====== FreeBSD Encrypted Drive ====== * [[FreeBSD]] * [[geli]] Creating and mounting an encrypted UFS2 filesystem is very easy to do, and it can be automatically unlocked during boot and have a filesystem check run (fstab). === Load kernel module on boot === echo geom_eli_load="YES" >> /boot/loader.conf === Create an Encrypted Device === Create a passphrase key. Make a backup copy of it somewhere to be safe. dd if=/dev/random bs=64 count=1 of=/root/ada1.key geli init -s 4096 -K ada1.key /dev/ada1 Unlock the encrypted drive. This will create the device ''/dev/ada1.eli'': geli attach -k ada1.key /dev/ada1 Fill the new volume with random data: dd if=/dev/random bs=1M of=/dev/ada1.eli Format the new volume as UFS2: newfs -U /dev/ada1.eli After that you can mount it as normal. Add an entry to ''fstab'': echo "/dev/ada1.eli /private ufs rw 1 1" >> /etc/fstab === Unmount an Encrypted Device === Unmount and detach encrypted volume: umount /private geli detach ada1.eli === Mount Encrypted Device on Boot === Add to ''/etc/rc.conf'': geli_devices="ada1" geli_ada1_flags="-k /root/ada1.key" On bootup, FreeBSD will ask for the passphrase.