mount (1) - Linux Manuals
mount: eCryptfs private mount helper.
NAME
mount.ecryptfs_private - eCryptfs private mount helper.
SYNOPSIS
mount.ecryptfs_private [ALIAS]NOTE: This program will not dynamically load the relevant keys. For this reason, it is recommended that users use ecryptfs-mount-private(1) instead!
DESCRIPTION
mount.ecryptfs_private is a mount helper utility for non-root users to cryptographically mount a private directory, ~/Private by default.
This program optionally takes one argument, ALIAS. If ALIAS is omitted, the program will default to using "Private" using:
If ALIAS is specified, then the program will look for an fstab(5) style configuration in:
The mounting will proceed if, and only if:
This program will:
The only setuid operation in this program is the call to mount(8) or umount(8).
The ecryptfs-setup-private(1) utility will create the ~/.Private and ~/Private directories, generate a mount passphrase, wrap the passphrase, and write the ~/.ecryptfs/Private.sig.
The system administrator can add the pam_ecryptfs.so module to the PAM stack which will automatically use the login passphrase to unwrap the mount passphrase, add the passphrase to the user's kernel keyring, and automatically perform the mount. See pam_ecryptfs(8).
~/Private - mountpoint containing decrypted data (when mounted)
~/.ecryptfs/Private.sig - file containing signature of mountpoint passphrase
~/.ecryptfs/wrapped-passphrase - mount passphrase, encrypted with the login passphrase
On Debian and Ubuntu systems, the complete text of the GNU General Public License can be found in /usr/share/common-licenses/GPL.
FILES
~/.Private - underlying directory containing encrypted data
AUTHOR
This manpage and the mount.ecryptfs_private utility was written by Dustin Kirkland <kirkland [at] ubuntu.com> for Ubuntu systems (but may be used by others). Permission is granted to copy, distribute and/or modify this document under the terms of the GNU General Public License, Version 2 or any later version published by the Free Software Foundation.
SEE ALSO