From 09a783e4ca5026efc458ca4f3495c494ebfffc44 Mon Sep 17 00:00:00 2001 From: Christian Hesse Date: Thu, 17 Apr 2014 10:50:35 +0200 Subject: add infos about /etc/crypttab.initramfs to documentation --- README.md | 14 ++++++++++---- bin/ykfde | 3 +-- 2 files changed, 11 insertions(+), 6 deletions(-) diff --git a/README.md b/README.md index ce95385..8bb3307 100644 --- a/README.md +++ b/README.md @@ -38,13 +38,19 @@ This will place files to their desired places in filesystem. Usage ----- -First prepare the key. Plug it in, make sure it is configured for HMAC- -SHA1, then run: +First prepare the key. Plug it in, make sure it is configured for +`HMAC-SHA1`, then run: > ykfde -d /dev/`LUKS-device` -This will add a new slot to your LUKS device. Add `ykfde` to your hook -list in `/etc/mkinitcpio.conf` and rebuild your initramfs with: +This will store a challenge in `/etc/ykfde.d/` and add a new slot to +your LUKS device. Make sure systemd knows about your encrypted device by +adding a line to `/etc/crypttab.initramfs`. It should read like: + +> `mapping-name` /dev/`LUKS-device` - + +Add `ykfde` to your hook list in `/etc/mkinitcpio.conf` and rebuild your +initramfs with: > mkinitcpio -p linux diff --git a/bin/ykfde b/bin/ykfde index 41f2718..7aa7a9f 100755 --- a/bin/ykfde +++ b/bin/ykfde @@ -75,5 +75,4 @@ shred --remove "${TMPDIR}/ykfde-response" rm -rf "${TMPDIR}" echo "Please do not forget to remove old keys when changing challenge!" -echo "Now make sure /etc/crypttab.initramfs has the needed entry, then" -echo "run 'mkinitcpio' to build a new initramfs!" +echo "Now run 'mkinitcpio' to build a new initramfs!" -- cgit v1.2.3-54-g00ecf