It sounds like you have a regular partition (maybe EXT4 format) inside of an encrypted volume.
I have a bunch of these. Here’s an example of how I set one of them up to auto mount.
I make an entry in /etc/crypttab
to tell the OS to open the encrypted volume on boot.
storage_003_cryptpart UUID=4be15e12-fd47-34e1-7abf-f2b265b34e31 /etc/luks-keys/storage_003_cryptpart luks,auto
/etc/luks-keys/storage_003_cryptpart
is a file that contains nothing but the key (passphrase) for the encrypted volume. I keep that readable only by root
and it’s in the main encrypted volume so it can’t be read unless the machine is up and running.
Then I have an entry in /etc/fstab
that tells it to auto mount the EXT4 partition inside of that encrypted volume.
UUID=3373a107-ede9-4f17-d0f3-229a38c52e2e /media/storage_003 ext4 user,auto,noatime,rw,exec 0 0
To get the UUID of your encrypted volumes and regular partitions enter lsblk -f
For that drive lsblk -f
shows this:
sdb
└─sdb1 crypto_LUKS 2 4be15e12-fd47-34e1-7abf-f2b265b34e31
└─storage_003_cryptpart ext4 1.0 3373a107-ede9-4f17-d0f3-229a38c52e2e 3.4T 48% /media/storage_003
The UUID next to crypto_LUKS2
goes in /etc/crypttab
. The UUID next to ext4
is used in /etc/fstab
.
(post is archived)