Without going into particulars, it suffices to say that Ubuntu 12.04 has the following script that sets up encrypted swap:
ecryptfs-setup-swap
The normal output of this script:
WARNING: An encrypted swap is required to help ensure that encrypted files are not leaked to disk in an unencrypted format. HOWEVER, THE SWAP ENCRYPTION CONFIGURATION PRODUCED BY THIS PROGRAM WILL BREAK HIBERNATE/RESUME ON THIS SYSTEM! NOTE: Your suspend/resume capabilities will not be affected. Do you want to proceed with encrypting your swap? [y/N]: y INFO: Setting up swap: [/dev/sda5] WARNING: Commented out your unencrypted swap from /etc/fstab * Stopping remaining crypto disks... * cryptswap1 (stopped)... [ OK ] * Starting remaining crypto disks... * cryptswap1 (starting).. * cryptswap1 (started)... [ OK ] INFO: Successfully setup encrypted swap!
To ensure that swap is working properly we can do the following:
fdisk -l
It should show something like /dev/mapper/cryptswap1:
Disk /dev/sda: 21.5 GB, 21474836480 bytes 255 heads, 63 sectors/track, 2610 cylinders, total 41943040 sectors Units = sectors of 1 * 512 = 512 bytes Sector size (logical/physical): 512 bytes / 512 bytes I/O size (minimum/optimal): 512 bytes / 512 bytes Disk identifier: 0x00041a2a Device Boot Start End Blocks Id System /dev/sda1 * 2048 40105983 20051968 83 Linux /dev/sda2 40108030 41940991 916481 5 Extended /dev/sda5 40108032 41940991 916480 82 Linux swap / Solaris Disk /dev/mapper/cryptswap1: 938 MB, 938475520 bytes 255 heads, 63 sectors/track, 114 cylinders, total 1832960 sectors Units = sectors of 1 * 512 = 512 bytes Sector size (logical/physical): 512 bytes / 512 bytes I/O size (minimum/optimal): 512 bytes / 512 bytes Disk identifier: 0x6943c31d Disk /dev/mapper/cryptswap1 doesn't contain a valid partition table
Then we can check that changes are automatically applied to /etc/fstab configurations file. It also should contain this /dev/mapper/cryptswap1:
# /etc/fstab: static file system information. # # Use 'blkid -o value -s UUID' to print the universally unique identifier # for a device; this may be used with UUID= as a more robust way to name # devices that works even if disks are added and removed. See fstab(5). # # <file system> <mount point> <type> <options> <dump> <pass> proc /proc proc nodev,noexec,nosuid 0 0 # / was on /dev/sda1 during installation UUID=fcc47f97-2a8a-45e6-a389-15cff216f652 / ext4 errors=remount-ro 0 1 # swap was on /dev/sda5 during installation #UUID=4a885082-3ce6-4725-b536-97706162f6b9 none swap sw 0 0 /dev/fd0 /media/floppy0 auto rw,user,noauto,exec,utf8 0 0 /dev/mapper/cryptswap1 none swap sw 0 0
and unencrypted swap should be commented out.
The same situation with /etc/crypttab:
# <target name> <source device> <key file> <options> cryptswap1 /dev/sda5 /dev/urandom swap,cipher=aes-cbc-essiv:sha256
And finally
free -m
should show corresponding swap size:
total used free shared buffers cached Mem: 495 320 175 0 125 111 -/+ buffers/cache: 82 413 Swap: 894 0 894
below I provided the source code of /usr/bin/ecryptfs-setup-swap script:
