-
-
Notifications
You must be signed in to change notification settings - Fork 14.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Expand support for and document systemd-cryptenroll #139433
Comments
#139864 has been merged, the Can you take a look at this and report back? |
Tested with tpm2 and fido2, all working as intended. |
(sorry for commenting on a closed issue) I'm still being asked for the password, though the configuration went fine, Can you please share your configuration? maybe I'm just missing something? running I have this in my config: environment.etc.crypttab = {
enable = true;
text = ''
crypted /dev/nvme0n1p2 - tpm2-device=auto
'';
}; |
I'm using nearly identical configuration, you may test the correctness of your setup with: |
yes, as expected:
did you tweak something under this config: https://github.com/ivankovnatsky/nixos-config/blob/main/hosts/thinkpad/boot.nix#L13 ? |
systemd-cryptsetup won't work in initrd yet |
ah, got it. |
systemd in initrd is discussed at #120015 (and other issues/PRs linked to/from there) |
Describe the issue
The upgrade from systemd 247 to 249 recently landed in nixpkgs-unstable. Version 248 brought support for
systemd-cryptenroll
, which allows for automatica unlocking of LUKS2 volumes with diverse security hardware.In my specific case, I would like to use a FIDO2 security key as described in Lennart Poettering's blog post, which requires an entry in
/etc/crypttab
.Running
systemd-cryptenroll
correctly configures LUKS slots and tokens, and settingin my system configuration provides the correct file and appears to integrate with systemd when rebuilding. However I am still asked to provide a password for
/dev/sda2
when rebooting with zero interaction from my security key.Expected behavior
Unlocking LUKS at boot by confirming user presence. Ideally this could be managed by a NixOS Module such as luksroot.
Additional Context
I am using a SoloKeys Somu, which supports U2F and FIDO2
I believe this could be related to zfs-import services do not wait for LUKS devices to be opened (need a cryptsetup.target) #31258.
Notify maintainers
@andir @eelco @flokli @kloenk
Metadata
Please run
nix-shell -p nix-info --run "nix-info -m"
and paste the result.Maintainer information:
The text was updated successfully, but these errors were encountered: