Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Future of Encryption in Fedora (Silverblue version) #447

Open
travier opened this issue Apr 5, 2023 · 3 comments
Open

Future of Encryption in Fedora (Silverblue version) #447

travier opened this issue Apr 5, 2023 · 3 comments
Labels
enhancement New feature or request fedora-change Needs a Fedora Change

Comments

@travier
Copy link
Member

travier commented Apr 5, 2023

@travier travier added enhancement New feature or request fedora-change Needs a Fedora Change labels Apr 5, 2023
@BirdInFire
Copy link

I would like to add here if it's possible to securely add some sort of "passwodless unlock", i know it exist usage of yubikey for it, but last time i used it it needed to enable the local generation of initramfs to work (on silverblue), and the key was stored with a criminally low iteration of PBKDF2

Many friend of mine don't use Luke because they don't wan't to enter a password at each boot so it may be interesting to take it in account.

@ullebe1
Copy link

ullebe1 commented May 15, 2023

I would like to add here if it's possible to securely add some sort of "passwodless unlock", i know it exist usage of yubikey for it, but last time i used it it needed to enable the local generation of initramfs to work (on silverblue), and the key was stored with a criminally low iteration of PBKDF2

Many friend of mine don't use Luke because they don't wan't to enter a password at each boot so it may be interesting to take it in account.

With modern systemd it is possible to unlock LUKS2 volumes using any hardware token that supports FIDO2 and the hmac-secret extension, which at least modern Yubikeys do. I personally use this on Fedora Silverblue 38, and while integration with Plymouth isn't perfect, it works great for the most part.

@BirdInFire
Copy link

I would like to add here if it's possible to securely add some sort of "passwodless unlock", i know it exist usage of yubikey for it, but last time i used it it needed to enable the local generation of initramfs to work (on silverblue), and the key was stored with a criminally low iteration of PBKDF2
Many friend of mine don't use Luke because they don't wan't to enter a password at each boot so it may be interesting to take it in account.

With modern systemd it is possible to unlock LUKS2 volumes using any hardware token that supports FIDO2 and the hmac-secret extension, which at least modern Yubikeys do. I personally use this on Fedora Silverblue 38, and while integration with Plymouth isn't perfect, it works great for the most part.

i know but it require to add a local gen of initramfs, it's why i ask fedora to do it in the normal image and propose it into the installer would be nice).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request fedora-change Needs a Fedora Change
Projects
None yet
Development

No branches or pull requests

3 participants