Provided by: ecryptfs-utils_111-6ubuntu3_amd64 bug

NAME

       eCryptfs - an enterprise-class cryptographic filesystem for linux

SYNOPSIS

       mount -t ecryptfs [SRC DIR] [DST DIR] -o [OPTIONS]

DESCRIPTION

       eCryptfs is a POSIX-compliant enterprise-class stacked cryptographic filesystem for Linux.
       It is derived from Erez Zadok's  Cryptfs,  implemented  through  the  FiST  framework  for
       generating   stacked  filesystems.  eCryptfs  extends  Cryptfs  to  provide  advanced  key
       management and policy features.  eCryptfs stores cryptographic metadata in the  header  of
       each  file  written, so that encrypted files can be copied between hosts; the file will be
       decryptable with the proper key, and there is no need to  keep  track  of  any  additional
       information  aside from what is already in the encrypted file itself. Think of eCryptfs as
       a sort of "gnupgfs."

OPTIONS

       KERNEL OPTIONS

            Parameters that apply to the eCryptfs kernel module.

       ecryptfs_sig=(fekek_sig)
              Specify the signature of the mount wide authentication  token.  The  authentication
              token must be in the kernel keyring before the mount is performed. ecryptfs-manager
              or the eCryptfs mount helper can be used to construct the authentication token  and
              add it to the keyring prior to mounting.

       ecryptfs_fnek_sig=(fnek_sig)
              Specify  the  signature  of  the  mount wide authentication token used for filename
              crypto. The authentication must be in the kernel keyring before mounting.

       ecryptfs_cipher=(cipher)
              Specify the symmetric cipher to be used on a per file basis

       ecryptfs_key_bytes=(key_bytes)
              Specify the keysize to be used with the selected cipher. If the cipher only has one
              keysize the keysize does not need to be specified.

       ecryptfs_passthrough
              Allows for non-eCryptfs files to be read and written from within an eCryptfs mount.
              This option is turned off by default.

       no_sig_cache
              Do  not  check  the  mount  key  signature  against  the  values  in   the   user's
              ~/.ecryptfs/sig-cache.txt  file.  This is useful for such things as non-interactive
              setup scripts, so that the mount helper does not stop and prompt the  user  in  the
              event that the key sig is not in the cache.

       ecryptfs_encrypted_view
              This  option  provides a unified encrypted file format of the eCryptfs files in the
              lower mount point.  Currently, it is only useful if the lower mount point  contains
              files  with the metadata stored in the extended attribute.  Upon a file read in the
              upper mount point, the encrypted version of the file will  be  presented  with  the
              metadata  in  the  file  header  instead  of the xattr.  Files cannot be opened for
              writing when this option is enabled.

       ecryptfs_xattr
              Store the metadata in the extended attribute of the lower  files  rather  than  the
              header region of the lower files.

       verbose
              Log ecryptfs information to /var/log/messages.  Do not run eCryptfs in verbose-mode
              unless you are doing so for the sole purpose of development,  since  secret  values
              will be written out to the system log in that case.

       MOUNT HELPER OPTIONS

              Parameters that apply to the eCryptfs mount helper.

       key=(keytype):[KEY MODULE OPTIONS]
              Specify the type of key to be used when mounting eCryptfs.

       ecryptfs_enable_filename_crypto=(y/n)
              Specify  whether  filename  encryption  should be enabled. If not, the mount helper
              will not prompt the user for the filename encryption key signature (default).

       verbosity=0/1
              If verbosity=1, the mount  helper  will  ask  you  for  missing  values  (default).
              Otherwise,  if  verbosity=0,  it  will  not ask for missing values and will fail if
              required values are omitted.

       KEY MODULE OPTIONS

              Parameters that apply to individual key modules have the alias for the  key  module
              in  the  prefix  of  the  parameter  name. Key modules are pluggable, and which key
              modules are available on any given system is dependent upon whatever happens to  be
              installed in /usr/lib*/ecryptfs/.

       passphrase_passwd=(passphrase)
              The actual password is passphrase. Since the password is visible to utilities (like
              ps under Unix) this form should only be used where security is not important.

       passphrase_passwd_file=(filename)
              The     password     should     be     specified      in      a      file      with
              passphrase_passwd_file=(passphrase).  It  is  highly  recommended  that the file be
              stored on a secure medium such as a personal usb key.

       passphrase_passwd_fd=(file descriptor)
              The password is specified through the specified file descriptor.

       passphrase_salt=(hex value)
              The salt should be specified as a 16 digit hex value.

       openssl_keyfile=(filename)
              The filename should be the filename of a file containing an RSA SSL key.

       openssl_passwd_file=(filename)
              The password should be specified in a file with  openssl_passwd=(openssl-password).
              It  is  highly  recommended  that  the  file be stored on a secure medium such as a
              personal usb key.

       openssl_passwd_fd=(file descriptor)
              The password is specified through the specified file descriptor.

       openssl_passwd=(password)
              The password can be specified on the command line. Since the password is visible in
              the  process  list,  it  is  highly recommended to use this option only for testing
              purposes.

EXAMPLE

       The following command will layover mount eCryptfs on /secret with a  passphrase  contained
       in a file stored on secure media mounted at /mnt/usb/.

       mount   -t  ecryptfs  -o  key=passphrase:passphrase_passwd_file=/mnt/usb/file.txt  /secret
       /secret

       Where file.txt contains the contents "passphrase_passwd=[passphrase]".

SEE ALSO

       mount(8)

       /usr/share/doc/ecryptfs-utils/ecryptfs-faq.html

       http://ecryptfs.org/

NOTES

       Do not run eCryptfs in verbose-mode unless you are  doing  so  for  the  sole  purpose  of
       development,  since secret values will be written out to the system log in that case. Make
       certain that your eCryptfs mount covers all locations where your  applications  may  write
       sensitive  data. In addition, use dm-crypt to encrypt your swap space with a random key on
       boot, or see ecryptfs-setup-swap(1).

       Passphrases have a maximum length of 64 characters.

BUGS

       Please   post   bug   reports   to   the   eCryptfs   bug   tracker   on    Launchpad.net:
       https://bugs.launchpad.net/ecryptfs/+filebug.

       For kernel bugs, please follow the procedure detailed in Documentation/oops-tracing.txt to
       help us figure out what is happening.

AUTHOR

       This manpage was (re-)written by Dustin Kirkland <kirkland@ubuntu.com> for Ubuntu  systems
       (but may be used by others).  Permission is granted to copy, distribute and/or modify this
       document under the terms of the GNU General Public License, Version 2 or any later version
       published by the Free Software Foundation.

       On  Debian  systems,  the  complete text of the GNU General Public License can be found in
       /usr/share/common-licenses/GPL.