Drive Badger is able to automatically detect and decrypt VeraCrypt-encrypted partitions, but only system partitions. It doesn't support non-system partitions or other VeraCrypt authentication methods: PIN, or keyfiles.
See keys-veracrypt-demo repository. It contains a sample veracrypt.keys
file.
You can configure multiple such repositories - each such repository should:
/opt/drivebadger/config/keys-veracrypt-yourchosenname
local directory on your Drive Badger persistent partitionveracrypt.keys
file with proper contents (see below)Local directory doesn't need to contain .git
subdirectory, in fact it can be just "floating" directory (created by hand or script, without repository). However if it does, then you can update it automatically using /opt/drivebadger/update.sh
(in just 1 step for all repositories).
If you have decryption keys associated (directly or indirectly) with particular drive serial numbers, you can save such keys in keys directory.
If you have any additional useful information about particular keys, allowing you to split them in some way (eg. into cities, buildings, floors, company departments, employee specialties) into smaller groups, you can try:
veracrypt.keys
file formatveracrypt.keys
file can contain:
#
sign (without leading spaces)Example veracrypt.keys
file:
# laptop password
MyFancyPassword
# desktop password
MyVCBootPassword123
As opposed to other encryption schemes, VeraCrypt encrypted partitions are not detected by systemd
/udevd
and not accessible via UUID. Therefore, they are detected in a special way, after processing all partitions that have assigned UUID:
veracrypt.keys
files