CransWiki:

Luks unlock with SSH or USB

09 February 2015 on Linux, Luks, Ubuntu, Debian, Dropbear, SSH

Unlocking a full disk encrypted Ubuntu/Debian system with SSH or USB flash drive

I've started encryping my home server long before it was a next next next install option in Ubuntu and Debian. At some point I added USB unlocking with an old hacked up version of the script from How to setup passwordless disk encryption in Debian Etch to my system but had to retract the keys from the luks volume too often because of broken or lost flash drives. So I recently started looking into unlocking it from SSH for which there even was a howto included in the ubuntu distribution (/usr/share/doc/cryptsetup/README.remote.gz). Unfortunately this has been broken since 2010 when plymouth was introduced.

So I patched up the usb unlock script from How to setup passwordless disk encryption in Debian Etch to support unlocking from SSH, while maintaining support for entering the passphrase in plymouth, and wrote an install script which sets up the system to allow unlocking of full disk encrypted Ubuntu and Debian installs through console, USB-key or SSH.

Tested on:

Use at your own risk, I'm not responsable for any damage this script might do to your system, make backups, make sure you have a safe boot option, test it in a VM first... etc. etc.

Usage

Ways to unlock your machine


source: https://martinvanbeurden.nl/blog/luks-unlock-with-ssh-or-usb/

CatégoriePagePublique

CransWiki: WikiNit/Notes/RootChiffréDévérouillageSSH (dernière édition le 2016-01-20 10:52:39 par ValentinSamir)