Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
Wiki Replica
Manage
Activity
Members
Labels
Plan
Issues
Issue boards
Milestones
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Build
Pipelines
Jobs
Pipeline schedules
Artifacts
Deploy
Releases
Container Registry
Model registry
Operate
Environments
Monitor
Incidents
Analyze
Value stream analytics
Contributor analytics
CI/CD analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
The Tor Project
TPA
Wiki Replica
Commits
fee08dea
Unverified
Commit
fee08dea
authored
5 years ago
by
anarcat
Browse files
Options
Downloads
Patches
Plain Diff
move luks keyfile config to hook
parent
fc3587b3
No related branches found
No related tags found
No related merge requests found
Changes
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
tsa/howto/new-machine-hetzner-robot.mdwn
+5
-25
5 additions, 25 deletions
tsa/howto/new-machine-hetzner-robot.mdwn
with
5 additions
and
25 deletions
tsa/howto/new-machine-hetzner-robot.mdwn
+
5
−
25
View file @
fee08dea
...
...
@@ -123,38 +123,18 @@ which we'll use below.
--defaultinterfaces &&
umount /target/run/udev /target/run
7
. setup dropbear-initramfs to unlock the filesystem on boot. this
should already have been done by the `tor-install-luks-setup` hook
deployed in the grml-debootstrap stage
, but if not:
5
. setup dropbear-initramfs to unlock the filesystem on boot. this
should already have been done by the `
50-
tor-install-luks-setup` hook
deployed in the grml-debootstrap stage
.
/root/tsa-misc/installer/tor-install-luks-setup /target
TODO: improve the way that script is deployed.
TODO: use the FAI keyfiles and set a LUKS passphrase for the first
disk. For example:
LUKS_PASSPHRASE=$(tr -dc 'A-Za-z0-9' < /dev/urandom | head -c 30) &&
echo $LUKS_PASSPHRASE | cryptsetup luksAddKey /dev/md1 --key-file=/tmp/fai/crypt_dev_md1 &&
echo $LUKS_PASSPHRASE | cryptsetup luksAddKey /dev/md2 --key-file=/tmp/fai/crypt_dev_md2 &&
cryptsetup luksRemoveKey /dev/md1 --key-file=/tmp/fai/crypt_dev_md1 &&
cryptsetup luksRemoveKey /dev/md2 --key-file=/tmp/fai/crypt_dev_md2
... although that doesn't correctly setup the second disk to use a
keyfile.
TODO: Those keyfiles are precious: they could be used to bootstrap
mandos configuration. Maybe we don't want to `luksRemoveKey` the
darn thing.
TODO: in an install following the above procedure, a keyfile was
left unprotected in `/etc`. Make sure we have strong mechanisms to
avoid that ever happening again. For example:
chmod 0 /etc/luks/
TODO:
in any case, move all of the above in the
`tor-install-luks-setup` hook
.
TODO:
the keyfiles deployed there can be used to bootstrap
mandos. Document how to do this better
.
8. Review the crypto configuration:
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment