Linux分区加密实操指南
一、方案选型与准备
二、使用 LUKS 加密一个数据分区的标准步骤
sudo apt-get install cryptsetupsudo yum install cryptsetupfdisk /dev/sdX 或 parted 创建分区(如 /dev/sdb1),确认无误后写入分区表。sudo cryptsetup luksFormat /dev/sdb1sudo cryptsetup luksFormat /dev/sdb1 /path/keyfilesudo cryptsetup luksOpen /dev/sdb1 enc_volsudo cryptsetup luksOpen --key-file=/path/keyfile /dev/sdb1 enc_volsudo mkfs.ext4 /dev/mapper/enc_volsudo mkdir -p /mnt/encsudo mount /dev/mapper/enc_vol /mnt/encsudo umount /mnt/encsudo cryptsetup luksClose enc_volls -l /dev/mapper/sudo cryptsetup luksDump /dev/sdb1三、开机自动解锁与挂载(含 LUKS 头备份)
blkid /dev/sdb1enc_vol UUID=<你的UUID> none luksenc_vol UUID=<你的UUID> /etc/cryptfs.key luks,keyfile-timeout=10/dev/mapper/enc_vol /mnt/enc ext4 defaults 0 0sudo cryptdisks_start enc_vol(触发解锁)sudo mount -a(挂载所有 fstab 项)sudo cryptsetup luksHeaderBackup /dev/sdb1 --header-backup-file /root/luks-header-sdb1.baksudo dd if=/dev/sda of=./mbr-partitions.img skip=446 bs=1 count=66四、进阶场景与替代方案
luksFormat 后用 pvcreate /dev/mapper/<name> 创建 PV,加入 LVM 再建 LV、格式化与挂载。适合需要全盘/主目录加密的场景。sudo mount -t ecryptfs ~/encrypted ~/decrypted(按向导选择算法与选项),适合用户目录或特定目录的透明加密。encfs ~/encrypted ~/decrypted,FUSE 用户态实现,便于按需挂载与卸载。五、安全与恢复要点