Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

How to mount volume created in SiriKali from command line? #17

Closed
ikatza opened this issue Jan 23, 2017 · 4 comments
Closed

How to mount volume created in SiriKali from command line? #17

ikatza opened this issue Jan 23, 2017 · 4 comments

Comments

@ikatza
Copy link

ikatza commented Jan 23, 2017

So as the title says, however I'm interested when the option of Key+KeyFile are used to create the volume. Does cryfs, securefs, gocryptfs, encfs or ecrypts support Key+KeyFile?

If a volume was created with SiriKali and Key+KeyFile can it be mounted with something else?

@mhogomchungu
Copy link
Owner

mhogomchungu commented Jan 23, 2017

No,these backends are not aware of the implementation of "key+keyfile" option as SiriKali generates a passphrase that is a combination of a key and a keyfile and passes on the result as a passphrase to these backends.

The passphrase is generated with the below formular:
passphrase = hmac_sha256(key,keyfile contents)

You can use a CLI tool "hmac256"[1](DO NOT set the binary option) among others to generate the passphrase independently of SiriKali. This CLI tool should already be installed in your computer(it is in mine).

You can also use openssl to generate the passphrase with something like below:

 cat path/to/KeyFile | openssl dgst -sha256 -hmac "Key"

[1] http://manpages.ubuntu.com/manpages/xenial/en/man1/hmac256.1.html

@ikatza
Copy link
Author

ikatza commented Jan 23, 2017

Thanks! Already got it working.

@mhogomchungu
Copy link
Owner

mhogomchungu commented Mar 21, 2017

Version 1.2.5 of SiriKali(already released) has an option to display a password in the password dialog prompt and you can use this feature to see the generated key that will be passed to the backend.

From CLI currently on this git version,you can get the password also by using "-s" option that enables the feature together with "-f" that takes a path to a keyfile. The password will be asked by a terminal prompt. Example of the above is below:

[mtz@ink ~]$ sirikali -s -f /home/mtz/key 
Password: 
408d71e534422ff5af7894216c6762adc4fe11dfda20a7b9bfb61946355d05c6
[mtz@ink ~]$ 

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants