{"id":8512,"date":"2021-04-02T10:45:00","date_gmt":"2021-04-02T07:45:00","guid":{"rendered":"https:\/\/kifarunix.com\/?p=8512"},"modified":"2024-03-19T08:30:34","modified_gmt":"2024-03-19T05:30:34","slug":"encrypt-drives-with-luks-in-linux","status":"publish","type":"post","link":"https:\/\/kifarunix.com\/encrypt-drives-with-luks-in-linux\/","title":{"rendered":"Encrypt Drives with LUKS in Linux"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1048\" height=\"591\" src=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2023\/12\/encrypt-drived-with-LUKs-Linux.png?v=1702918796\" alt=\"Encrypt Drives with LUKS in Linux\" class=\"wp-image-19698\" title=\"\" srcset=\"https:\/\/kifarunix.com\/wp-content\/uploads\/2023\/12\/encrypt-drived-with-LUKs-Linux.png?v=1702918796 1048w, https:\/\/kifarunix.com\/wp-content\/uploads\/2023\/12\/encrypt-drived-with-LUKs-Linux-768x433.png?v=1702918796 768w\" sizes=\"(max-width: 1048px) 100vw, 1048px\" \/><\/figure>\n\n\n\n<p>In this tutorial, you will learn how to encrypt drives with LUKS in Linux. LUKS, the Linux Unified Key Setup, is a standard for disk encryption. It adds a standardized header at the start of the device, a key-slot area directly behind the header and the bulk data area behind that. The whole set is called a &#8216;<strong><code>LUKS container<\/code><\/strong>&#8216;. The device that a LUKS container resides on is called a &#8216;<code><strong>LUKS device<\/strong><\/code>&#8216;.<\/p>\n\n\n\n<div class=\"wp-block-rank-math-toc-block\" id=\"rank-math-toc\"><h2>Table of Contents<\/h2><nav><ul><li><a href=\"#encrypting-drives-with-luks-in-linux\">Encrypting Drives with LUKS in Linux<\/a><ul><li><a href=\"#the-d-os-and-don-ts-of-luks\">The DOs and DON&#8217;Ts of LUKS<\/a><\/li><li><a href=\"#install-cryptsetup-utility\">Install cryptsetup Utility<\/a><\/li><li><a href=\"#create-a-block-device-to-encrypt-with-luks\">Create a Block Device to Encrypt with LUKS<\/a><\/li><li><a href=\"#format-the-device-with-luks\">Format the Device with LUKS<\/a><\/li><li><a href=\"#display-luks-device-header-information\">Display LUKS Device Header Information<\/a><\/li><li><a href=\"#obtain-the-uuid-of-luks-device\">Obtain the UUID of LUKS Device<\/a><\/li><li><a href=\"#mounting-luks-encrypted-device-in-linux\">Mounting LUKS Encrypted Device in Linux<\/a><ul><li><a href=\"#create-luks-drive-device-mapping\">Create LUKS Drive Device Mapping<\/a><\/li><li><a href=\"#create-filesystem-on-luks-device\">Create Filesystem on LUKS Device<\/a><\/li><li><a href=\"#mounting-luks-device-in-linux\">Mounting LUKS Device in Linux<\/a><\/li><li><a href=\"#close-luks-device\">Close LUKS Device<\/a><\/li><\/ul><\/li><li><a href=\"#other-tutorials\">Other Tutorials<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"encrypting-drives-with-luks-in-linux\">Encrypting Drives with LUKS in Linux<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"the-d-os-and-don-ts-of-luks\">The DOs and DON&#8217;Ts of LUKS<\/h3>\n\n\n\n<p>According to <a aria-label=\"Fedora Docs (opens in a new tab)\" href=\"https:\/\/docs.fedoraproject.org\/en-US\/quick-docs\/encrypting-drives-using-LUKS\/\" target=\"_blank\" rel=\"noreferrer noopener\" class=\"rank-math-link\">Fedora Docs<\/a>, below are the DOs and DON&#8217;Ts of LUKS;<\/p>\n\n\n\n<p>DOs;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><em>LUKS encrypts entire block devices and is therefore well-suited for protecting the contents of mobile devices such as removable storage media or laptop disk drives.<\/em><\/li>\n\n\n\n<li><em>The underlying contents of the encrypted block device are arbitrary. This makes it useful for encrypting&nbsp;<code>swap<\/code>&nbsp;devices. This can also be useful with certain databases that use specially formatted block devices for data storage.<\/em><\/li>\n\n\n\n<li><em>LUKS uses the existing device mapper kernel subsystem.<\/em><\/li>\n\n\n\n<li><em>LUKS provides passphrase strengthening which protects against dictionary attacks.<\/em><\/li>\n\n\n\n<li><em>LUKS devices contain multiple key slots, allowing users to add backup keys or passphrases<\/em>.<\/li>\n<\/ul>\n\n\n\n<p>DON&#8217;Ts;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><em>LUKS is not well-suited for applications requiring more than eight users to have distinct access keys to the same device.<\/em><\/li>\n\n\n\n<li><em>LUKS is not well-suited for applications requiring file-level encryption.<\/em><\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"install-cryptsetup-utility\">Install cryptsetup Utility<\/h3>\n\n\n\n<p><code><strong>cryptsetup<\/strong><\/code> is a utility that is used to manage LUKS encrypted volumes. Therefore, you need to install this package;<\/p>\n\n\n\n<p>On Ubuntu\/Debian systems, run the command below to install <code><strong>cryptsetup<\/strong><\/code> utility.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">apt install cryptsetup<\/pre>\n\n\n\n<p>On CentOS and similar derivatives, simply run the command below;<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">yum install cryptsetup<\/pre>\n\n\n\n<p>For any other distro, consult your specific distro package manager on how to install cryptsetup utility.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"create-a-block-device-to-encrypt-with-luks\">Create a Block Device to Encrypt with LUKS<\/h3>\n\n\n\n<p>You can encrypt the entire root partition (easily done during initial system install), specific partition, a logical volume or RAID device with LUKS.<\/p>\n\n\n\n<p>In this guide, we already created a partition, <code><strong>\/dev\/sdb1<\/strong><\/code> and this is what we will use as an example.<\/p>\n\n\n\n<p>To list the block devices on the system, simply run <code><strong>lsblk<\/strong><\/code> command.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">lsblk<\/pre>\n\n\n\n<pre class=\"scroll-box\"><code>NAME   MAJ:MIN RM  SIZE RO TYPE MOUNTPOINT\nsda      8:0    0   15G  0 disk \n\u251c\u2500sda1   8:1    0   13G  0 part \/\n\u251c\u2500sda2   8:2    0    1K  0 part \n\u2514\u2500sda5   8:5    0    2G  0 part [SWAP]\n<strong>sdb      8:16   0    4G  0 disk \n\u2514\u2500sdb1   8:17   0    4G  0 part<\/strong>\n<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"format-the-device-with-luks\">Format the Device with LUKS<\/h3>\n\n\n\n<p>Once you have created a device, you need to initialize the device as a LUKS partition and sets the initial passphrase (for key-slot 0). To do this, you can use the <code><strong>luksFormat<\/strong><\/code> option for the <strong><code>cryptsetup<\/code><\/strong> command in the format below;<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>cryptsetup &#91;OPTION] luksFormat &lt;device&gt;<\/code><\/pre>\n\n\n\n<p>So for example, to encrypt the <code><strong>\/dev\/sdb1<\/strong><\/code> partition above, with LUKS key, you would run the command below;<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">cryptsetup -y -v luksFormat \/dev\/sdb1<\/pre>\n\n\n\n<p>Note that this command overwrites any data on the disk, hence, if it an already used drive, ensure you back up your data.<\/p>\n\n\n\n<p>When command runs you are prompted to<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>confirm that  formatting,<\/li>\n\n\n\n<li>enter and confirm the passphrase (for the first key slot (0), if the drive had no other passphrase already).<\/li>\n<\/ul>\n\n\n\n<pre class=\"scroll-box\"><code>WARNING!\n========\nThis will overwrite data on \/dev\/sdb1 irrevocably.\n\nAre you sure? (Type uppercase yes): YES\nEnter passphrase for \/dev\/sdb1: \nVerify passphrase: \nKey slot 0 created.\nCommand successful.\n<\/code><\/pre>\n\n\n\n<p><strong>NOTE: The passphrase is not recoverable if lost, so keep it safe and do not forget it.<\/strong><\/p>\n\n\n\n<p>If you do not want to be prompted for passphrase, then you can use key file instead.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">echo \"mypassphrase\" &gt; ~\/luks-key<\/pre>\n\n\n\n<p>Next, you can specify a path to the file containing your phrase on command line as;<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">cryptsetup -y -v luksFormat \/dev\/sdb1 ~\/luks-key<\/pre>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"display-luks-device-header-information\">Display LUKS Device Header Information<\/h3>\n\n\n\n<p>To view the details of the LUKS device, you can use the <code><strong>luksDump<\/strong><\/code> LUKS action;<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">cryptsetup luksDump \/dev\/sdb1<\/pre>\n\n\n\n<pre class=\"scroll-box\"><code>LUKS header information\nVersion:       \t2\nEpoch:         \t3\nMetadata area: \t16384 [bytes]\nKeyslots area: \t16744448 [bytes]\nUUID:          \t242c24d8-ac65-413d-b3a2-eb7f2f0993b0\nLabel:         \t(no label)\nSubsystem:     \t(no subsystem)\nFlags:       \t(no flags)\n\nData segments:\n  0: crypt\n\toffset: 16777216 [bytes]\n\tlength: (whole device)\n\tcipher: aes-xts-plain64\n\tsector: 512 [bytes]\n\nKeyslots:\n  0: luks2\n\tKey:        512 bits\n\tPriority:   normal\n\tCipher:     aes-xts-plain64\n\tCipher key: 512 bits\n\tPBKDF:      argon2i\n\tTime cost:  4\n\tMemory:     1003317\n\tThreads:    2\n\tSalt:       b3 c8 b0 69 db 38 cb bd 1c 58 d0 a2 8a b8 92 12 \n\t            05 47 ca dd c7 3d dd 94 c0 f7 51 04 12 fb 3a 56 \n\tAF stripes: 4000\n\tAF hash:    sha256\n\tArea offset:32768 [bytes]\n\tArea length:258048 [bytes]\n\tDigest ID:  0\nTokens:\nDigests:\n  0: pbkdf2\n\tHash:       sha256\n\tIterations: 133338\n\tSalt:       e1 9b 70 5e 87 25 46 d6 08 20 43 60 6c ae 2c 06 \n\t            42 fa 61 32 f0 fc ca 5f 10 f9 3d 63 dd 22 a4 96 \n\tDigest:     e9 62 ab 83 4c 3c 81 88 52 08 42 9b 47 c2 e1 b6 \n\t            d5 8a 59 88 5c 17 02 54 c4 89 36 7e 5f e0 f5 ec\n<\/code><\/pre>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"obtain-the-uuid-of-luks-device\">Obtain the UUID of LUKS Device<\/h3>\n\n\n\n<p>If you want to easily get the UUID of the LUKS device, use the <code><strong>luksUUID<\/strong><\/code> action;<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">cryptsetup luksUUID \/dev\/sdb1<\/pre>\n\n\n\n<p>This should print the UUID which matches the one from the luksDump output, <code>242c24d8-ac65-413d-b3a2-eb7f2f0993b0<\/code>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"mounting-luks-encrypted-device-in-linux\">Mounting LUKS Encrypted Device in Linux<\/h3>\n\n\n\n<p>Now that you have encrypted your drive\/device with LUKS, it has to be mounted in order for you to access and store content in it.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"create-luks-drive-device-mapping\">Create LUKS Drive Device Mapping<\/h4>\n\n\n\n<p>Device mapping is a generic way to provide virtual block devices which you will then create a filesystem on it and mount it to access your encrypted drive to store data.<\/p>\n\n\n\n<p>To create a device mapping for the LUKS encrypted drive, you can use such a command;<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">cryptsetup luksOpen &lt;device&gt; &lt;name&gt;<\/pre>\n\n\n\n<p>Where:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>&lt;device&gt; is the device you just set LUKS encryption on, like \/dev\/sdb1. You can also use device UUID instead of device drive number.<\/li>\n\n\n\n<li>&lt;name&gt; is a unique name you can assign to the mapped virtual block device. This will be listed as <code><strong>\/dev\/mapper\/&lt;name&gt;<\/strong><\/code>. To cerate a unique name, you can you can use <strong><code>luks-UUID<\/code><\/strong>, where UUID is obtained above.