From cb6a2dd710bc636d7eb6749f2681cadc1004aa76 Mon Sep 17 00:00:00 2001
From: rfjakob
Date: Sun, 9 Oct 2016 21:16:10 +0200
Subject: Created Mounting on login using pam_mount (markdown)
---
Mounting-on-login-using-pam_mount.md | 79 ++++++++++++++++++++++++++++++++++++
1 file changed, 79 insertions(+)
create mode 100644 Mounting-on-login-using-pam_mount.md
(limited to 'Mounting-on-login-using-pam_mount.md')
diff --git a/Mounting-on-login-using-pam_mount.md b/Mounting-on-login-using-pam_mount.md
new file mode 100644
index 0000000..483708d
--- /dev/null
+++ b/Mounting-on-login-using-pam_mount.md
@@ -0,0 +1,79 @@
+Mounting gocryptfs on login using pam_mount
+===========================================
+
+This works on Fedora 24 with active SELinux. Feedback on other platforms
+is welcome.
+
+gocryptfs
+---------
+
+Copy the `gocryptfs` binary and `gocryptfs_pam_mount.bash` into
+`/usr/local/bin` .
+
+The bash wrapper is neccessary because of the different calling
+conventions between pam_mount and gocryptfs.
+
+Create a gocryptfs filesystem:
+```
+$ mkdir /home/testuser/cipher /home/testuser/plain
+$ gocryptfs -init /home/testuser/cipher
+```
+
+pam_mount config
+----------------
+
+Put the following into `/etc/security/pam_mount.conf.xml`, just before
+the closing `` tag at the bottom:
+
+```
+
+```
+
+Replace `testuser` with your user name.
+
+If you want to disable the display of the masterkey on mount, replace
+`options="defaults"` with `options="quiet"`.
+
+PAM config
+----------
+
+An example `/etc/pam.d/login` on Fedora 24 is shown below. pam_mount
+MUST be called AFTER `pam_selinux.so open` because that puts us in the
+right SELinux context. If are logging in via gcm, also add the line in
+`/etc/pam.d/gdm-password`.
+
+```
+#%PAM-1.0
+auth substack system-auth
+auth include postlogin
+account required pam_nologin.so
+account include system-auth
+password include system-auth
+session required pam_selinux.so close
+session required pam_loginuid.so
+session optional pam_console.so
+session required pam_selinux.so open
+session required pam_namespace.so
+# vvv insert pam_mount here
+session optional pam_mount.so
+# ^^^ insert pam_mount here
+session optional pam_keyinit.so force revoke
+session include system-auth
+session include postlogin
+-session optional pam_ck_connector.so
+```
+
+Encrypting the whole home directory
+-----------------------------------
+
+Use this volume definition in `/etc/security/pam_mount.conf.xml`:
+
+```
+
+```
+
+Replace `testuser-whole-home` with your user name.
\ No newline at end of file
--
cgit v1.2.3