Merge pull request #13 from Andrew-Finn/master
Added documentation and tweaked readme
This commit is contained in:
commit
06bed03e7b
11
README.md
11
README.md
@ -1,6 +1,6 @@
|
|||||||
# fido2luks [](https://crates.io/crates/fido2luks)
|
# fido2luks [](https://crates.io/crates/fido2luks)
|
||||||
|
|
||||||
This will allow you to unlock your luks encrypted disk with an fido2 compatible key
|
This will allow you to unlock your LUKS encrypted disk with an FIDO2 compatible key.
|
||||||
|
|
||||||
Note: This has only been tested under Fedora 31, [Ubuntu 20.04](initramfs-tools/), [NixOS](https://nixos.org/nixos/manual/#sec-luks-file-systems-fido2) using a Solo Key, Trezor Model T
|
Note: This has only been tested under Fedora 31, [Ubuntu 20.04](initramfs-tools/), [NixOS](https://nixos.org/nixos/manual/#sec-luks-file-systems-fido2) using a Solo Key, Trezor Model T
|
||||||
|
|
||||||
@ -65,7 +65,7 @@ cp /usr/bin/fido2luks /boot/fido2luks/
|
|||||||
cp /etc/fido2luks.conf /boot/fido2luks/
|
cp /etc/fido2luks.conf /boot/fido2luks/
|
||||||
```
|
```
|
||||||
|
|
||||||
## Test
|
## Testing
|
||||||
|
|
||||||
Just reboot and see if it works, if that's the case you should remove your old less secure password from your LUKS header:
|
Just reboot and see if it works, if that's the case you should remove your old less secure password from your LUKS header:
|
||||||
|
|
||||||
@ -96,6 +96,13 @@ set -a
|
|||||||
|
|
||||||
Then add the new secret to each device and update dracut afterwards `dracut -f`
|
Then add the new secret to each device and update dracut afterwards `dracut -f`
|
||||||
|
|
||||||
|
### Multiple keys
|
||||||
|
|
||||||
|
Additional/backup keys are supported, Multiple fido2luks credentials can be added to your /etc/fido2luks.conf file. Credential tokens are comma separated.
|
||||||
|
```
|
||||||
|
FIDO2LUKS_CREDENTIAL_ID=<CREDENTIAL1>,<CREDENTIAL2>,<CREDENTIAL3>
|
||||||
|
```
|
||||||
|
|
||||||
## Removal
|
## Removal
|
||||||
|
|
||||||
Remove `rd.luks.2fa` from `GRUB_CMDLINE_LINUX` in /etc/default/grub
|
Remove `rd.luks.2fa` from `GRUB_CMDLINE_LINUX` in /etc/default/grub
|
||||||
|
@ -1,13 +1,34 @@
|
|||||||
## Initramfs-tools based systems(Ubuntu and derivatives)
|
## Initramfs-tools based systems(Ubuntu and derivatives)
|
||||||
|
|
||||||
After installation generate your credentials and add keys to your disk as described in the top-level README
|
For easiest installation [download and install the precompiled deb from releases.](https://github.com/shimunn/fido2luks/releases). However it is possible to build from source via the instructions on the main readme.
|
||||||
then add `initramfs,keyscript=fido2luks` to your `/etc/crypttab`
|
|
||||||
|
|
||||||
Example:
|
|
||||||
```
|
|
||||||
sda6_crypt UUID=9793d81a-4cfb-4712-85f3-c7a8d715112c none luks,discard,initramfs,keyscript=fido2luks
|
|
||||||
```
|
```
|
||||||
|
sudo -s
|
||||||
|
|
||||||
But don't forget to run `make install` which will install all necessary scripts and regenerate your intrid.
|
# Insert FIDO key.
|
||||||
|
fido2luks credential
|
||||||
|
# Tap FIDO key
|
||||||
|
# Copy returned string <CREDENTIAL>
|
||||||
|
|
||||||
|
nano /etc/fido2luks.conf
|
||||||
|
# Insert <CREDENTIAL>
|
||||||
|
# FIDO2LUKS_CREDENTIAL_ID=<CREDENTIAL>
|
||||||
|
|
||||||
|
set -a
|
||||||
|
. /etc/fido2luks.conf
|
||||||
|
fido2luks -i add-key /dev/<LUKS PARTITION>
|
||||||
|
# Current password: <Any current LUKS password>
|
||||||
|
# Password: <Password used as FIDO challange>
|
||||||
|
# Tap FIDO key
|
||||||
|
|
||||||
|
nano /etc/crypttab
|
||||||
|
# Append to end ",discard,initramfs,keyscript=fido2luks"
|
||||||
|
# E.g. sda6_crypt UUID=XXXXXXXXXX none luks,discard,initramfs,keyscript=fido2luks
|
||||||
|
|
||||||
|
update-initramfs -u
|
||||||
|
|
||||||
|
|
||||||
|
```
|
||||||
|
|
||||||
[Recording showing part of the setup](https://shimun.net/fido2luks/setup.svg)
|
[Recording showing part of the setup](https://shimun.net/fido2luks/setup.svg)
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user