Hilton Chain <hako@ultrarare.space> writes:

> On Tue, 25 Mar 2025 20:12:25 +0800,
> 45mg wrote:
>>
>> "Thomas Ieong" <th.ie...@free.fr> writes:
>>
>> > I remember that some years ago we could not use LUKS 2, has the situation
>> > improved?
>>
>> I'm writing this from Guix System installed on an LUKS 2 volume. So,
>> yes, it works now. GRUB also supports `--pbkdf argon2id` now, so you
>> don't have to worry about that insecurity [1] anymore.
>
> GRUB doesn't support Argon2 at the moment.

Not really sure how I'm booting then. I see '# PBKDF argon2id, ...' in
the output of `sudo cryptsetup status --debug myrootvolname`.

IIRC, the issue was that libgcrypt didn't support argon2*. A quick
search of the commit logs seems to suggest this has changed since 2022:
https://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git&a=search&h=HEAD&st=commit&s=argon2

>> The problem is that you still need GRUB to decrypt the volume before you
>> can boot, and GRUB's decryption is really slow (takes over a minute,
>> versus a few seconds after booting the kernel).
>>
>> What most distributions do is use something like `ukify` to generate a
>> bootable UEFI image that has includes the required crypto modules. There
>> is an open patch series that would add this to Guix [2], but it hasn't
>> been touched in a long time (it was split off from a larger rewrite of
>> the bootloader subsystem [3], which also hasn't been touched in a
>> while).
>
> UKI bootloader doesn't suits the multiple generation model well, the
> implementation depends on the reliablity of EFI firmware too much.

Could you elaborate, or link to a resource/past message/whatever
explaining this?

If I understand correctly, the main issue here is that the initrd
doesn't know how to mount encrypted partitions. There are solutions to
this other than UKIs, such as Arch's mkinitcpio:
https://wiki.archlinux.org/title/Dm-crypt/System_configuration#mkinitcpio

Reply via email to