Support plain encrypted partition as systemd-homed data source (on GPT-formatted disk) #26762
Labels
homed
homed, homectl, pam_homed
needs-reporter-feedback ❓
There's an unanswered question, the reporter needs to answer
RFE 🎁
Request for Enhancement, i.e. a feature request
Component
homectl, systemd-homed
Is your feature request related to a problem? Please describe
TL;DR: loopback images are awkward and prone to bugs,
fscrypt
does not supportbtrfs
and leaks metadata, please allow us to use LUKS-encrypted GPT partitions from "anywhere".Loopback images a not always optimal.
LUKS-enabled loopback image over filesystem (over other `dm` layers, potentially) is wasteful (`dm` stacking) and awkward (e.g. runs into problems when image gets close to underlying partition size). Using an image file has also been proven to be harder to get right than probably initially expected (e.g. resizing alone, albeit a good feature, has been problematic, see #24937, #23967, #23740, #22901, #22255, #22124, #20960, #19398, #17241, #15115, etc.).fscrypt is not always a good LUKS replacement.
The alternative besides unencrypted folder/subvolume/
cifs
is encryptedfscrypt
.fscrypt
has a few drawbacks, two of the most important being its lack of support forbtrfs
(which provides snapshots, data/metadata checksumming, send/receive, etc.) and a lack of opacity (individual files can be identified and metadata like extended attributes are not encrypted).Describe the solution you'd like
In essence, to quote the documentation:
Please relax the "should only contain a single partition" so that any partition with proper
GUID
andLABEL
are treated as valid.This does solve a very common scenario superbly (system that belongs to one and only one user) while allowing all the neatness of unlocking the home partition only when necessary.
Describe alternatives you've considered
/home
decrypted at boot time: this is my current setup. Once decrypted, the disk won't be reencrypted until the computer shuts down.pam_exec
to encrypt/decrypt partition. Complicated solution. Decryption is based on password (no TPM/FIDO2 by default unless coded in). Very bespoke, prone to bugs and update-related problems made worse by all the separate components involved.The systemd version you checked that didn't have the feature you are asking for
253.1
The text was updated successfully, but these errors were encountered: