-
Notifications
You must be signed in to change notification settings - Fork 3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Future of Encryption in Fedora (Silverblue version) #447
Comments
I would like to add here if it's possible to securely add some sort of "passwodless unlock", i know it exist usage of yubikey for it, but last time i used it it needed to enable the local generation of initramfs to work (on silverblue), and the key was stored with a criminally low iteration of PBKDF2 Many friend of mine don't use Luke because they don't wan't to enter a password at each boot so it may be interesting to take it in account. |
With modern systemd it is possible to unlock LUKS2 volumes using any hardware token that supports FIDO2 and the |
i know but it require to add a local gen of initramfs, it's why i ask fedora to do it in the normal image and propose it into the installer would be nice). |
This tracks the work to enable encryption/integrity by default in Fedora Silverblue (an related rpm-ostree variants).
See:
Sub-tickets
Related issue
Collection of issues related to LUKS support in Silverblue:
The text was updated successfully, but these errors were encountered: