[Pkg-cryptsetup-devel] Bug#465902: Bug#465902: cryptroot remote unlocking on boot feature
debian at x.ray.net
debian at x.ray.net
Sat Feb 16 01:37:04 UTC 2008
hi!
> This sounds like an interesting approach. As I got from #465901, this
> will enable dropbear per default if cryptroot is detected. While I like
> the idea to be able to enable ssh support for initramfs, I object
> against this default behaviour. Not everyone with cryptroot is in need
> of remote access during boot process. Thus I suggest to disable the
> whole feature per default, and make it configurable in any case.
ok. not my preference, but i understand the rationale.
this behaviour is implemented in the dropbear patch. i guess the
dropbear maintainer will read the related initramfs-tools and this
report, and i will submit a patch with the always-no-default if he
requests so.
> Also, please resend the patch in unified format (diff -rNu).
ok.
>> in the initramfs scripts, the target might be unlocked (from remote) in
>> the background. so on non-successful cryptsetup exit, check whether the
>> target is unlocked, only otherwise act on it as a failure.
>> for this unlocking in the background (and if successful, killing the
>> waiting cryptsetup), the cryptcreate script is added.
>> to call this unlocking script from remote, dropbear has to be added to
>> the initramfs, so dropbear is added to the suggested list.
>
> I have to admit that I don't get that. In your patch, a script
> /sbin/cryptcreate is created, which itself uses the variables
> $cryptcreate and $crypttarget. This script is made executable, but I
> cannot find the place where it actually is executed. Also, how does the
> script know about the variables used by it?
the idea is that when the boot process is waiting at the passphrase
prompt, it is possible to log in via ssh and manually call a script
which prompts for the passphrase, and in case the passphrase is correct
and the root-fs is unlocked, kills the process waiting at the console,
so the boot process continues.
i admit that the name 'cryptcreate' for this script is quite
unintuitive, so i changed that in the attached new, unified diff: the
script's name is now 'unlock' - i hope this is more intuitive.
the variables will be expanded when the script is written, and as
$cryptcreate is already used to store the cryptsetup call, this seemed
to me to be the most straightforward way to guarantee that the
cryptsetup call to unlock the cryptroot from the shell is identical to
the cryptsetup call at the console (and likewise the two crypttarget
tests should always test the identical target).
Chris
-------------- next part --------------
A non-text attachment was scrubbed...
Name: cryptsetup_2:1.0.6~pre1-1.x.unified.diff
Type: text/x-patch
Size: 1807 bytes
Desc: not available
Url : http://lists.alioth.debian.org/pipermail/pkg-cryptsetup-devel/attachments/20080216/ea41f4a2/attachment.bin
More information about the Pkg-cryptsetup-devel
mailing list