Check encrypted devices with lsblk -f
In this step, we will start exploring encrypted devices on a Linux system. Understanding how to identify encrypted partitions is crucial for system administration and security.
We will use the lsblk
command with the -f
option. The lsblk
command lists block devices (like hard drives and partitions). The -f
option adds information about the filesystem and, importantly for us, encryption.
Open your terminal if it's not already open. You can find the Xfce Terminal icon on the left side of your desktop.
Type the following command and press Enter:
lsblk -f
You will see output similar to this:
NAME FSTYPE FSVER LABEL UUID FSAVAIL FSUSE% MOUNTPOINTS
loop0 squashfs 4.0 0 100% /snap/bare/5
loop1 squashfs 4.0 0 100% /snap/core20/2182
loop2 squashfs 4.0 0 100% /snap/core22/1122
loop3 squashfs 4.0 0 100% /snap/firefox/437
loop4 squashfs 4.0 0 100% /snap/gnome-3-38-2004/140
loop5 squashfs 4.0 0 100% /snap/gtk-common-themes/1535
loop6 squashfs 4.0 0 100% /snap/htop/3620
loop7 squashfs 4.0 0 100% /snap/snapd/20671
loop8 squashfs 4.0 0 100% /snap/snapd-desktop-integration/83
sda
├─sda1 vfat FAT32 <UUID> 505.4M 0% /boot/efi
├─sda2 ext4 1.0 <UUID> 1.4G 68% /boot
└─sda3 crypto_LUKS 2 <UUID>
└─sda3_crypt
ext4 1.0 <UUID> 16.4G 11% /
Look for the FSTYPE
column. If you see crypto_LUKS
listed for a partition (like sda3
in the example above), it indicates that this partition is encrypted using LUKS (Linux Unified Key Setup).
The line below the crypto_LUKS
entry (e.g., └─sda3_crypt
) shows the decrypted device name that is created when the partition is unlocked. This decrypted device is then typically formatted with a standard filesystem like ext4
and mounted (e.g., at /
).
Identifying partitions with crypto_LUKS
is the first step in understanding the encryption setup on a Linux system.
Click Continue to proceed to the next step.