{"id":2834,"date":"2022-12-20T15:17:26","date_gmt":"2022-12-20T18:17:26","guid":{"rendered":"http:\/\/lode.uno\/linux-man\/index.php\/2022\/12\/20\/systemdcryptsetupgenerator-man8\/"},"modified":"2022-12-20T15:17:26","modified_gmt":"2022-12-20T18:17:26","slug":"systemdcryptsetupgenerator-man8","status":"publish","type":"post","link":"https:\/\/lode.uno\/linux-man\/2022\/12\/20\/systemdcryptsetupgenerator-man8\/","title":{"rendered":"SYSTEMD&minus;CRYPTSETUP&minus;GENERATOR (man8)"},"content":{"rendered":"<h1 align=\"center\">SYSTEMD\u2212CRYPTSETUP\u2212GENERATOR<\/h1>\n<p> <a href=\"#NAME\">NAME<\/a><br \/> <a href=\"#SYNOPSIS\">SYNOPSIS<\/a><br \/> <a href=\"#DESCRIPTION\">DESCRIPTION<\/a><br \/> <a href=\"#KERNEL COMMAND LINE\">KERNEL COMMAND LINE<\/a><br \/> <a href=\"#SEE ALSO\">SEE ALSO<\/a> <\/p>\n<hr>\n<h2>NAME <a name=\"NAME\"><\/a> <\/h2>\n<p style=\"margin-left:11%; margin-top: 1em\">systemd-cryptsetup-generator \u2212 Unit generator for \/etc\/crypttab<\/p>\n<h2>SYNOPSIS <a name=\"SYNOPSIS\"><\/a> <\/h2>\n<p style=\"margin-left:11%; margin-top: 1em\">\/usr\/lib\/systemd\/system\u2212generators\/systemd\u2212cryptsetup\u2212generator<\/p>\n<h2>DESCRIPTION <a name=\"DESCRIPTION\"><\/a> <\/h2>\n<p style=\"margin-left:11%; margin-top: 1em\">systemd\u2212cryptsetup\u2212generator is a generator that translates \/etc\/crypttab into native systemd units early at boot and when configuration of the system manager is reloaded. This will create <b>systemd-cryptsetup@.service<\/b>(8) units as necessary.<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\">systemd\u2212cryptsetup\u2212generator implements <b>systemd.generator<\/b>(7).<\/p>\n<h2>KERNEL COMMAND LINE <a name=\"KERNEL COMMAND LINE\"><\/a> <\/h2>\n<p style=\"margin-left:11%; margin-top: 1em\">systemd\u2212cryptsetup\u2212generator understands the following kernel command line parameters:<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><i>luks=<\/i>, <i>rd.luks=<\/i><\/p>\n<p style=\"margin-left:17%;\">Takes a boolean argument. Defaults to &#8220;yes&#8221;. If &#8220;no&#8221;, disables the generator entirely. <i>rd.luks=<\/i> is honored only by initial RAM disk (initrd) while <i>luks=<\/i> is honored by both the main system and the initrd.<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><i>luks.crypttab=<\/i>, <i>rd.luks.crypttab=<\/i><\/p>\n<p style=\"margin-left:17%;\">Takes a boolean argument. Defaults to &#8220;yes&#8221;. If &#8220;no&#8221;, causes the generator to ignore any devices configured in \/etc\/crypttab (<i>luks.uuid=<\/i> will still work however). <i>rd.luks.crypttab=<\/i> is honored only by initial RAM disk (initrd) while <i>luks.crypttab=<\/i> is honored by both the main system and the initrd.<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><i>luks.uuid=<\/i>, <i>rd.luks.uuid=<\/i><\/p>\n<p style=\"margin-left:17%;\">Takes a LUKS superblock UUID as argument. This will activate the specified device as part of the boot process as if it was listed in \/etc\/crypttab. This option may be specified more than once in order to set up multiple devices. <i>rd.luks.uuid=<\/i> is honored only by initial RAM disk (initrd) while <i>luks.uuid=<\/i> is honored by both the main system and the initrd.<\/p>\n<p style=\"margin-left:17%; margin-top: 1em\">If \/etc\/crypttab contains entries with the same UUID, then the name, keyfile and options specified there will be used. Otherwise, the device will have the name &#8220;luks\u2212UUID&#8221;.<\/p>\n<p style=\"margin-left:17%; margin-top: 1em\">If \/etc\/crypttab exists, only those UUIDs specified on the kernel command line will be activated in the initrd or the real root.<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><i>luks.name=<\/i>, <i>rd.luks.name=<\/i><\/p>\n<p style=\"margin-left:17%;\">Takes a LUKS super block UUID followed by an &#8220;=&#8221; and a name. This implies <i>rd.luks.uuid=<\/i> or <i>luks.uuid=<\/i> and will additionally make the LUKS device given by the UUID appear under the provided name.<\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><i>rd.luks.name=<\/i> is honored only by initial RAM disk (initrd) while <i>luks.name=<\/i> is honored by both the main system and the initrd.<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><i>luks.options=<\/i>, <i>rd.luks.options=<\/i><\/p>\n<p style=\"margin-left:17%;\">Takes a LUKS super block UUID followed by an &#8220;=&#8221; and a string of options separated by commas as argument. This will override the options for the given UUID.<\/p>\n<p style=\"margin-left:17%; margin-top: 1em\">If only a list of options, without an UUID, is specified, they apply to any UUIDs not specified elsewhere, and without an entry in \/etc\/crypttab.<\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><i>rd.luks.options=<\/i> is honored only by initial RAM disk (initrd) while <i>luks.options=<\/i> is honored by both the main system and the initrd.<\/p>\n<p style=\"margin-left:11%; margin-top: 1em\"><i>luks.key=<\/i>, <i>rd.luks.key=<\/i><\/p>\n<p style=\"margin-left:17%;\">Takes a password file name as argument or a LUKS super block UUID followed by a &#8220;=&#8221; and a password file name.<\/p>\n<p style=\"margin-left:17%; margin-top: 1em\">For those entries specified with <i>rd.luks.uuid=<\/i> or <i>luks.uuid=<\/i>, the password file will be set to the one specified by <i>rd.luks.key=<\/i> or <i>luks.key=<\/i> of the corresponding UUID, or the password file that was specified without a UUID.<\/p>\n<p style=\"margin-left:17%; margin-top: 1em\">It is also possible to specify an external device which should be mounted before we attempt to unlock the LUKS device. systemd\u2212cryptsetup will use password file stored on that device. Device containing password file is specified by appending colon and a device identifier to the password file path. For example, <i>rd.luks.uuid=<\/i>b40f1abf\u22122a53\u2212400a\u2212889a\u22122eccc27eaa40 <i>rd.luks.key=<\/i>b40f1abf\u22122a53\u2212400a\u2212889a\u22122eccc27eaa40=\/keyfile:LABEL=keydev. Hence, in this case, we will attempt to mount file system residing on the block device with label &#8220;keydev&#8221;. This syntax is for now only supported on a per\u2212device basis, i.e. you have to specify LUKS device UUID.<\/p>\n<p style=\"margin-left:17%; margin-top: 1em\"><i>rd.luks.key=<\/i> is honored only by initial RAM disk (initrd) while <i>luks.key=<\/i> is honored by both the main system and the initrd.<\/p>\n<h2>SEE ALSO <a name=\"SEE ALSO\"><\/a> <\/h2>\n<p style=\"margin-left:11%; margin-top: 1em\"><b>systemd<\/b>(1), <b>crypttab<\/b>(5), <b>systemd-cryptsetup@.service<\/b>(8), <b>cryptsetup<\/b>(8), <b>systemd-fstab-generator<\/b>(8)<\/p>\n<hr>\n","protected":false},"excerpt":{"rendered":"<p>  systemd-cryptsetup-generator \u2212 Unit generator for \/etc\/crypttab <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[5,52,4,184],"class_list":["post-2834","post","type-post","status-publish","format-standard","hentry","category-8-administracion-del-sistema","tag-5","tag-administracion","tag-man8","tag-systemd-cryptsetup-generator"],"gutentor_comment":0,"_links":{"self":[{"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/posts\/2834","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/comments?post=2834"}],"version-history":[{"count":0,"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/posts\/2834\/revisions"}],"wp:attachment":[{"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/media?parent=2834"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/categories?post=2834"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lode.uno\/linux-man\/wp-json\/wp\/v2\/tags?post=2834"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}