Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add Debian guide #2

Open
sandrokeil opened this issue Jul 30, 2018 · 3 comments
Open

Add Debian guide #2

sandrokeil opened this issue Jul 30, 2018 · 3 comments
Labels
help wanted Extra attention is needed

Comments

@sandrokeil
Copy link
Owner

Write the Arch Linux guide for Debian. Not sure if it would be identical with the Ubuntu guide #1

@sandrokeil sandrokeil added the help wanted Extra attention is needed label Jul 30, 2018
@janet75
Copy link

janet75 commented Dec 4, 2021

The content seems complex but first of all I would shortly explain what
I am actually studing-using. I have a Debian 11 64bit installed and updated,
manually partitioned with Grub in /boot clear-text and / system root
encrypted with LUKS and unlocked after boot with physical USB Token
(modified crypttab and some patches, that compare encrypted public key
in /root with private key in token accessed by pin and I could post txt steps)
I did not created swap partition (because of double passphrase to
unlock and 8Gb ram memory and 250 Gb NVMe and seems enough for home
machine with virtual server guest too).
Motherboard is Asus A320M-K that has secure boot options (other systems
that actually I am not using because of need to understand).
So what I am asking (easier I can maybe reinstall from the beginning,
maybe using debian installer 'standard new users LVM encrypted auto
formatting', also if it does not allow to 'adjust' swap partition space
and it is not exactly what I would like to obtain) is following.
Epass2003 USB Token, is it possible encrypt partitions like using yubikey?
Is it possible to have full encrypted disk (may be with LVM swap partition
or not) through secure boot stored passphrase unlocked at boot directly through
physical usb token (yubikey or other token)? This case avoiding digit password twice
I thank u in advance for yours answers
Best Regards
Gianni Cerato

@sandrokeil
Copy link
Owner Author

Please have a look at this chapter. Your boot partition can not be unlocked through a USB token e.g. YubiKey.

I have to provide two passwords for my setup. One password unlocks the boot partition and the second password is for the YubiKey to unlock the encrypted home partition.

@janet75
Copy link

janet75 commented Dec 22, 2021 via email

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
help wanted Extra attention is needed
Projects
None yet
Development

No branches or pull requests

2 participants