Cryptmount: A utility to create encrypted filesystems in Linux

Cryptomount

Si you are looking for a utility to be able to encrypt your information look no further from your computer, andIn this article we are going to talk about an excellent utility Intended for creating encrypted files in Linux.

Cryptmount is a powerful free and open source utility released under the GNU General Public License, this excellent tool allows any user without root privileges to access encrypted file systems on GNU / Linux systems.

About Cryptmount

Cryptomount can be implemented in Linux distros that use kernel 2.6 or later. In addition, Cryptmount offers simple administration to the system administrator to create and manage encrypted file systems based on the dm-crypt device-mapper target of the kernel used.

Cryptomount assists a system administrator in creating and managing encrypted file systems based on the dm-crypt kernel target device mapper.

Cryptmount has a basic configuration script with the ability to create strong encrypted file systems.

Multiple encrypted file systems can be stored on a single disk partition. Encrypted swap partitions are supported and can be configured automatically at system startup.

File systems can be mounted and unmounted whenever necessary by normal users, without the need for super user or root privileges.

Access keys can be protected by a wide range of encryption and hashing algorithms provided by libgcrypt, which can be compatible with OpenSSL. They can be stored and backed up separately from the file system they protect.

Encrypt-files

Advantages of using the Cryptmount utility

  • Access to improved functionality in the kernel
  • Transparent support for file systems stored on raw disk partitions or loopback files
  • It has separate encryption of access keys to the file system, which gives us the possibility to change access passwords without re-encrypting the entire file system, improving times
  • Ability to store multiple encrypted file systems within a single disk partition, using a designated subset of blocks for each
  • For file systems that are not used frequently, they do not need to be mounted at system startup.
  • Unmounting of each file system is locked, so it can only be done by the user who mounted it or the superuser.
  • All encrypted file systems are supported by cryptsetup
  • Encrypted passwords can be chosen to be openssl compatible, or managed via libgcrypt, or (for version 2.0 series) with built-in SHA1 / Blowfish tags
  • Support for encrypted swap partitions (superuser only)
  • Support for configuring encrypted or crypto-swap file systems at system boot

How to install Cryptmount on Linux?

Si you want to install Cryptmount on your system In order to create your own encrypted files, you can do it by following one of the methods that we share below according to the Linux distribution you are using.

For those who are users of Debian, Ubuntu, Linux Mint or any derived distribution of this, they can install the utility with this command:

sudo apt install cryptmount

For In the case of Arch Linux, Manjaro, Antergos and derivatives, the application is within the AUR repositories and they must have the repository enabled in their pacman.conf file, we only install with:

aurman -S cryptmount

In the case of RHEL, CentOS, Fedora and derivatives we are going to execute the following to install some dependencies, in order to compile the application on the system:

sudo yum install device-mapper-deve

Now let's download the latest stable version since this link, which in this case is version 5.3.

Once the download is done, we proceed to decompress and compile with:

tar -xzf  cryptmount-5.3tar.gz

cd cryptmount-5.3

./configure

make

make install

And voila, with that you will be able to start using the utility, you only have to execute the command in terminal:

cyptmount-setup

And follow the signs.


Be the first to comment

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: AB Internet Networks 2008 SL
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.