summaryrefslogtreecommitdiff
path: root/src/Linux:Luks_Password_Changing.ascii
blob: 96e3790d8b50345bce23b829b0f9b2628651df24 (plain)
    1 Linux:Luks Password Changing
    2 ============================
    3 :author: Aaron Ball
    4 :email: nullspoon@iohq.net
    5 
    6 
    7 == {doctitle}
    8 
    9 Given my most recent posts about Linux Linux:System_Encryption[system
   10 encryption] and Linux:dm-crypt_Encrypted_Home_Directories[encrypted home
   11 directories], I think this post is a good followup since account passwords
   12 should be changed routinely.
   13 
   14 I use http://code.google.com/p/cryptsetup/wiki/DMCrypt[dm-crypt] with a
   15 http://code.google.com/p/cryptsetup/[LUKS header] for my work computer's
   16 encryption. It uses my Active Directory password for the luks password.  While
   17 my Windows password is a very safe one, Windows NTLM
   18 https://securityledger.com/2012/12/new-25-gpu-monster-devours-passwords-in-seconds/[is
   19 not the most secure hashing algorithm] on the planet, but I digress.
   20 
   21 I just changed my password at work after 3 months of use, which means I've got
   22 to update my LUKS header with the new key and remove the old one (it still
   23 works fine, I just want one password for my logins). Yes, this is in the man
   24 page, but I thought I'd post this here for anyone too lazy (like myself) to
   25 hunt through the man page. It turns out there is a change key feature of
   26 cryptsetup.
   27 
   28 ----
   29 luksChangeKey <device>
   30 ----
   31 
   32 If you run that command, it will ask you for the old password. Type that in and
   33 if it matches, you will be prompted to enter the new password twice. Once
   34 that's done, there's no need to umount and remount. The next time the volume is
   35 remounted though, it will require the new password.
   36 
   37 
   38 Category:Linux
   39 Category:Security
   40 Category:Encryption
   41 
   42 
   43 // vim: set syntax=asciidoc:

Generated by cgit