#!/bin/sh -e
#    ecryptfs-setup-swap
#    Copyright (C) 2008 Canonical Ltd.
#
#    Authors: Dustin Kirkland <kirkland@ubuntu.com>
#
#    This program is free software; you can redistribute it and/or modify
#    it under the terms of the GNU General Public License as published by
#    the Free Software Foundation; version 2 of the License.
#
#    This program is distributed in the hope that it will be useful,
#    but WITHOUT ANY WARRANTY; without even the implied warranty of
#    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
#    GNU General Public License for more details.
#
#    You should have received a copy of the GNU General Public License
#    along with this program.  If not, see <http://www.gnu.org/licenses/>.
# The cryptswap setup used here follows a guide published at:
#  * http://ubuntumagnet.com/2007/11/creating-encrypted-swap-file-ubuntu-using-cryptsetup
TEXTDOMAIN="ecryptfs-utils"
error() {
    echo `gettext "ERROR:"` "$@" 1>&2
    exit 1
}
info() {
    echo `gettext "INFO:"` "$@"
}
warn() {
    echo `gettext "WARNING:"` "$@" 1>&2
}
usage() {
    echo
    echo `gettext "Usage:"`
    echo "  $0 [-f|--force] [-n|--no-reload]"
    echo
    exit 1
}
# Handle command line options
FORCE=0
while [ ! -z "$1" ]; do
    case "$1" in
        -f|--force)
            FORCE=1
            shift 1
        ;;
        -n|--no-reload)
            NO_RELOAD=1
            shift 1
        ;;
        *)
            usage
        ;;
    esac
done
# Ensure that cryptsetup is available
[ -x /sbin/cryptsetup ] || error `gettext "Please install"` "'cryptsetup'"
# Ensure that we're running with root privileges
[ -w /etc/passwd ] || error `gettext "This program must be run with 'sudo', or as root"`
# Count swap spaces available
if [ $(grep -c "^/" /proc/swaps) -eq 0 ]; then
    mem=$(grep "^MemTotal:" /proc/meminfo | awk '{print $2}')
    swapsize=$((4*$mem))
    info "You do not currently have any swap space defined."
    echo
    echo `gettext "You can create a swap file by doing:"`
    echo " $ sudo dd if=/dev/zero of=/swapfile count=$swapsize"
    echo " $ sudo mkswap /swapfile"
    echo " $ sudo swapon /swapfile"
    echo
    echo `gettext "And then re-run"` "$0"
    echo
    exit 0
fi
swaps=$(grep "^/" /proc/swaps | awk '{print $1}')
filtered_swaps=$(
for swap in $swaps; do
    # Make sure this is swap space
    if [ "$(blkid -o value -s TYPE $swap)" != "swap" ]; then
        warn "[$swap]" `gettext "does not appear to be swap space, skipping."`
        continue
    fi
    
    if [ "${swap#/dev/ram}" != "$swap" ] || [ "${swap#/dev/zram}" != "$swap" ]; then
        warn "[$swap]" `gettext "is a RAM device, skipping."`
        continue
    fi
    # Check if this swap space is already setup for encryption
    if /sbin/dmsetup table "$swap" 2>/dev/null | grep -qs " crypt "; then
        warn "[$swap]" `gettext "already appears to be encrypted, skipping."`
        continue
    fi
    base=$(basename "$swap")
    if grep -qs "^$base.*swap.*cipher" /etc/crypttab 2>/dev/null; then
        warn "[$swap]" `gettext "already has an entry in /etc/crypttab, skipping."`
        continue
    fi
    if grep -qs "$swap" /etc/initramfs-tools/conf.d/cryptroot 2>/dev/null; then
        warn "[$swap]" `gettext "already has an entry in /etc/crypttab, skipping."`
        continue
    fi
    echo $swap
done
)
swaps="$filtered_swaps"
if [ -z "$swaps" ]; then
    warn "There were no usable swap devices to be encrypted.  Exiting."
    exit 0
fi
##########################################################################
# Warn the user about breaking hibernate mode
if [ "$FORCE" != 1 ]; then
    echo
    echo `gettext "WARNING:"`
    echo `gettext "An encrypted swap is required to help ensure that encrypted files are not leaked to disk in an unencrypted format."`
    echo
    echo `gettext "HOWEVER, THE SWAP ENCRYPTION CONFIGURATION PRODUCED BY THIS PROGRAM WILL BREAK HIBERNATE/RESUME ON THIS SYSTEM!"`
    echo
    echo `gettext "NOTE: Your suspend/resume capabilities will not be affected."`
    echo
    echo -n `gettext "Do you want to proceed with encrypting your swap?"` "[y/N]: "
    CONFIRM=`head -n1`
    echo
    if [ "$CONFIRM" != "y" -a "$CONFIRM" != "Y" ]; then
        echo
        info `gettext "Aborting."`
        echo
        exit 0
    fi
fi
##########################################################################
i=0
for swap in $swaps; do
    info `gettext "Setting up swap:"` "[$swap]"
    uuid=$(blkid -o value -s UUID $swap)
    for target in "UUID=$uuid" $swap; do
        if [ -n "$target" ] && grep -qs "^$target " /etc/fstab; then
            sed -i "s:^$target :\#$target :" /etc/fstab
            warn "Commented out your unencrypted swap from /etc/fstab"
        fi
    done
    while :; do
        i=$((i+1))
        [ -e "/dev/mapper/cryptswap$i" ] || break
    done
    # Add crypttab entry
    echo "cryptswap$i $swap /dev/urandom swap,cipher=aes-cbc-essiv:sha256" >> /etc/crypttab
    # Add fstab entry
    echo "/dev/mapper/cryptswap$i none swap sw 0 0" >> /etc/fstab
done
if [ "$NO_RELOAD" != 1 ]; then
    # Turn swap off
    swapoff -a
    # Restart cryptdisks
    /etc/init.d/cryptdisks restart
    # Turn the swap on
    swapon -a
fi
info `gettext "Successfully setup encrypted swap!"`
						
