Skip to content
GitLab
Projects
Groups
Snippets
/
Help
Help
Support
Community forum
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
Menu
Open sidebar
tails
tails
Commits
506e2aa6
Commit
506e2aa6
authored
Aug 25, 2019
by
127.0.0.1
Committed by
IkiWiki
Aug 25, 2019
Browse files
This reverts commit
95513205
parent
d00f40c7
Changes
1
Hide whitespace changes
Inline
Side-by-side
wiki/src/blueprint/backups.mdwn
View file @
506e2aa6
...
...
@@ -106,13 +106,10 @@ Implementation note:
- It might be possible to reuse the same LUKS header to create the
backup Persistence without prompting for a passphrase.
At first glance:
* To create the backup Persistence,
<span class="command">cryptsetup luksHeaderBackup/luksHeaderRestore</span> should work.
* To unlock the backup Persistence,
<span class="command">sudo dmsetup table --showkeys TailsData_unlocked</span> should dump the master key from memory and
<span class="command">cryptsetup --master-key-file</span> should unlock with the master key.
At first glance, cryptsetup luksHeaderBackup/luksHeaderRestore should
work to create that backups LUKS volume; and then, to unlock it, one
could dump the master key from memory and pass it to cryptsetup open
--master-key-file.
Update
------
...
...
Write
Preview
Supports
Markdown
0%
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment