blob: 58b7b172ce63e2e7c876adf2519e2de0d2be285d (
about) (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
|
mkinitcpio-ykfde
================
**Full disk encryption with Yubikey (Yubico key)**
This allows to automatically unlock a LUKS encrypted hard disk from `systemd`-
enabled initramfs.
Requirements
------------
To compile and use yubico full disk encryption you need:
* [yubikey-personalization](https://github.com/Yubico/yubikey-personalization)
* [iniparser](http://ndevilla.free.fr/iniparser/)
* [systemd](http://www.freedesktop.org/wiki/Software/systemd/)
* [cryptsetup](http://code.google.com/p/cryptsetup/)
* [mkinitcpio](https://projects.archlinux.org/mkinitcpio.git/) (Though
it may be easy to port this to any initramfs that uses systemd)
* [markdown](http://daringfireball.net/projects/markdown/) (HTML documentation)
Additionally it is expected to have `make` and `pkg-config` around to
successfully compile.
Build and install
-----------------
Building and installing is very easy. Just run:
> make
followed by:
> make install
This will place files to their desired places in filesystem.
Usage
-----
First prepare the key. Plug it in, make sure it is configured for HMAC-
SHA1, then run:
> ykfde -d /dev/`LUKS-device`
This will add a new slot to your LUKS device. Add `ykfde` to your hook
list in `/etc/mkinitcpio.conf` and rebuild your initramfs with:
> mkinitcpio -p linux
Reboot and have fun!
|