与挂载
sudo dd if=/dev/urandom of=/etc/cryptfs.key bs=1k count=4sudo chmod 600 /etc/cryptfs.keysudo cryptsetup luksAddKey /dev/sdb1 /etc/cryptfs.keyblkid /dev/sdb1encrypted_partition UUID=xxxx-xxxx /etc/cryptfs.key luks/dev/mapper/encrypted_partition /mnt/encrypted_partition ext4 defaults 0 0sudo cryptdisks_start encrypted_partition(触发解锁)sudo mount -a(挂载所有 fstab 条目)四 密钥管理与备份恢复
sudo cryptsetup luksAddKey /dev/sdb1sudo cryptsetup luksRemoveKey /dev/sdb1sudo cryptsetup luksDump /dev/sdb1sudo cryptsetup luksHeaderBackup /dev/sdb1 --header-backup-file /root/sdb1-luks-header.baksudo cryptsetup luksHeaderRestore /dev/sdb1 --header-backup-file /root/sdb1-luks-header.bak五 常见问题与注意事项
/etc/crypttab 与 /etc/fstab,避免插拔磁盘或重启后设备名变化导致解锁/挂载失败。