Add option to use sshd instead of dropbear#17
Add option to use sshd instead of dropbear#17UweMenges wants to merge 9 commits intodracut-crypt-ssh:masterfrom
Conversation
|
@UweMenges many thanks for this great PR! It makes definitely sense First of all I would like to have some kind of simple/easy testing way, in order to be able to test/verify such things easier. I would try to build some vagrant boxes in the full-encrypted setup, so we would get a Vagrantfile here. After we have a such thing, I would definitely like to test this PR and to merge it. It will take some time, sorry for that, I hope thats Ok for you |
|
Incorporating sshd will allow me to remote call into my globally available sshd service tunnelling local ports of protected host for LUKS secret input. And that's what I am looking for! <3 |
|
FYI, I was looking for a way to ssh into dracut and Dropbear lacking ed25519 support was a show stopper for me to use dracut-crypt-ssh. Thus I created dracut-ssh that uses OpenSSH sshd instead of dropbear: |
|
@gsauthof thanks for pointing me to your project. I really like the simplifications it introduces, like using a proper systemd service for the sshd and the the tty password helper instead of the /dev/console hack. I'd actually propose merging that and collaborating (but we'd have to converge on the licenses, dracut-crypt-ssh is GPLv2 in an attempt to have it mergeable into dracut in the future). |
|
I have hope that merging project would not force using systemd. |
|
When this starts requiring systemd it would become useless to me and many others. |
|
It seems that lack of testing is the main reason to not merge the PR. @artem-sidorenko any progress on that? |
The system's sshd will be used instead of dropear if `crypt_ssh_use_sshd=yes` is set in crypt-ssh.conf. This will increase the initramfs by about 1MiB.
There exist dropbear builds which do not support this parameter and subsequently fail resulting in an unreachable system.
4d53a01 to
f584d7c
Compare
|
@UweMenges sorry for a such delay, this is due to some changes in my life and a total lack of time. I invoked an email discussion with @gsauthof @rbu regarding the future of dracut-crypt-ssh and dracut-sshd. Depending on the outcome of this discussion I would decide if I would try to find the time for this PR and/or other topics. Sorry again and thank you for great work and patience! |
|
This is not a bad idea, but there are a few issues that should be addressed if you're still interested.
|
|
I'm using https://github.com/gsauthof/dracut-sshd in the meanwhile, so I'm not actively pushing this PR. I don't see the initramfs permission issue on my system, and I don't know systemd-boot, but the initramfs might contain sensitive data other than the ssh keys, so maybe this is an issue for systemd-boot? As far as I can see, the default key to use is GENERATED in module-setup.sh#L35 in accordance to the recommendation in the README.md (but not in crypt-ssh.conf#L19, this PR contains a fix for that). |
|
Thanks for letting me know. Closing for now. |
The system's sshd will be used instead of dropear if
crypt_ssh_use_sshd=yesis set in crypt-ssh.conf.This will increase the initramfs by about 1MiB.