luks-nuker -- shredder for encrypted volumes.

Add support to a password that nukes your cryptsetup everywhere you want.

If you installed luks-nuker from a package it's likely that you only need
to edit a few options in a config file provided with the package. In this
case you can harmlessly skip this README and go to the config.

Building.

Dependencies:
 - libcrypt for hashes;
 - libblkid for find block devices by UUID and LABEL;

Just call:

$ make

From the root directory of the project.

You can set default config path for nuker using a DEFAULT_NUKER_CONFIG_PATH
macro.

For development purpose you can call 'make' directly from src/ directory.

Install.

$ make install

That installs "luks-nuker" binary and "luks-nuker.conf".

Usage: luks-nuker --redirect [OPTIONS] | cryptsetup
       luks-nuker --direct --cryptsetup-args [CS_ARGS]
    -h --help                      print this message
    -c --config CONFIG             read config from file
    -p --partition PARTITION       partition to nuke
    --hash HASH                    nuker hash in crypt(5)
    --no-action                    don't nuke
    -r --redirect                  redirect mode
    -d --direct                    direct mode
    --cryptsetup-args CS_ARGS      cryptsetup arguments
    --stderr-log-level LEVEL       set stderr logging level
    --log-file-level LEVEL         set file logging level
    --log-file-path LEVEL          set path to log file
logging levels: disabled|quiet|normal|verbose|debug

Command-line options always have precedence over config options, thus
recommend to set static parameters over command line.

After installation follow the instruction from "luks-nuker.conf", but
before any experiments make a backup cryptsetup-luksHeaderBackup(8).
