CentOS 分区数据加密实现指南
一、方案总览与选择
二、标准流程 LUKS 加密一个数据分区
sudo yum install -y cryptsetupsudo dnf install -y cryptsetupsudo cryptsetup luksFormat --type luks2 /dev/sdb1sudo cryptsetup open /dev/sdb1 secure_datasudo mkfs.ext4 /dev/mapper/secure_datasudo mkdir -p /mnt/secure_datasudo mount /dev/mapper/secure_data /mnt/secure_datasudo umount /mnt/secure_datasudo cryptsetup close secure_datacryptsetup status /dev/mapper/secure_data三、开机自动解锁与密钥管理
sudo dd if=/dev/urandom of=/root/enc.key bs=1 count=256sudo chmod 600 /root/enc.keysudo cryptsetup luksAddKey /dev/sdb1 /root/enc.keysecure_data /dev/disk/by-uuid/<UUID-of-/dev/sdb1> /root/enc.key luks/dev/mapper/secure_data /mnt/secure_data ext4 defaults 0 2sudo cryptsetup luksDump /dev/sdb1sudo cryptsetup luksAddKey /dev/sdb1 / sudo cryptsetup luksRemoveKey /dev/sdb1sudo dnf install -y clevis clevis-luks clevis-dracutsudo clevis luks bind -d /dev/sdb1 tpm2 '{"pcr_bank":"sha256","pcr_ids":"0,1,2,3"}'(按策略校验后自动解锁)四、安装期加密与现有分区在线加密
sudo dnf install -y cryptsetup-reencryptsudo cryptsetup-reencrypt --new --reduce-device-size 16M /dev/sda1五、目录级与文件级加密的替代方案
sudo dnf install -y ecryptfs-utilssudo adduser --encrypt-home secureusersudo ecryptfs-migrate-home -u usernamesudo umount /home/secureuser/Private。sudo dnf install -y gnupggpg --output file.txt.gpg --encrypt --recipient user@example.com file.txtgpg --output file.txt --decrypt file.txt.gpg。六、注意事项与最佳实践