Retrospectively enabling ZFS encryption

2025-02-23

#zfs

Suppose we have an existing ZFS dataset that was created without encryption, and we’d now like to encrypt it. This is something that can’t be changed once a dataset has been created, so we have to get a little creative.

# Here's our existing dataset in the "main-pool" pool, without encryption:
sudo zfs create main-pool/test-dataset

Establishing a baseline

So we’re working on something consistent, we can either unmount the dataset, or take a snapshot. We’ll do both; the former preventing further changes, and the latter so we can use the full --replicate option later on:

sudo zfs unmount main-pool/test-dataset
sudo zfs snapshot main-pool/test-dataset@encryption-time

Key management

We then need a key, which we’ll choose to store on the host filesystem (rather than require it to be provided interactively when mounting):

sudo openssl rand -hex -out /root/main-pool-test-dataset.key 32

It may be prudent to keep a copy of this somewhere safe, too.

Replicating the dataset

We’ll now use ZFS’s send/receive to create a new dataset with encryption enabled:

sudo zfs send --replicate --verbose \
  main-pool/test-dataset@encryption-time \
  | sudo zfs receive \
  -s \
  -o encryption=on \
  -o keylocation=file:///root/main-pool-test-dataset.key \
  -o keyformat=hex \
  main-pool/encrypted-test-dataset

Dealing with interruptions

Depending on the size of the source dataset and capabilities of the hardware, it may may take a long time to create the encrypted version of the dataset. This process may get interrupted; if so, the -s flag given to zfs receive will have caused a “progress” token to be saved against the new dataset. We can extract that, and resume the zfs send from that point:

# extract the resume token from the target dataset:
token=$(zfs get -o value -H receive_resume_token main-pool/encrypted-test-dataset)

# restart sending the source dataset from that point:
sudo zfs send --verbose -t $token \
  | sudo zfs receive -s main-pool/encrypted-test-dataset

Swapping datasets

Once happy, we can rename the new encrypted version in place of the original:

sudo zfs rename main-pool/test-dataset main-pool/unencrypted-test-dataset
sudo zfs rename main-pool/encrypted-test-dataset main-pool/test-dataset

Reclaiming space

If desired, we can then destroy the unencrypted version of the dataset to release the capacity back to the pool:

sudo zfs destroy -r main-pool/unencrypted-test-dataset

Secure clean up

In order make this a secure erase, we can either:

Further reading

I’ve written separately on automatically mounting encrypted dataset on boot, which is possible here due to the use of a file as the dataset’s keylocation.