New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add option to use sshd instead of dropbear #17
Conversation
|
@UweMenges many thanks for this great PR! It makes definitely sense First of all I would like to have some kind of simple/easy testing way, in order to be able to test/verify such things easier. I would try to build some vagrant boxes in the full-encrypted setup, so we would get a Vagrantfile here. After we have a such thing, I would definitely like to test this PR and to merge it. It will take some time, sorry for that, I hope thats Ok for you |
|
Incorporating sshd will allow me to remote call into my globally available sshd service tunnelling local ports of protected host for LUKS secret input. And that's what I am looking for! <3 |
|
FYI, I was looking for a way to ssh into dracut and Dropbear lacking ed25519 support was a show stopper for me to use dracut-crypt-ssh. Thus I created dracut-ssh that uses OpenSSH sshd instead of dropbear: |
|
@gsauthof thanks for pointing me to your project. I really like the simplifications it introduces, like using a proper systemd service for the sshd and the the tty password helper instead of the /dev/console hack. I'd actually propose merging that and collaborating (but we'd have to converge on the licenses, dracut-crypt-ssh is GPLv2 in an attempt to have it mergeable into dracut in the future). |
|
I have hope that merging project would not force using systemd. |
|
When this starts requiring systemd it would become useless to me and many others. |
|
It seems that lack of testing is the main reason to not merge the PR. @artem-sidorenko any progress on that? |
The system's sshd will be used instead of dropear if `crypt_ssh_use_sshd=yes` is set in crypt-ssh.conf. This will increase the initramfs by about 1MiB.
There exist dropbear builds which do not support this parameter and subsequently fail resulting in an unreachable system.
4d53a01
to
f584d7c
Compare
|
@UweMenges sorry for a such delay, this is due to some changes in my life and a total lack of time. I invoked an email discussion with @gsauthof @rbu regarding the future of dracut-crypt-ssh and dracut-sshd. Depending on the outcome of this discussion I would decide if I would try to find the time for this PR and/or other topics. Sorry again and thank you for great work and patience! |
|
This is not a bad idea, but there are a few issues that should be addressed if you're still interested.
|
|
I'm using https://github.com/gsauthof/dracut-sshd in the meanwhile, so I'm not actively pushing this PR. I don't see the initramfs permission issue on my system, and I don't know systemd-boot, but the initramfs might contain sensitive data other than the ssh keys, so maybe this is an issue for systemd-boot? As far as I can see, the default key to use is GENERATED in module-setup.sh#L35 in accordance to the recommendation in the README.md (but not in crypt-ssh.conf#L19, this PR contains a fix for that). |
|
Thanks for letting me know. Closing for now. |
The system's sshd will be used instead of dropear if
crypt_ssh_use_sshd=yesis set in crypt-ssh.conf.This will increase the initramfs by about 1MiB.