溫馨提示×

Debian掛載加密分區怎么解密

小樊
43
2025-10-18 06:50:49
欄目: 網絡安全

Prerequisites
Before decrypting and mounting an encrypted partition on Debian, ensure the cryptsetup utility is installed—it’s required to manage LUKS (Linux Unified Key Setup) encrypted partitions. Install it using:

sudo apt update && sudo apt install cryptsetup

Step 1: Identify the Encrypted Partition
Use lsblk or fdisk -l to list all storage devices and locate your encrypted partition. Encrypted partitions typically have a type of crypto_LUKS. For example:

lsblk
# or
sudo fdisk -l

Look for a partition like /dev/sdb1 marked as crypto_LUKS—this is your target.

Step 2: Open the Encrypted Partition
Use cryptsetup luksOpen to decrypt the partition and map it to a virtual device under /dev/mapper/. Replace /dev/sdb1 with your partition’s path and choose a descriptive name (e.g., my_encrypted_partition):

sudo cryptsetup luksOpen /dev/sdb1 my_encrypted_partition

You’ll be prompted to enter the encryption password you set when creating the LUKS partition. Upon success, the decrypted device will appear as /dev/mapper/my_encrypted_partition.

Step 3: Mount the Decrypted Partition
Create a mount point (a directory where the decrypted files will be accessible) and mount the decrypted device:

sudo mkdir -p /mnt/decrypted_data  # Replace with your desired mount point
sudo mount /dev/mapper/my_encrypted_partition /mnt/decrypted_data

Verify access by listing the mount point’s contents:

ls /mnt/decrypted_data
```.

**Step 4: Close the Encrypted Partition (When Done)**  
To secure the data, always unmount the partition and close the encrypted mapping when finished:  
```bash
sudo umount /mnt/decrypted_data  # Unmount the decrypted filesystem
sudo cryptsetup luksClose my_encrypted_partition  # Remove the virtual device

After this, the decrypted device (/dev/mapper/my_encrypted_partition) will no longer be accessible.

Optional: Set Up Automatic Mounting at Boot
To avoid manual steps on every reboot, configure automatic unlocking and mounting:

  1. Edit /etc/crypttab: Add a line to tell the system how to unlock the partition. Replace /dev/sdb1 with your partition and my_encrypted_partition with your mapping name:

    my_encrypted_partition /dev/sdb1 none luks
    

    The none keyword indicates no key file is used (you’ll enter the password manually at boot).

  2. Edit /etc/fstab: Add a line to mount the decrypted device to your mount point. Use the mapped device (/dev/mapper/my_encrypted_partition) and your filesystem type (e.g., ext4):

    /dev/mapper/my_encrypted_partition /mnt/decrypted_data ext4 defaults 0 2
    

    Replace ext4 with your actual filesystem (e.g., btrfs, xfs).

These changes ensure the system unlocks and mounts the encrypted partition automatically at startup.

0
亚洲午夜精品一区二区_中文无码日韩欧免_久久香蕉精品视频_欧美主播一区二区三区美女