亚洲国产日韩欧美一区二区三区,精品亚洲国产成人av在线,国产99视频精品免视看7,99国产精品久久久久久久成人热,欧美日韩亚洲国产综合乱

Table of Contents
Step 1: Create Disk Partitions
Step 2: Format New Partitions
Step 3: Mount New Partitions
Step 4: New Partition Encryption
Step 4: Mount Encrypted Partitions Automatically
Home System Tutorial LINUX LUKS: Linux Hard Disk Data Encryption with NTFS in Linux

LUKS: Linux Hard Disk Data Encryption with NTFS in Linux

May 15, 2025 am 09:23 AM

LUKS, which stands for Linux Unified Key Setup, is a robust disk encryption method used by the Linux Kernel. It is implemented using the cryptsetup package. The cryptsetup command-line tool encrypts a volume disk in real-time using a symmetric encryption key derived from a passphrase that must be entered every time a volume, partition, or entire disk (including a USB stick) is mounted in the filesystem hierarchy. It employs the aes-cbc-essiv:sha256 cipher for encryption.

LUKS is highly recommended for encrypting entire block devices such as hard disks, USB sticks, flash disks, partitions, and volume groups on Linux systems. It is particularly useful for securing removable storage media, laptop hard drives, or Linux swap files, though it is not advised for file-level encryption.

NTFS, or New Technology File System, is a proprietary file system developed by Microsoft.

Ubuntu 24.04 offers full support for LUKS encryption and also provides native support for NTFS for Windows systems through the ntfs-3g package.

To illustrate this, I have added a new hard disk to an Ubuntu 24.04 system (identified as /dev/vdb), which will be divided into two partitions:

  • The first partition (/dev/vdb1 - primary) will be used for LUKS encryption.
  • The second partition (/dev/vdb2 - extended) will be formatted as NTFS for compatibility with both Linux and Windows systems.

These partitions will be set to mount automatically on Ubuntu 24.04 after a reboot.

Step 1: Create Disk Partitions

1. Once the hard disk is physically connected to your machine, use the ls command to list all /dev devices (the new disk will be /dev/vdb) or check the newly added HDD with the fdisk command.

<code>ls /dev/vd*
sudo fdisk -l /dev/vdb</code>

LUKS: Linux Hard Disk Data Encryption with NTFS in Linux

Since no filesystem has been written yet, the disk does not contain a valid partition table.

2. Next, use the cfdisk disk utility to partition the hard disk into two parts. This utility provides a text-based interface for disk partitioning.

<code>sudo cfdisk /dev/vdb</code>

If you are using cfdisk for the first time on this disk, you may need to select a partition table type (e.g., MBR for older systems or GPT for newer systems).

LUKS: Linux Hard Disk Data Encryption with NTFS in Linux

3. The cfdisk utility will open in interactive mode. Select the "Free Space" on your hard disk and navigate to the "New" option using the left/right arrow keys.

LUKS: Linux Hard Disk Data Encryption with NTFS in Linux

4. Choose the partition type (Primary or Extended) if prompted and set the size of the partition (in MB or GB) to create the first partition.

LUKS: Linux Hard Disk Data Encryption with NTFS in Linux

5. After creating the first partition, select "Free Space" again and choose "New" to create the second partition.

LUKS: Linux Hard Disk Data Encryption with NTFS in Linux

6. Choose the partition type (Primary or Extended) if prompted and set the size of the partition (in MB or GB) to create the second partition.

LUKS: Linux Hard Disk Data Encryption with NTFS in Linux

7. After reviewing and verifying the partitions, select "Write" to confirm and save the partitions.

LUKS: Linux Hard Disk Data Encryption with NTFS in Linux

8. Select "Quit" to exit the cfdisk utility.

LUKS: Linux Hard Disk Data Encryption with NTFS in Linux

Congratulations! Your partitions have been successfully created and are now ready to be formatted and used.

Step 2: Format New Partitions

9. To verify the disk's Partition Table again, use the fdisk command, which will display detailed partition table information.

<code>sudo fdisk -l /dev/vdb</code>

LUKS: Linux Hard Disk Data Encryption with NTFS in Linux

10. To format the first partition as ext4, use the following command:

<code>sudo mkfs.ext4 /dev/vdb1</code>

LUKS: Linux Hard Disk Data Encryption with NTFS in Linux

11. To format the second partition as NTFS, you need to install ntfs-3g and then format the second partition as NTFS.

<code>sudo apt install ntfs-3g
sudo mkfs.ntfs /dev/vdb2</code>

LUKS: Linux Hard Disk Data Encryption with NTFS in Linux

Step 3: Mount New Partitions

12. To make the partitions available, they must be mounted to mount points on the filesystem.

<code>sudo mkdir /mnt/partition1
sudo mkdir /mnt/partition2</code>

13. Next, mount the partitions to the newly created mount directories.

<code>sudo mount /dev/vdb1 /mnt/partition1
sudo mount /dev/vdb2 /mnt/partition2</code>

LUKS: Linux Hard Disk Data Encryption with NTFS in Linux

14. To enable auto-mounting of partitions, you need to find the UUIDs of the partitions using the blkid command.

<code>sudo blkid /dev/vdb1
sudo blkid /dev/vdb2</code>

LUKS: Linux Hard Disk Data Encryption with NTFS in Linux

15. Next, edit the /etc/fstab file and add entries for the new partitions using their UUIDs.

<code>UUID=7a1e356f-f782-4835-bd1c-5e6d64378869 /mnt/partition1 ext4 defaults 0 2
UUID=0A9AABBB53B3165A /mnt/partition2 ntfs defaults 0 2</code>

Step 4: New Partition Encryption

16. To encrypt partitions using cryptsetup, you need to install the cryptsetup tool as shown below:

<code>sudo apt install cryptsetup [On <b>Debian</b> Based Systems]
sudo dnf install cryptsetup [On <b>RedHat</b> Based Systems]</code>

17. Now, encrypt the first partition on the hard disk by issuing the following command, which will prompt you to confirm and enter a passphrase to unlock the encrypted partition.

<code>sudo cryptsetup luksFormat /dev/vdb1</code>

LUKS: Linux Hard Disk Data Encryption with NTFS in Linux

18. To activate this encrypted partition, it must be initialized with a name entry in the /dev/mapper directory using the cryptsetup package.

<code>sudo cryptsetup open --type luks /dev/vdb1 <strong>crypted_volume</strong></code>

19. Next, format the encrypted partition and mount it.

<code>sudo mkfs.ext4 /dev/mapper/crypted_volume
sudo mkdir /mnt/encrypted1
sudo mount /dev/mapper/crypted_volume /mnt/encrypted1</code>

LUKS: Linux Hard Disk Data Encryption with NTFS in Linux

20. For the second partition, initialize encryption using the following command.

<code>sudo cryptsetup luksFormat /dev/vdb2</code>

LUKS: Linux Hard Disk Data Encryption with NTFS in Linux

21. To activate this second encrypted partition, it must be initialized with a name entry in the /dev/mapper directory using the cryptsetup package.

<code>sudo cryptsetup open --type luks /dev/vdb2 crypted_volume2</code>

22. Next, format the second encrypted partition and mount it.

<code>sudo mkfs.ntfs /dev/mapper/crypted_volume2
sudo mkdir /mnt/encrypted2
sudo mount /dev/mapper/crypted_volume2 /mnt/encrypted2</code>

LUKS: Linux Hard Disk Data Encryption with NTFS in Linux

Step 4: Mount Encrypted Partitions Automatically

23. To automatically unlock and mount the encrypted partitions at boot, you need to update /etc/crypttab and /etc/fstab.

<code>sudo nano /etc/crypttab</code>

24. Use the blkid command to find the UUIDs of the partitions.

<code>sudo blkid /dev/vdb1
sudo blkid /dev/vdb2</code>

25. Then add encrypted partition entries in the /etc/crypttab file.

<code>crypted_volume UUID=d29f57c3-fe00-41d5-8095-d68f7f04823d none luks
crypted_volume2 UUID=1DF9CC677F758914 none luks</code>

26. Similarly, edit /etc/fstab and specify your device name, mount point, filesystem type, and other options.

<code>sudo nano /etc/fstab</code>

Add entries for the filesystems:

<code>/dev/mapper/crypted_volume /mnt/encrypted1 ext4 defaults 0 2
/dev/mapper/crypted_volume2 /mnt/encrypted2 ntfs defaults 0 2</code>

27. Finally, verify that the encrypted partitions are mounted correctly.

<code>df -hT</code>

LUKS: Linux Hard Disk Data Encryption with NTFS in Linux

As you can see, both disk partitions were automatically mounted on the Ubuntu filesystem hierarchy. As a precaution, avoid using automatically encrypted volumes from the fstab file on physically remote servers if you cannot access the reboot sequence to provide your encrypted volume password.

These settings can also be applied to all types of removable media such as USB sticks, flash memory, and external hard disks to protect important, secret, or sensitive data from eavesdropping or theft.

The above is the detailed content of LUKS: Linux Hard Disk Data Encryption with NTFS in Linux. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undress AI Tool

Undress AI Tool

Undress images for free

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

Hot Topics

PHP Tutorial
1488
72
Install LXC (Linux Containers) in RHEL, Rocky & AlmaLinux Install LXC (Linux Containers) in RHEL, Rocky & AlmaLinux Jul 05, 2025 am 09:25 AM

LXD is described as the next-generation container and virtual machine manager that offers an immersive for Linux systems running inside containers or as virtual machines. It provides images for an inordinate number of Linux distributions with support

7 Ways to Speed Up Firefox Browser in Linux Desktop 7 Ways to Speed Up Firefox Browser in Linux Desktop Jul 04, 2025 am 09:18 AM

Firefox browser is the default browser for most modern Linux distributions such as Ubuntu, Mint, and Fedora. Initially, its performance might be impressive, however, with the passage of time, you might notice that your browser is not as fast and resp

How to troubleshoot DNS issues on a Linux machine? How to troubleshoot DNS issues on a Linux machine? Jul 07, 2025 am 12:35 AM

When encountering DNS problems, first check the /etc/resolv.conf file to see if the correct nameserver is configured; secondly, you can manually add public DNS such as 8.8.8.8 for testing; then use nslookup and dig commands to verify whether DNS resolution is normal. If these tools are not installed, you can first install the dnsutils or bind-utils package; then check the systemd-resolved service status and configuration file /etc/systemd/resolved.conf, and set DNS and FallbackDNS as needed and restart the service; finally check the network interface status and firewall rules, confirm that port 53 is not

How would you debug a server that is slow or has high memory usage? How would you debug a server that is slow or has high memory usage? Jul 06, 2025 am 12:02 AM

If you find that the server is running slowly or the memory usage is too high, you should check the cause before operating. First, you need to check the system resource usage, use top, htop, free-h, iostat, ss-antp and other commands to check CPU, memory, disk I/O and network connections; secondly, analyze specific process problems, and track the behavior of high-occupancy processes through tools such as ps, jstack, strace; then check logs and monitoring data, view OOM records, exception requests, slow queries and other clues; finally, targeted processing is carried out based on common reasons such as memory leaks, connection pool exhaustion, cache failure storms, and timing task conflicts, optimize code logic, set up a timeout retry mechanism, add current limit fuses, and regularly pressure measurement and evaluation resources.

Install Guacamole for Remote Linux/Windows Access in Ubuntu Install Guacamole for Remote Linux/Windows Access in Ubuntu Jul 08, 2025 am 09:58 AM

As a system administrator, you may find yourself (today or in the future) working in an environment where Windows and Linux coexist. It is no secret that some big companies prefer (or have to) run some of their production services in Windows boxes an

How to Burn CD/DVD in Linux Using Brasero How to Burn CD/DVD in Linux Using Brasero Jul 05, 2025 am 09:26 AM

Frankly speaking, I cannot recall the last time I used a PC with a CD/DVD drive. This is thanks to the ever-evolving tech industry which has seen optical disks replaced by USB drives and other smaller and compact storage media that offer more storage

How to find my private and public IP address in Linux? How to find my private and public IP address in Linux? Jul 09, 2025 am 12:37 AM

In Linux systems, 1. Use ipa or hostname-I command to view private IP; 2. Use curlifconfig.me or curlipinfo.io/ip to obtain public IP; 3. The desktop version can view private IP through system settings, and the browser can access specific websites to view public IP; 4. Common commands can be set as aliases for quick call. These methods are simple and practical, suitable for IP viewing needs in different scenarios.

How to Install NodeJS 14 / 16 & NPM on Rocky Linux 8 How to Install NodeJS 14 / 16 & NPM on Rocky Linux 8 Jul 13, 2025 am 09:09 AM

Built on Chrome’s V8 engine, Node.JS is an open-source, event-driven JavaScript runtime environment crafted for building scalable applications and backend APIs. NodeJS is known for being lightweight and efficient due to its non-blocking I/O model and

See all articles