-
Notifications
You must be signed in to change notification settings - Fork 32
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[RFE] Add systemd-cryptenroll PKCS11 support to unlock LUKS encrypted volumes using HSMs #1394
Comments
Can you provide more about information on how you expect this to be used? What is the use case compared to a TPM? |
|
That shows unlocking against a softhsm process running on the same system. How would that be used with an actual HSM? I'd like us to understand the use case and then decide together whether it is worth implementing or not. |
The PKCS11 URI can be changed to a soft token implementation or other opencryptoki implementation (see https://github.com/opencryptoki/opencryptoki?tab=readme-ov-file#requirements SWToken ). Once opencryptoki gets built with the SWToken enabled, the .so library obtained will replace the softhsm .so one and the URI format gets changed accordingly). The SWToken library implements SSL over TCP to access the HSM (HSM needs to be compatible with the opencryptoki SWToken implementation, of course). Then it's a matter of systemd-cryptenroll to be configured to use the proper .so library file. I have created this issue in case there are potential users of this feature, there are quite alot of black boxes to be sorted out HSM hardware wise. |
Similar PR might be needed for HSM too: flatcar/bootengine#93 |
Current situation
Systemd does not support PKCS11 URIs.
Implementation options
Add the pkcs11 flag to systemd build.
Optional: Add dev-libs/opencryptoki for Software Token support.
Optional: Add softhsm2 integration testing in Mantle.
The text was updated successfully, but these errors were encountered: