diff options
| -rw-r--r-- | Documentation/MANPAGE.md | 102 | 
1 files changed, 52 insertions, 50 deletions
| diff --git a/Documentation/MANPAGE.md b/Documentation/MANPAGE.md index 4fa155a..a7d3d8b 100644 --- a/Documentation/MANPAGE.md +++ b/Documentation/MANPAGE.md @@ -1,6 +1,6 @@  % GOCRYPTFS(1)  % github.com/rfjakob -% May 2016 +% Oct 2016  NAME  ==== @@ -32,14 +32,14 @@ Options:  **-aessiv**  :	Use the AES-SIV encryption mode. This is slower than GCM but is -secure with deterministic nonces as used in "-reverse" mode. +	secure with deterministic nonces as used in "-reverse" mode.  **-allow_other**  :	By default, the Linux kernel prevents any other user (even root) to -access a mounted FUSE filesystem. Settings this option allows access for -other users, subject to file permission checking. Only works if -user_allow_other is set in /etc/fuse.conf. This option is equivalent to -"allow_other" plus "default_permissions" described in fuse(8). +	access a mounted FUSE filesystem. Settings this option allows access for +	other users, subject to file permission checking. Only works if +	user_allow_other is set in /etc/fuse.conf. This option is equivalent to +	"allow_other" plus "default_permissions" described in fuse(8).  **-config string**  :	Use specified config file instead of CIPHERDIR/gocryptfs.conf @@ -52,9 +52,9 @@ user_allow_other is set in /etc/fuse.conf. This option is equivalent to  **-extpass string**  :	Use an external program (like ssh-askpass) for the password prompt. -The program should return the password on stdout, a trailing newline is -stripped by gocryptfs. Using something like "cat /mypassword.txt" allows -to mount the gocryptfs filesytem without user interaction. +	The program should return the password on stdout, a trailing newline is +	stripped by gocryptfs. Using something like "cat /mypassword.txt" allows +	to mount the gocryptfs filesytem without user interaction.  **-f**  :	Stay in the foreground instead of forking away. Implies "-nosyslog". @@ -66,67 +66,68 @@ to mount the gocryptfs filesytem without user interaction.  :	Initialize encrypted directory  **-ko** -: Pass additonal mount options to the kernel (comma-separated list). -FUSE filesystems are mounted with "nodev,nosuid" by default. If gocryptfs -runs as root, you can enable device files by passing the opposite mount option, -"dev", and if you want to enable suid-binaries, pass "suid". -"ro" (equivalent to passing the "-ro" option) and "noexec" may also be -interesting. For a complete list see the section -`FILESYSTEM-INDEPENDENT MOUNT OPTIONS` in mount(8). +:	Pass additonal mount options to the kernel (comma-separated list). +	FUSE filesystems are mounted with "nodev,nosuid" by default. If gocryptfs +	runs as root, you can enable device files by passing the opposite mount option, +	"dev", and if you want to enable suid-binaries, pass "suid". +	"ro" (equivalent to passing the "-ro" option) and "noexec" may also be +	interesting. For a complete list see the section +	`FILESYSTEM-INDEPENDENT MOUNT OPTIONS` in mount(8).  **-longnames**  :	Store names longer than 176 bytes in extra files (default true) -This flag is useful when recovering old gocryptfs filesystems using -"-masterkey". It is ignored (stays at the default) otherwise. +	This flag is useful when recovering old gocryptfs filesystems using +	"-masterkey". It is ignored (stays at the default) otherwise.  **-masterkey string**  :	Use a explicit master key specified on the command line. This -option can be used to mount a gocryptfs filesystem without a config file. -Note that the command line, and with it the master key, is visible to -anybody on the machine who can execute "ps -auxwww". -This is meant as a recovery option for emergencies, such as if you have -forgotten your password. +	option can be used to mount a gocryptfs filesystem without a config file. +	Note that the command line, and with it the master key, is visible to +	anybody on the machine who can execute "ps -auxwww". +	This is meant as a recovery option for emergencies, such as if you have +	forgotten your password. -	Example master key: 6f717d8b-6b5f8e8a-fd0aa206-778ec093-62c5669b-abd229cd-241e00cd-b4d6713d +	Example master key:   +	6f717d8b-6b5f8e8a-fd0aa206-778ec093-62c5669b-abd229cd-241e00cd-b4d6713d  **-memprofile string** -:	Write memory profile to specified file. This is useful when debugging -memory usage of gocryptfs. +:	Write memory profile to the specified file. This is useful when debugging +	memory usage of gocryptfs.  **-nonempty**  :	Allow mounting over non-empty directories. FUSE by default disallows -this to prevent accidential shadowing of files. +	this to prevent accidential shadowing of files.  **-nosyslog**  :	Diagnostic messages are normally redirected to syslog once gocryptfs -daemonizes. This option disables the redirection and messages will -continue be printed to stdout and stderr. +	daemonizes. This option disables the redirection and messages will +	continue be printed to stdout and stderr.  **-notifypid int**  :	Send USR1 to the specified process after successful mount. This is -used internally for daemonization. +	used internally for daemonization.  **-openssl bool/"auto"**  :	Use OpenSSL instead of built-in Go crypto (default "auto"). Using -built-in crypto is 4x slower unless your CPU has AES instructions and -you are using Go 1.6+. In mode "auto", gocrypts chooses the faster -option. +	built-in crypto is 4x slower unless your CPU has AES instructions and +	you are using Go 1.6+. In mode "auto", gocrypts chooses the faster +	option.  **-passfile string**  :	Read password from the specified file. This is a shortcut for -specifying "-extpass /bin/cat FILE". +	specifying "-extpass /bin/cat FILE".  **-passwd**  :	Change the password. Will ask for the old password, check if it is -correct, and ask for a new one. +	correct, and ask for a new one.  	This can be used together with `-masterkey` if -you forgot the password but know the master key. Note that without the -old password, gocryptfs cannot tell if the master key is correct and will -overwrite the old one without mercy. It will, however, create a backup copy -of the old config file as `gocryptfs.conf.bak`. Delete it after -you have verified that you can access your files with the -new password. +	you forgot the password but know the master key. Note that without the +	old password, gocryptfs cannot tell if the master key is correct and will +	overwrite the old one without mercy. It will, however, create a backup copy +	of the old config file as `gocryptfs.conf.bak`. Delete it after +	you have verified that you can access your files with the +	new password.  **-plaintextnames**  :	Do not encrypt file names and symlink targets @@ -136,33 +137,34 @@ new password.  **-reverse**  :	Reverse mode shows a read-only encrypted view of a plaintext -directory. Implies "-aessiv". +	directory. Implies "-aessiv".  **-ro**  :	Mount the filesystem read-only  **-scryptn int**  :	scrypt cost parameter logN. Setting this to a lower value speeds up -mounting but makes the password susceptible to brute-force attacks (default 16) +	mounting but makes the password susceptible to brute-force attacks +	(default 16)  **-version** -:	Print version and exit. The output contains three fields seperated by -";". Example: "gocryptfs v0.12-2; go-fuse a4c968c; go1.6.2". -Field 1 is the gocryptfs version, field 2 is the version of the go-fuse -library, field 3 is the Go version that was used to compile the binary. +:	Print version and exit. The output contains three fields seperated by ";". +	Example: "gocryptfs v0.12-2; go-fuse a4c968c; go1.6.2". +	Field 1 is the gocryptfs version, field 2 is the version of the go-fuse +	library, field 3 is the Go version that was used to compile the binary.  **-wpanic**  :	When encountering a warning, panic and exit immediately. This is -useful in regression testing. +	useful in regression testing.  **-zerokey**  :	Use all-zero dummy master key. This options is only intended for -automated testing as it does not provide any security. +	automated testing as it does not provide any security.  Comma-Separated-Options: -For compatability with mount(1), options are also accepted as +For compatibility with mount(1), options are also accepted as  "-o COMMA-SEPARATED-OPTIONS" at the end of the command line.  For example, "-o q,zerokey" is equivalent to "-q -zerokey". | 
