-
Notifications
You must be signed in to change notification settings - Fork 90
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
Add passphrase_file to mount options #253
Conversation
So what's the usecase for this passphrase_file stuff? I know the existing unlock tool isn't working reliably and we need to do something about that, but I need to hear more about how this is being used to know if this is what we want to do. |
We can use encrypted bcachefs partition as root (by puttinng a key file as well as fstab with this option in initrd, tested with dracut). |
I'm also looking for this option to automatically decrypt external harddrives on my homeserver, otherwise some workaround is needed like https://oz123.github.io/writings/2024-03-25-Decrypting-bcachefs-volumes-at-boot/index.html The homeserver itself is also encrypted so the keyfiles for external files are only readable and used at runtime |
I think stratis has 2 options for unattended decryption.
I don' know much about these 2 options and what pros/cons they have or ultimately how secure they are. Are you only concerned with someone taking an external drive and not the entire server and external drives? |
My understanding of the threat model for (2) is:
Given those, the major difference between TPM and requiring a passphrase to unlock is that TPM exposes you to physical attacks against the running machine (intercepting the bus between the TPM and CPU, moving RAM to a second machine while preserving state via LN cooling, etc) ¹: No init=/bin/sh! |
#266 Recreated this patch since |
Based on #241 .
Add passphrase_file to mount options. Can be specified in
-o
or/etc/fstab
, making it possible to mount encrypted bcachefs partitions as root.Kept
-f, --passphrase-file
for compatibility.Also include a patch to
bcachefs.8
.