-
-
Notifications
You must be signed in to change notification settings - Fork 18.6k
Expand support for and document systemd-cryptenroll #139433
Copy link
Copy link
Closed
Labels
0.kind: enhancementAdd something new or improve an existing system.Add something new or improve an existing system.0.kind: questionRequests for a specific question to be answeredRequests for a specific question to be answered6.topic: nixosIssues or PRs affecting NixOS modules, or package usability issues specific to NixOSIssues or PRs affecting NixOS modules, or package usability issues specific to NixOS6.topic: systemdSoftware suite that provides an array of system components for Linux operating systems.Software suite that provides an array of system components for Linux operating systems.9.needs: reporter feedbackThis issue needs the person who filed it to respondThis issue needs the person who filed it to respond
Metadata
Metadata
Assignees
Labels
0.kind: enhancementAdd something new or improve an existing system.Add something new or improve an existing system.0.kind: questionRequests for a specific question to be answeredRequests for a specific question to be answered6.topic: nixosIssues or PRs affecting NixOS modules, or package usability issues specific to NixOSIssues or PRs affecting NixOS modules, or package usability issues specific to NixOS6.topic: systemdSoftware suite that provides an array of system components for Linux operating systems.Software suite that provides an array of system components for Linux operating systems.9.needs: reporter feedbackThis issue needs the person who filed it to respondThis issue needs the person who filed it to respond
Fields
Give feedbackNo fields configured for issues without a type.
Describe the issue
The upgrade from systemd 247 to 249 recently landed in nixpkgs-unstable. Version 248 brought support for
systemd-cryptenroll, which allows for automatica unlocking of LUKS2 volumes with diverse security hardware.In my specific case, I would like to use a FIDO2 security key as described in Lennart Poettering's blog post, which requires an entry in
/etc/crypttab.Running
systemd-cryptenrollcorrectly configures LUKS slots and tokens, and settingin my system configuration provides the correct file and appears to integrate with systemd when rebuilding. However I am still asked to provide a password for
/dev/sda2when rebooting with zero interaction from my security key.Expected behavior
Unlocking LUKS at boot by confirming user presence. Ideally this could be managed by a NixOS Module such as luksroot.
Additional Context
I am using a SoloKeys Somu, which supports U2F and FIDO2
I believe this could be related to zfs-import services do not wait for LUKS devices to be opened (need a cryptsetup.target) #31258.
Notify maintainers
@andir @eelco @flokli @kloenk
Metadata
Please run
nix-shell -p nix-info --run "nix-info -m"and paste the result.Maintainer information: