From: Mr Dash Four <mr.dash.four-gM/Ye1E23mwN+BqQ9rBEUg@public.gmane.org>
To: "Amadeusz Żołnowski" <aidecoe-2qtfh70TtYba5EbDDlwbIw@public.gmane.org>
Cc: initramfs <initramfs-u79uwXL29TY76Z2rM5mHXA@public.gmane.org>
Subject: Re: [PATCH] 90crypt: keys on external devices support
Date: Wed, 20 Oct 2010 15:44:31 +0100 [thread overview]
Message-ID: <4CBF004F.9070201@googlemail.com> (raw)
In-Reply-To: <1287580805-sup-6517@etiriah>
> '-I' option are for user to include single files. If you'd like to
> merge files into initramfs with its dependencies, you use '*inst*'
> family functions. See 'dracut-functions' file.
>
Thanks, I'll have a good look.
> First of all rd_LUKS_KEYDEV_UUID will be changed to 'rd.luks.keydev' and
> allow to specify devices by filename in /dev, LABEL or UUID.
>
> It's done a bit more flexible. You can specify 'rd_LUKS_KEYDEV_UUID'
> (later 'rd.luks.keydev') and 'rd_LUKS_KEYPATH' (later 'rd.luks.keypath')
> several times. For every 'rd.luks.keydev' ALL 'rd.luks'keypaths' are
> checked. I know that such approach have some flaws. I'll consider your
> proposition (quoted below) for specifying that.
>
> [...]
> rd.luks.key=<key_path>:<key_dev>:<luks_dev>
>
> Why this order? <key_path> is always required (obvious). <key_dev>
> doesn't have to be required, because it's easy to perform search for
> device (and it's done know, it works pretty well, at least with my
> latest not yet accepted patch which needs more improvement :-)). The
> last is optional too. Forcing user to write down all UUID-s is not
> ethical. ;-) It should be automated as far as it makes sense.
>
Bugger, I forgot about drive labels :-\
In which case using separate rd.luks=<luks_dev> (for password
identification), rd.luks.key for external dev/key authentication and
rd.luks.token for token authentication makes sense. I would reverse the
order though.
The way I see it if you reverse the order to be
<luks_dev>:<key_dev>:<fs>:<key_path> (don't forget the file system,
otherwise how would you know how to mount it to read the key - you may
'assume' that it is either ext2/3, but it might be something else - HFS,
ReifeiserFS etc.) it makes it more consistent with the Fedora's own
Kickstart options (see http://fedoraproject.org/wiki/Anaconda/Kickstart
- scroll further until you find 'ks=').
> Examples:
> rd.luks.key=/some/file.key:LABEL=cool_keys:UUID=00aabc
> rd.luks.key=/some/file.key::UUID=00aabc
> rd.luks.key=/some/file.key:LABEL=cool_keys
> rd.luks.key=/some/file.key
>
> And probably I'll introduce this scheme in patches I'm improving
> recently. Does it satisfy you? :-) And for token it would be:
>
> rd.luks.token=…
>
> Might be?
>
I'll be happy if you reverse the order and add a file system type as
well - it makes it more consistent with the Fedora Kickstart format,
otherwise is a bit confusing.
>> I've looked through the dependencies and the package scripts though
>> there are, among other things, udev rules and config files, which
>> could complicate matters. Following this I have another query: Does
>> dracut have (at least read) access to the /boot partition where the
>> initramfs image is?
>>
>
> No, no. You don't need access to /boot. You put everything in
> initramfs using installation functions provided by 'dracut-functions'.
> See 'install' and 'check' scripts in some module's directory.
>
That could spell trouble as for just running pkcs11-tool that requires 2
configuration files which reflect the specific token type and various
parameters. Although 90% of all cases fall into the 'default' mode
scenario there are the rest 10% which do not and have to be properly
catered for.
The parameters and attributes in these files are complex and cannot be
specified in the kernel command line in grub.conf. If these 2
configuration files are embedded into initrd they cannot be changed,
which means that initrd has to be custom-built for each client
configuration which makes this whole exercise largely impractical.
The other possible scenario, as I already mentioned, is to use
configuration files which are outside initrd (separate device or located
in /boot are two possible alternatives)
One other query related to this: if I want to use crypttab for my root
(/) partition how is that handled by dracut?
next prev parent reply other threads:[~2010-10-20 14:44 UTC|newest]
Thread overview: 35+ messages / expand[flat|nested] mbox.gz Atom feed top
2010-10-19 13:54 [PATCH] 90crypt: keys on external devices support Mr Dash Four
[not found] ` <4CBDA328.40401-gM/Ye1E23mwN+BqQ9rBEUg@public.gmane.org>
2010-10-19 14:19 ` Amadeusz Żołnowski
2010-10-19 14:33 ` Mr Dash Four
[not found] ` <4CBDAC3D.7050906-gM/Ye1E23mwN+BqQ9rBEUg@public.gmane.org>
2010-10-20 1:24 ` Mr Dash Four
[not found] ` <4CBE44D3.6070000-gM/Ye1E23mwN+BqQ9rBEUg@public.gmane.org>
2010-10-20 14:12 ` Amadeusz Żołnowski
2010-10-20 14:44 ` Mr Dash Four [this message]
[not found] ` <4CBF004F.9070201-gM/Ye1E23mwN+BqQ9rBEUg@public.gmane.org>
2010-10-20 15:17 ` Amadeusz Żołnowski
2010-10-20 15:37 ` Mr Dash Four
[not found] ` <4CBF0CA3.1070801-gM/Ye1E23mwN+BqQ9rBEUg@public.gmane.org>
2010-10-22 16:51 ` Amadeusz Żołnowski
2010-10-21 13:29 ` Karel Zak
[not found] ` <20101021132916.GC22186-sHeGUpI7y9L/9pzu0YdTqQ@public.gmane.org>
2010-10-21 13:54 ` Mr Dash Four
[not found] ` <4CC0462E.20507-gM/Ye1E23mwN+BqQ9rBEUg@public.gmane.org>
2010-10-21 15:18 ` Karel Zak
[not found] ` <20101021151802.GD22186-sHeGUpI7y9L/9pzu0YdTqQ@public.gmane.org>
2010-10-21 15:48 ` Mr Dash Four
[not found] ` <4CC060B3.3050508-gM/Ye1E23mwN+BqQ9rBEUg@public.gmane.org>
2010-10-22 16:40 ` Amadeusz Żołnowski
2010-10-22 18:34 ` Karel Zak
2010-10-20 13:19 ` Amadeusz Żołnowski
2010-10-20 14:06 ` Mr Dash Four
[not found] ` <4CBEF768.90908-gM/Ye1E23mwN+BqQ9rBEUg@public.gmane.org>
2010-10-20 14:25 ` Amadeusz Żołnowski
2010-10-20 14:48 ` Mr Dash Four
[not found] ` <4CBF0133.2070709-gM/Ye1E23mwN+BqQ9rBEUg@public.gmane.org>
2010-10-20 15:26 ` Amadeusz Żołnowski
2010-10-20 15:39 ` Mr Dash Four
2010-10-22 11:50 ` Mr Dash Four
[not found] ` <4CC17A87.7050804-gM/Ye1E23mwN+BqQ9rBEUg@public.gmane.org>
2010-10-22 17:07 ` Amadeusz Żołnowski
2010-10-23 15:13 ` Mr Dash Four
2010-10-22 11:35 ` dracut Mr Dash Four
[not found] ` <4CC17713.4030504-gM/Ye1E23mwN+BqQ9rBEUg@public.gmane.org>
2010-10-22 17:13 ` dracut Amadeusz Żołnowski
2010-10-26 11:09 ` dracut Harald Hoyer
[not found] ` <4CC6B6E5.50402-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
2010-10-26 11:23 ` dracut Amadeusz Żołnowski
2010-10-26 11:36 ` dracut Mr Dash Four
2010-10-26 11:26 ` dracut Mr Dash Four
[not found] ` <4CC6BB02.9040901-gM/Ye1E23mwN+BqQ9rBEUg@public.gmane.org>
2010-10-29 21:40 ` dracut Mr Dash Four
2010-10-30 7:57 ` dracut Ambroz Bizjak
[not found] ` <AANLkTinO0edPay_HxUW93Dm2PpHkchxKDC1yezhV-u2K-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org>
2010-10-30 11:18 ` dracut Mr Dash Four
-- strict thread matches above, loose matches on Subject: below --
2010-07-13 17:14 [PATCH] 90crypt: keys on external devices support Amadeusz Żołnowski
2010-07-21 11:41 ` Harald Hoyer
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=4CBF004F.9070201@googlemail.com \
--to=mr.dash.four-gm/ye1e23mwn+bqq9rbeug@public.gmane.org \
--cc=aidecoe-2qtfh70TtYba5EbDDlwbIw@public.gmane.org \
--cc=initramfs-u79uwXL29TY76Z2rM5mHXA@public.gmane.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.