Re: Demand for LUKS password blocks boot

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 01/25/2010 08:12 PM, Robin Laing wrote:
> On 01/21/2010 08:32 AM, Ed Greshko wrote:
>> Dr. Michael J. Chudobiak wrote:
>>> On 01/21/2010 09:40 AM, Bryn M. Reeves wrote:
>>>
>>>>> From:
>>>>> https://fedoraproject.org/wiki/Dracut/Options#crypto_LUKS
>>>>>
>>>>> Pass: rd_NO_LUKS to your kernel boot line.
> 
>>>
>> What happens if you normally want a particular uuid to be activated on
>> boot...but there is a power fail and restore at 3am?  Wouldn't you still
>> be stuck with a system waiting for the password when what you may want
>> would be for the system to come up without that device?  Wouldn't a
>> rd_LUKS_timeout=<X seconds>  make sense?
>>
>>
> 
> If a drive is encrypted, where do you expect to get the password from?
> 
> I am just curious because I have started to encrypt my drives and I have 
> to enter the password on each boot.  It is to ensure that the system 
> cannot be accessed unless the password is entered.
> 
> Maybe my concept of encrypted partitions is different than yours.
> 

Some people use pre-configured keys stored in /etc/crypttab. While it's
not as secure as requiring a passphrase be entered on each boot it does
provide more protection than not encrypting anything and it provides a
set of tradeoffs that some people are happy with.

Regards,
Bryn.

-- 
users mailing list
users@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe or change subscription options:
https://admin.fedoraproject.org/mailman/listinfo/users
Guidelines: http://fedoraproject.org/wiki/Communicate/MailingListGuidelines

[Index of Archives]     [Current Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [Yosemite Photos]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux