Product SiteDocumentation Site

10. File Systems

Latest Release Notes on the Web

These release notes may be updated. Visit to view the latest release notes for Fedora.
Fedora 7 provides basic support for encrypted swap partitions and non-root file systems. To use it, add entries to /etc/crypttab and reference the created devices in /etc/fstab.

Encrypted FS Support Unavailable During Install

Enable file system encryption after installation. Anaconda does not have support for creating encrypted block devices.
The following example shows an /etc/crypttab entry for a swap partition:
my_swap /dev/sdb1 /dev/urandom swap,cipher=aes-cbc-essiv:sha256

This creates an encrypted block device /dev/mapper/my_swap, which can be referenced in /etc/fstab. The next example shows an entry for a filesystem volume:
my_volume /dev/sda5 /etc/volume_key cipher=aes-cbc-essiv:sha256

The /etc/volume_key file contains a plaintext encryption key. You can also specify none as the key file name, and the system instead asks for the encryption key during boot.
The recommended method is to use LUKS for file system volumes: (using LUKS you can drop the cipher= part in crypttab).
  1. Create the encrypted volume using cryptsetup luksFormat
  2. Add the necessary entry to /etc/crypttab
  3. Set up the volume manually using cryptsetup luksOpen or reboot
  4. Create a filesystem on the encrypted volume
  5. Set up an /etc/fstab entry