aboutsummaryrefslogtreecommitdiffstats
path: root/README-dracut.md
diff options
context:
space:
mode:
authorGravatar Benjamin Pereto <benjamin.pereto@gmail.com>2015-01-06 20:02:23 +0100
committerGravatar Benjamin Pereto <benjamin.pereto@gmail.com>2015-01-06 20:06:26 +0100
commit28df7b4320088641e6cdc42a0a168c1e72866dda (patch)
treec62e32c4a876acdac72ada5ee334bd30f45175ad /README-dracut.md
parente9810f76dae9471d61d3ca475a762d9d64de08bc (diff)
downloadmkinitcpio-ykfde-28df7b4320088641e6cdc42a0a168c1e72866dda.tar.gz
mkinitcpio-ykfde-28df7b4320088641e6cdc42a0a168c1e72866dda.tar.zst
updated README-dracut.md
Diffstat (limited to 'README-dracut.md')
-rw-r--r--README-dracut.md62
1 files changed, 55 insertions, 7 deletions
diff --git a/README-dracut.md b/README-dracut.md
index bdbe718..9eb7664 100644
--- a/README-dracut.md
+++ b/README-dracut.md
@@ -9,12 +9,21 @@ Requirements
To compile and use yubikey full disk encryption you need:
-[...]
+* libyubikey-devel
+* ykpers-devel
+* iniparser-devel
+* libarchive-devel
+* cryptsetup-devel
+* python-markdown
+* systemd-devel
Build and install
-----------------
-Building and installing is very easy. Just run:
+Building and installing is very easy. Make sure you have a Softlink from markdown to markdown_py
+> ln -s /bin/markdown_py /bin/markdown
+
+Just run:
> make
@@ -28,10 +37,12 @@ Usage
-----
Make sure systemd knows about your encrypted device by
-adding a line to `/etc/crypttab.initramfs`. It should read like:
+adding a line to `/etc/crypttab`. It should read like:
> `mapping-name` /dev/`LUKS-device` -
+Normally, there is already an entry for your device.
+
Update `/etc/ykfde.conf` with correct settings. Add `mapping-name` from
above to `device name` in the `general` section. Then add a new section
with your key's decimal serial number containing the key slot setting.
@@ -56,10 +67,47 @@ This will store a challenge in `/etc/ykfde.d/` and add a new slot to
your LUKS device. When `ykfde` asks for a password it requires a valid
password from available slot.
-[...]
+Build the dracut:
+
+> dracut -f
+
+Now you have two choices. If you want, that the challenges are updated every boot, go on. else stop here.
+
+### change challenges on boot
+
+To change the challenges every boot it takes too long to generate whole new initramfs. So we load an additional initram with the bootloader.
+
+Build the cpio archive with the challenges:
+
+> ykfde-cpio
+
+Setup your bootloader with the the additional initram '/boot/ykfde-challenges.img'
+
+#### Setup GRUB2
+
+For ex. change /boot/grub2/grub.cfg
+
+ initrd /initramfs-3.10.0-123.13.2.el7.x86_64.img
+
+to
+
+ initrd /initramfs-3.10.0-123.13.2.el7.x86_64.img /ykfde-challenges.img
+
+
+with EFI /boot/efi/../grub.cfg
+
+ initrdefi /initramfs-3.17.7-300.fc21.x86_64.img
+
+to
+
+ initrdefi /initramfs-3.17.7-300.fc21.x86_64.img /ykfde-challenges.img
+
+### enable service
+
+Enable `systemd` service `ykfde-cpio.service`. it generate every boot a new challenge and updates the initram `ykfde-challenges.img` and the LUKS passphrase.
+
+*Be carefully:* Do not enable if you haven't setup the bootloader with the ykfde-challenges.img. If you do, you have to rebuild with dracut manually every time the service is executed.
+
-Additionally enable `systemd` service `ykfde-cpio.service` and make your
-bootloader load the new `cpio` image `/boot/ykfde-challenges.img` (in
-addition to your usual initramfs).
Reboot and have fun!