You can use the decrypt_keyctl
keyscript to securely cache the passphrase when mounting multiple encrypted volumes. The README describes how to do this on boot; there are some caveats with workarounds described in bug 1022815.
This should allow auto mounting of multiple encrypted volumes at boot with only one passphrase prompt. The same keyctl mechanism could be used to arrange the automounting of other volumes after boot time, but I'm not aware of a full solution.
I do the same thing, however I'm afraid my answer won't be satisfactory, as for various reasons I went with a completely custom Initramfs.
Instead of GnuPG
, which is an extra binary that has to be included in the Initramfs (and in case of GnuPG-2
, a rather complex one), I simply used what's already there. And that's obviously dm-crypt/LUKS
.
So suppose you have a keyfile
. Preferably one with random data.
# dd if=/dev/urandom of=keyfile count=1
1+0 records in
1+0 records out
512 bytes (512 B) copied, 0.000189802 s, 2.7 MB/s
Add encryption for it with LUKS (feel free to add your cipher settings of choice).
# truncate -s 2M keyfile.luks
# cryptsetup luksFormat keyfile --header keyfile.luks
WARNING!
========
This will overwrite data on keyfile.luks irrevocably.
Are you sure? (Type uppercase yes): YES
Enter passphrase: bananas
Verify passphrase: bananas
Now you have a keyfile (512 byte) and a keyfile.luks (2MB, which cryptsetup for some reason needs to write the 192k LUKS header). Since the Initramfs will be compressed anyway, that is not too bad (still smaller than GnuPG
).
Now you can decrypt the keyfile:
# cryptsetup luksOpen keyfile --header keyfile.luks lukskey
Enter passphrase for keyfile: bananas
And you have 512 byte of random data in /dev/mapper/lukskey
. (You may write to it if you want to change it, so we could have initialized the file with zeroes earlier.)
# blockdev --getsize64 /dev/mapper/lukskey
512
In Initramfs init
you could then proceed to open the real LUKS volume with it (assuming you added the key first).
cryptsetup --key-file=/dev/mapper/lukskey luksOpen /dev/yourdisk luksyourdisk
cryptsetup luksClose lukskey # clean up
This approach makes GnuPG entirely superfluous, plus you get all LUKS advantages, such as multiple passphrases for the key, cipher of your choice, et cetera. Not to mention a nice (mostly regular) password prompt with multiple retries.
Best Answer
Tested in Ubuntu 14.04: Search for the "Disks" application
Select Device, select volume, Click cogs (more actions) -> "Change passphrase"