<\/li>\n<\/ul>\n\n\n\n<p>See example below;<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">cryptsetup luksOpen \/dev\/sdb1 luks-242c24d8-ac65-413d-b3a2-eb7f2f0993b0<\/pre>\n\n\n\n<p>If you used a key file while formatting the device, then you can specify the use of the same key file as follows;<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">cryptsetup luksOpen \/dev\/sdb1 luks-242c24d8-ac65-413d-b3a2-eb7f2f0993b0 --key-file ~\/luks-key<\/pre>\n\n\n\n<p>If you want, you can use device UUID;<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>blkid | grep sdb1<\/code><\/pre>\n\n\n\n<p>Sample output;<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>\/dev\/sda1: UUID=\"242c24d8-ac65-413d-b3a2-eb7f2f0993b0\" TYPE=\"crypto_LUKS\" PARTUUID=\"22d456fe-9bc7-2f45-9eee-cfa50653606b\"<\/code><\/pre>\n\n\n\n<p>So, you can run;<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>cryptsetup luksOpen \/dev\/disk\/by-uuid\/242c24d8-ac65-413d-b3a2-eb7f2f0993b0 luks-242c24d8-ac65-413d-b3a2-eb7f2f0993b0<\/code><\/pre>\n\n\n\n<p>This creates a virtual block device as;<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">\/dev\/mapper\/luks-242c24d8-ac65-413d-b3a2-eb7f2f0993b0<\/pre>\n\n\n\n<p>You can list device mappers using the <code><strong>dmsetup<\/strong><\/code> command;<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">dmsetup ls<\/pre>\n\n\n\n<pre class=\"wp-block-code\"><code>luks-242c24d8-ac65-413d-b3a2-eb7f2f0993b0\t(254:0)<\/code><\/pre>\n\n\n\n<p>You can also check the status of the virtual block device using the command <code><strong>cryptsetup -v status &lt;name&gt;<\/strong><\/code>.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">cryptsetup -v status luks-242c24d8-ac65-413d-b3a2-eb7f2f0993b0<\/pre>\n\n\n\n<pre class=\"scroll-box\"><code>\/dev\/mapper\/luks-242c24d8-ac65-413d-b3a2-eb7f2f0993b0 is active.\n  type:    LUKS2\n  cipher:  aes-xts-plain64\n  keysize: 512 bits\n  key location: keyring\n  device:  \/dev\/sdb1\n  sector size:  512\n  offset:  32768 sectors\n  size:    8353792 sectors\n  mode:    read\/write\nCommand successful.\n<\/code><\/pre>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"create-filesystem-on-luks-device\">Create Filesystem on LUKS Device<\/h4>\n\n\n\n<p>So now that you have a virtual block device for your LUKS encrypted drive, you need to now create a filesystem on it to enable you mount and use the device.<\/p>\n\n\n\n<p>The command below creates an EXT4 filesystem type on our LUKS device.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">mkfs.ext4 \/dev\/mapper\/luks-242c24d8-ac65-413d-b3a2-eb7f2f0993b0<\/pre>\n\n\n\n<pre class=\"scroll-box\"><code>mke2fs 1.44.5 (15-Dec-2018)\nCreating filesystem with 1044224 4k blocks and 261120 inodes\nFilesystem UUID: e940b45b-dbc8-4c40-aaa5-9acf9fcb2119\nSuperblock backups stored on blocks: \n\t32768, 98304, 163840, 229376, 294912, 819200, 884736\n\nAllocating group tables: done                            \nWriting inode tables: done                            \nCreating journal (16384 blocks): done\nWriting superblocks and filesystem accounting information: done\n<\/code><\/pre>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"mounting-luks-device-in-linux\">Mounting LUKS Device in Linux<\/h4>\n\n\n\n<p>You can now mount the device using <strong><code>mount<\/code><\/strong> command, or put an entry in <code><strong>\/etc\/fstab<\/strong><\/code> file for auto mounting during system boot.<\/p>\n\n\n\n<p>You can create a path to mount location, for example, we want to mount it on <code>\/mnt<\/code> in our case.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">mkdir \/mnt\/luks-242c24d8<\/pre>\n\n\n\n<p>To mount the device;<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">mount \/dev\/mapper\/luks-242c24d8-ac65-413d-b3a2-eb7f2f0993b0 \/mnt\/luks-242c24d8\/<\/pre>\n\n\n\n<p>Listing the mounted devices;<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">df -hT<\/pre>\n\n\n\n<pre class=\"scroll-box\"><code>Filesystem     Type      Size  Used Avail Use% Mounted on\nudev           devtmpfs  984M     0  984M   0% \/dev\ntmpfs          tmpfs     200M  3.1M  197M   2% \/run\n\/dev\/sda1      ext4       13G  3.6G  8.5G  30% \/\ntmpfs          tmpfs     998M  8.0K  998M   1% \/dev\/shm\ntmpfs          tmpfs     5.0M     0  5.0M   0% \/run\/lock\ntmpfs          tmpfs     998M     0  998M   0% \/sys\/fs\/cgroup\ntmpfs          tmpfs     200M     0  200M   0% \/run\/user\/0\n<strong>\/dev\/dm-0      ext4      3.9G   16M  3.7G   1% \/mnt\/luks-242c24d8<\/strong>\n<\/code><\/pre>\n\n\n\n<p>Configure LUKS device auto mounting on system boot;<\/p>\n\n\n\n<p><a href=\"https:\/\/kifarunix.com\/automount-luks-encrypted-device-in-linux\/\" target=\"_blank\" aria-label=\" (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"rank-math-link\">Automount LUKS Encrypted Device in Linux<\/a><\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"close-luks-device\">Close LUKS Device<\/h4>\n\n\n\n<p>To remove existing device mapping and wipe the key from kernel memory, unmount the drive if it mounted and close it;<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">umount \/mnt\/luks-242c24d8<\/pre>\n\n\n\n<pre class=\"wp-block-preformatted\">cryptsetup -v luksClose luks-242c24d8-ac65-413d-b3a2-eb7f2f0993b0<\/pre>\n\n\n\n<p>If you need to mount the device again open it with <code><strong>luksOpen<\/strong><\/code> action and mount it as shown above.<\/p>\n\n\n\n<p>And there you go.<\/p>\n\n\n\n<p>You have created a device with LUKS  encryption and can now use it to store your data.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"other-tutorials\">Other Tutorials<\/h3>\n\n\n\n<p><a aria-label=\" (opens in a new tab)\" data-schema-attribute=\"mentions\" href=\"https:\/\/kifarunix.com\/how-to-use-veracrypt-on-command-line-to-encrypt-drives-on-ubuntu-18-04\/\" target=\"_blank\" rel=\"noreferrer noopener\" class=\"rank-math-link\">How to Use VeraCrypt on Command Line to Encrypt Drives on Ubuntu 18.04<\/a><\/p>\n\n\n\n<p><a aria-label=\" (opens in a new tab)\" href=\"https:\/\/kifarunix.com\/how-to-encrypt-files-and-folders-with-ecryptfs-on-ubuntu-18-04\/\" target=\"_blank\" rel=\"noreferrer noopener\" class=\"rank-math-link\">How to Encrypt Files and Folders with eCryptFS on Ubuntu 18.04<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/kifarunix.com\/install-and-setup-veracrypt-on-ubuntu-20-04\/\" target=\"_blank\" aria-label=\" (opens in a new tab)\" rel=\"noreferrer noopener\" class=\"rank-math-link\">Install and Setup VeraCrypt on Ubuntu 20.04<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this tutorial, you will learn how to encrypt drives with LUKS in Linux. LUKS, the Linux Unified Key Setup, is a standard for disk<\/p>\n","protected":false},"author":3,"featured_media":8518,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"rank_math_lock_modified_date":false,"footnotes":""},"categories":[34,159,121],"tags":[3378,3373,3376,3375,3374],"class_list":["post-8512","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","category-encryption","category-howtos","tag-encrypt-drives-in-linux","tag-encrypt-drives-with-luks-key","tag-luks","tag-luks-drive-encryption-linux","tag-luks-key-file","generate-columns","tablet-grid-50","mobile-grid-100","grid-parent","grid-50","resize-featured-image"],"_links":{"self":[{"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/posts\/8512"}],"collection":[{"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/comments?post=8512"}],"version-history":[{"count":10,"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/posts\/8512\/revisions"}],"predecessor-version":[{"id":21863,"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/posts\/8512\/revisions\/21863"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/media\/8518"}],"wp:attachment":[{"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/media?parent=8512"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/categories?post=8512"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kifarunix.com\/wp-json\/wp\/v2\/tags?post=8512"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}