Without going into particulars, it suffices to say that Ubuntu 12.04 has the following script that sets up encrypted swap:
ecryptfs-setup-swap
The normal output of this script:
WARNING: An encrypted swap is required to help ensure that encrypted files are not leaked to disk in an unencrypted format. HOWEVER, THE SWAP ENCRYPTION CONFIGURATION PRODUCED BY THIS PROGRAM WILL BREAK HIBERNATE/RESUME ON THIS SYSTEM! NOTE: Your suspend/resume capabilities will not be affected. Do you want to proceed with encrypting your swap? [y/N]: y INFO: Setting up swap: [/dev/sda5] WARNING: Commented out your unencrypted swap from /etc/fstab * Stopping remaining crypto disks... * cryptswap1 (stopped)... [ OK ] * Starting remaining crypto disks... * cryptswap1 (starting).. * cryptswap1 (started)... [ OK ] INFO: Successfully setup encrypted swap!
To ensure that swap is working properly we can do the following:
fdisk -l
It should show something like /dev/mapper/cryptswap1:
Disk /dev/sda: 21.5 GB, 21474836480 bytes 255 heads, 63 sectors/track, 2610 cylinders, total 41943040 sectors Units = sectors of 1 * 512 = 512 bytes Sector size (logical/physical): 512 bytes / 512 bytes I/O size (minimum/optimal): 512 bytes / 512 bytes Disk identifier: 0x00041a2a Device Boot Start End Blocks Id System /dev/sda1 * 2048 40105983 20051968 83 Linux /dev/sda2 40108030 41940991 916481 5 Extended /dev/sda5 40108032 41940991 916480 82 Linux swap / Solaris Disk /dev/mapper/cryptswap1: 938 MB, 938475520 bytes 255 heads, 63 sectors/track, 114 cylinders, total 1832960 sectors Units = sectors of 1 * 512 = 512 bytes Sector size (logical/physical): 512 bytes / 512 bytes I/O size (minimum/optimal): 512 bytes / 512 bytes Disk identifier: 0x6943c31d Disk /dev/mapper/cryptswap1 doesn't contain a valid partition table
Then we can check that changes are automatically applied to /etc/fstab configurations file. It also should contain this /dev/mapper/cryptswap1:
# /etc/fstab: static file system information. # # Use 'blkid -o value -s UUID' to print the universally unique identifier # for a device; this may be used with UUID= as a more robust way to name # devices that works even if disks are added and removed. See fstab(5). # # <file system> <mount point> <type> <options> <dump> <pass> proc /proc proc nodev,noexec,nosuid 0 0 # / was on /dev/sda1 during installation UUID=fcc47f97-2a8a-45e6-a389-15cff216f652 / ext4 errors=remount-ro 0 1 # swap was on /dev/sda5 during installation #UUID=4a885082-3ce6-4725-b536-97706162f6b9 none swap sw 0 0 /dev/fd0 /media/floppy0 auto rw,user,noauto,exec,utf8 0 0 /dev/mapper/cryptswap1 none swap sw 0 0
and unencrypted swap should be commented out.
The same situation with /etc/crypttab:
# <target name> <source device> <key file> <options> cryptswap1 /dev/sda5 /dev/urandom swap,cipher=aes-cbc-essiv:sha256
And finally
free -m
should show corresponding swap size:
total used free shared buffers cached Mem: 495 320 175 0 125 111 -/+ buffers/cache: 82 413 Swap: 894 0 894
below I provided the source code of /usr/bin/ecryptfs-setup-swap script:
#!/bin/sh -e # ecryptfs-setup-swap # Copyright (C) 2008 Canonical Ltd. # # Authors: Dustin Kirkland <kirkland@ubuntu.com> # # This program is free software; you can redistribute it and/or modify # it under the terms of the GNU General Public License as published by # the Free Software Foundation; version 2 of the License. # # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # # You should have received a copy of the GNU General Public License # along with this program. If not, see <http://www.gnu.org/licenses/>. # The cryptswap setup used here follows a guide published at: # * http://ubuntumagnet.com/2007/11/creating-encrypted-swap-file-ubuntu-using-cryptsetup TEXTDOMAIN="ecryptfs-utils" error() { echo `gettext "ERROR:"` "$@" 1>&2 exit 1 } info() { echo `gettext "INFO:"` "$@" } warn() { echo `gettext "WARNING:"` "$@" 1>&2 } usage() { echo echo `gettext "Usage:"` echo " $0 [-f|--force] [-n|--no-reload]" echo exit 1 } # Handle command line options FORCE=0 while [ ! -z "$1" ]; do case "$1" in -f|--force) FORCE=1 shift 1 ;; -n|--no-reload) NO_RELOAD=1 shift 1 ;; *) usage ;; esac done # Ensure that cryptsetup is available [ -x /sbin/cryptsetup ] || error `gettext "Please install"` "'cryptsetup'" # Ensure that we're running with root privileges [ -w /etc/passwd ] || error `gettext "This program must be run with 'sudo', or as root"` # Count swap spaces available if [ $(grep -c "^/" /proc/swaps) -eq 0 ]; then mem=$(grep "^MemTotal:" /proc/meminfo | awk '{print $2}') swapsize=$((4*$mem)) info "You do not currently have any swap space defined." echo echo `gettext "You can create a swap file by doing:"` echo " $ sudo dd if=/dev/zero of=/swapfile count=$swapsize" echo " $ sudo mkswap /swapfile" echo " $ sudo swapon /swapfile" echo echo `gettext "And then re-run"` "$0" echo exit 0 fi swaps=$(grep "^/" /proc/swaps | awk '{print $1}') filtered_swaps=$( for swap in $swaps; do # Make sure this is swap space if [ "$(blkid -o value -s TYPE $swap)" != "swap" ]; then warn "[$swap]" `gettext "does not appear to be swap space, skipping."` continue fi if [ "${swap#/dev/ram}" != "$swap" ] || [ "${swap#/dev/zram}" != "$swap" ]; then warn "[$swap]" `gettext "is a RAM device, skipping."` continue fi # Check if this swap space is already setup for encryption if /sbin/dmsetup table "$swap" 2>/dev/null | grep -qs " crypt "; then warn "[$swap]" `gettext "already appears to be encrypted, skipping."` continue fi base=$(basename "$swap") if grep -qs "^$base.*swap.*cipher" /etc/crypttab 2>/dev/null; then warn "[$swap]" `gettext "already has an entry in /etc/crypttab, skipping."` continue fi if grep -qs "$swap" /etc/initramfs-tools/conf.d/cryptroot 2>/dev/null; then warn "[$swap]" `gettext "already has an entry in /etc/crypttab, skipping."` continue fi echo $swap done ) swaps="$filtered_swaps" if [ -z "$swaps" ]; then warn "There were no usable swap devices to be encrypted. Exiting." exit 0 fi ########################################################################## # Warn the user about breaking hibernate mode if [ "$FORCE" != 1 ]; then echo echo `gettext "WARNING:"` echo `gettext "An encrypted swap is required to help ensure that encrypted files are not leaked to disk in an unencrypted format."` echo echo `gettext "HOWEVER, THE SWAP ENCRYPTION CONFIGURATION PRODUCED BY THIS PROGRAM WILL BREAK HIBERNATE/RESUME ON THIS SYSTEM!"` echo echo `gettext "NOTE: Your suspend/resume capabilities will not be affected."` echo echo -n `gettext "Do you want to proceed with encrypting your swap?"` "[y/N]: " CONFIRM=`head -n1` echo if [ "$CONFIRM" != "y" -a "$CONFIRM" != "Y" ]; then echo info `gettext "Aborting."` echo exit 0 fi fi ########################################################################## i=0 for swap in $swaps; do info `gettext "Setting up swap:"` "[$swap]" uuid=$(blkid -o value -s UUID $swap) for target in "UUID=$uuid" $swap; do if [ -n "$target" ] && grep -qs "^$target " /etc/fstab; then sed -i "s:^$target :\#$target :" /etc/fstab warn "Commented out your unencrypted swap from /etc/fstab" fi done while :; do i=$((i+1)) [ -e "/dev/mapper/cryptswap$i" ] || break done # Add crypttab entry echo "cryptswap$i $swap /dev/urandom swap,cipher=aes-cbc-essiv:sha256" >> /etc/crypttab # Add fstab entry echo "/dev/mapper/cryptswap$i none swap sw 0 0" >> /etc/fstab done if [ "$NO_RELOAD" != 1 ]; then # Turn swap off swapoff -a # Restart cryptdisks /etc/init.d/cryptdisks restart # Turn the swap on swapon -a fi info `gettext "Successfully setup encrypted swap!"`