Hacker News new | past | comments | ask | show | jobs | submit login

Shit, so now I can't turn on my desktop remotely and supply the password through SSH later? That's a huge inconvenience.



> Shit, so now I can't turn on my desktop remotely and supply the password through SSH later? That's a huge inconvenience.

a) This hasn't ceased to work for your desktop - you can continue to do this through the upgrade cycle, as it would only affect new installs (safely converting native fs to dmcrypt isn't possible, AFAIK)

b) during an installation you could eschew FDE and opt for a PV, as I do, that you put your selected, secure LV's onto. I use Debian in preference to Ubuntu, but I'm sure they're materially identical in this case -- two physical partitions -- /boot and not-boot. /boot isn't encrypted in my case, but /, and /home (and a couple of others, though not swap of course) are LVM2 volumes sitting on top of the encrypted 'rest of the disk' partition. If you have /home only with noauto option in fstab , pointing to a an LV on the crypted partition, you could continue to do what you're doing, with the same reduced security confidence.


Debian and Ubuntu allow running Dropbear in initramfs to prompt for the FDE password


That's fantastic to know, thank you. Do you know if it's complicated to set up?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: