Hi,

some...@selfhosted.xyz skribis:

> Someone might have better suggestions but until then here's my
> thoughts on it:
>
> There's some step-by-step instructions for setting up a grub-password
> and then setting a path to a luks keyfile in grub on a system using
> Libreboot and Parabola here:
> https://wiki.selfhosted.xyz/doku.php?id=it:computer_setup:encrypted_parabola_installation_guide#boot_configuration
>
> This could possibly be adapted to GuixSD. In short the steps involved
> (without setting up grub's password authentication) are:
>
> -generate key and add to your luksdrive
>   dd bs=512 count=4 if=/dev/urandom of=/etc/my_cryptkey iflag=fullblock
>   cryptsetup luksAddKey /dev/sda1 /etc/my_cryptkey
> -Regenerate initramfs (using the mkinitcpio bash-script)
>   zile /etc/mkinitcpio.conf
>   FILES="/etc/my_cryptkey"
>   mkinitcpio -p linux-libre (or linux-libre-lts or linux-libre-grsec or all 
> of them)
> -Then add a configuration line to your grub config's default
> menu-entry on the linux-line:
>   linux /boot .... cryptkey=rootfs:/etc/my_cryptkey
>
> For details on setting up the password etc see the link above.

Adding the cryptsetup passphrase in a file in the initrd is doable (with
the initrd living on the encrypted file system).  Sounds like a good
idea that we could implement in GuixSD (although care must be taken not
to store the passphrase file in the store.)

Thanks,
Ludo’.

Reply via email to