You are not logged in.

#1 2020-01-26 11:13:54

deisi
Member
Registered: 2015-10-21
Posts: 66

[solved] Decrypt root with yubikey mounting multiple btrfs subvolumes

During system boot, I have to enter the encryption password multiple times. However, after the first correct decryption, I can keep pressing enter without entering the correct password and the system boots just fine.

Setup:
I have a setup with encrypted root partition using btrfs subvolumes. My partion layout is:

NAME        MAJ:MIN RM   SIZE RO TYPE  MOUNTPOINT
nvme0n1     259:0    0   477G  0 disk  
├─nvme0n1p1 259:1    0   550M  0 part  /efi
├─nvme0n1p2 259:2    0     8G  0 part  
│ └─swap    254:1    0     8G  0 crypt [SWAP]
├─nvme0n1p3 259:3    0 466.4G  0 part  
│ └─root    254:0    0 466.4G  0 crypt /home
└─nvme0n1p4 259:4    0     2G  0 part  /boot

My fstab reads as follows:

# Static information about the filesystems.
# See fstab(5) for details.

# <file system> <dir> <type> <options> <dump> <pass>
# /dev/mapper/root LABEL=bvol
UUID=39f14b5e-84c0-4ec0-871b-0ed0910977b1	/         	btrfs     	rw,relatime,compress=lzo,ssd,space_cache,subvolid=257,subvol=/@,subvol=@	0 0

# /dev/mapper/root LABEL=bvol
UUID=39f14b5e-84c0-4ec0-871b-0ed0910977b1	/home     	btrfs     	rw,relatime,compress=lzo,ssd,space_cache,subvolid=259,subvol=/@home,subvol=@home0 0

# /dev/mapper/root LABEL=bvol
UUID=39f14b5e-84c0-4ec0-871b-0ed0910977b1	/.snapshots	btrfs     	rw,relatime,compress=lzo,ssd,space_cache,subvolid=258,subvol=/@snapshots,subvol=@snapshots	0 0

# /dev/nvme0n1p1
UUID=E9F1-73D7      	/efi      	vfat      	rw,relatime,fmask=0022,dmask=0022,codepage=437,iocharset=iso8859-1,shortname=mixed,utf8,errors=remount-ro	0 2

# /dev/nvme0n1p4
UUID=278554c0-9a4e-4eac-90a4-c9f6de1a72d4	/boot         	btrfs     	rw,relatime,ssd,space_cache	0 0


# swap
/dev/mapper/swap         none         swap          defaults,discard         0      0

Its basically the snappers setup.

the swap is encrypted as well with:

swap         /dev/nvme0n1p2                                    /dev/urandom            swap,cipher=aes-cbc-essiv:sha256,size=256

but I think this doesn't matter.

The problem exists, since I started using yubikey-full-disk-encryption as an alternative way of decrypting the root partition. Before, using only traditional password with encrypt hook in initramfs, this wasn't the case. I think this is, because the subvolumes are mounted with fstab and encrypt doesn't really understand, that the subvolumes are actually all on the same partition and encrypted only ones. However I don't know why it was working in the first place. I would assume ykfde makes no difference here.

The wiki suggests using a keyfile
but that would mean that I would need to have an encrypted boot partition as well or else the crypt key is part of the initframfs. Do I understand this correctly?

If this is true, then the whole exercise is pointless anyways, as I want to use yubikey for description, what is not supported by grub AFAIK. Further grub decryption is insainly slow and I would like to avoid it. Is there any other way, I can make this boot nicely only asking for the password once?

For the sake of completeness this is my mkinitcpio.conf:

# vim:set ft=sh
# MODULES
# The following modules are loaded before any boot hooks are
# run.  Advanced users may wish to specify all system modules
# in this array.  For instance:
#     MODULES=(piix ide_disk reiserfs)
MODULES=(i915)

# BINARIES
# This setting includes any additional binaries a given user may
# wish into the CPIO image.  This is run last, so it may be used to
# override the actual binaries included by a given hook
# BINARIES are dependency parsed, so you may safely ignore libraries
BINARIES=(/usr/bin/btrfs)

# FILES
# This setting is similar to BINARIES above, however, files are added
# as-is and are not parsed in any way.  This is useful for config files.
FILES=()

# HOOKS
# This is the most important setting in this file.  The HOOKS control the
# modules and scripts added to the image, and what happens at boot time.
# Order is important, and it is recommended that you do not change the
# order in which HOOKS are added.  Run 'mkinitcpio -H <hook name>' for
# help on a given hook.
# 'base' is _required_ unless you know precisely what you are doing.
# 'udev' is _required_ in order to automatically load modules
# 'filesystems' is _required_ unless you specify your fs modules in MODULES
# Examples:
##   This setup specifies all modules in the MODULES setting above.
##   No raid, lvm2, or encrypted root is needed.
#    HOOKS=(base)
#
##   This setup will autodetect all modules for your system and should
##   work as a sane default
#    HOOKS=(base udev autodetect block filesystems)
#
##   This setup will generate a 'full' image which supports most systems.
##   No autodetection is done.
#    HOOKS=(base udev block filesystems)
#
##   This setup assembles a pata mdadm array with an encrypted root FS.
##   Note: See 'mkinitcpio -H mdadm' for more information on raid devices.
#    HOOKS=(base udev block mdadm encrypt filesystems)
#
##   This setup loads an lvm2 volume group on a usb device.
#    HOOKS=(base udev block lvm2 filesystems)
#
##   NOTE: If you have /usr on a separate partition, you MUST include the
#    usr, fsck and shutdown hooks.
HOOKS=(base udev plymouth autodetect keyboard keymap consolefont modconf block ykfde plymouth-encrypt lvm2 filesystems fsck)

# COMPRESSION
# Use this to compress the initramfs image. By default, gzip compression
# is used. Use 'cat' to create an uncompressed image.
#COMPRESSION="gzip"
#COMPRESSION="bzip2"
#COMPRESSION="lzma"
#COMPRESSION="xz"
#COMPRESSION="lzop"
#COMPRESSION="lz4"

# COMPRESSION_OPTIONS
# Additional options for the compressor
#COMPRESSION_OPTIONS=()

and my grub config:

# GRUB boot loader configuration

GRUB_DEFAULT=2
#GRUB_TIMEOUT=5
GRUB_DISTRIBUTOR="Arch"
GRUB_CMDLINE_LINUX_DEFAULT="quiet splash" 
GRUB_CMDLINE_LINUX="cryptdevice=/dev/nvme0n1p3:root"

# Preload both GPT and MBR modules so that they are not missed
GRUB_PRELOAD_MODULES="part_gpt part_msdos"

# Uncomment to enable booting from LUKS encrypted devices
#GRUB_ENABLE_CRYPTODISK=y

# Uncomment to enable Hidden Menu, and optionally hide the timeout count
#GRUB_HIDDEN_TIMEOUT=5
#GRUB_HIDDEN_TIMEOUT_QUIET=true
#
#Hold shift to make grub appear
GRUB_FORCE_HIDDEN_MENU="true"

# Uncomment to use basic console
GRUB_TERMINAL_INPUT=console

# Uncomment to disable graphical terminal
#GRUB_TERMINAL_OUTPUT=console

# The resolution used on graphical terminal
# note that you can use only modes which your graphic card supports via VBE
# you can see them in real GRUB with the command `vbeinfo'
GRUB_GFXMODE=auto

# Uncomment to allow the kernel use the same resolution used by grub
GRUB_GFXPAYLOAD_LINUX=keep

# Uncomment if you want GRUB to pass to the Linux kernel the old parameter
# format "root=/dev/xxx" instead of "root=/dev/disk/by-uuid/xxx"
#GRUB_DISABLE_LINUX_UUID=true

# Uncomment to disable generation of recovery mode menu entries
GRUB_DISABLE_RECOVERY=true

# Uncomment and set to the desired menu colors.  Used by normal and wallpaper
# modes only.  Entries specified as foreground/background.
#GRUB_COLOR_NORMAL="light-blue/black"
#GRUB_COLOR_HIGHLIGHT="light-cyan/blue"

# Uncomment one of them for the gfx desired, a image background or a gfxtheme
#GRUB_BACKGROUND="/path/to/wallpaper"
#GRUB_THEME="/path/to/gfxtheme"

# Uncomment to get a beep at GRUB start
#GRUB_INIT_TUNE="480 440 1"

# Uncomment to make GRUB remember the last selection. This requires to
# set 'GRUB_DEFAULT=saved' above.
#GRUB_SAVEDEFAULT="true"

# Disable Submenu
GRUB_DISABLE_SUBMENU=y

Last edited by deisi (2020-01-26 17:11:03)

Offline

#2 2020-01-26 12:08:26

deisi
Member
Registered: 2015-10-21
Posts: 66

Re: [solved] Decrypt root with yubikey mounting multiple btrfs subvolumes

I found out what is causing the multiple password dialogs. It is the exitance of both hooks ykfde and pylmouth-encrypt in the mkinitcpio.conf. After removing the latter I only need to enter the password once.

Offline

Board footer

Powered by FluxBB