-
Notifications
You must be signed in to change notification settings - Fork 583
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
crypt: initial pass on supporting clevis-unlocked volumes #1656
base: main
Are you sure you want to change the base?
crypt: initial pass on supporting clevis-unlocked volumes #1656
Conversation
Can one of the admins verify this patch? |
I've added a small amount of code that attempts to detect the presence of clevis keys in the volume automatically |
ok to test |
@somewhere-or-other, when unlocking LUKS2 devices via clevis, does it have --disable-locks cryptsetup equivalent option? We disable LUKS2 (local) locks for 2 reasons:
The later is important because auto-recovery invoked in-parallel from multiple nodes could lead to severe LUKS2 metadata corruption |
@oniko It does not, at least not obviously. I will look through the clevis tools (which are just bash wrappers to |
I've submitted a pull request to add an option to allow passing of arbitrary parameters to the underlying |
Can one of the admins check and authorise this run please: https://ci.kronosnet.org/job/resource-agents-pipeline/job/PR-1656/1/input |
This is an initial pass at supporting LUKS volumes, that are being non-interactively unlocked by Clevis/Tang, also known as "Network Bound Disk Encryption" or "NBDE". Initial testing seems to work as expected, but I'll certainly do more thorough testing over the next week or so, just to be sure.
I would prefer a better way to have it realize that it needs to use clevis, than the "use_clevis" flag, but I haven't figured that out yet. If you've got suggestions, that would be great. I'll keep working on that, as well.
If it would be helpful, I can outline the steps necessary to set up a Clevis-unlocked volume. These are the steps I was using to add my crypted LUKSv2 volume to pacemaker:
Here are a few references for Clevis/Tang, as well:
*Introduction to Tang and Clevis by Fraser Tweedale
*Clevis and Tang: securing your secrets at rest - Fraser Tweedale (LCA 2020)
**Slides
*An easier way to manage disk decryption at boot with Red Hat Enterprise Linux 7.5 using NBDE
*How to set up Network-Bound Disk Encryption with multiple LUKS devices (Clevis+Tang unlocking)
*Automatic data encryption and decryption with Clevis and Tang
*Tang software development
*Clevis Software Development