unofficial mirror of guix-patches@gnu.org 
 help / color / mirror / code / Atom feed
From: David Trudgian <dave@trudgian.net>
To: Tobias Geerinckx-Rice <me@tobias.gr>
Cc: David Trudgian <dave@trudgian.net>,
	Danny Milosavljevic <dannym@scratchpost.org>,
	38826@debbugs.gnu.org
Subject: [bug#38826] doc: Mention no LUKS2 for luks-device-mapping
Date: Thu, 02 Jan 2020 19:56:33 -0600	[thread overview]
Message-ID: <8736cxl2um.fsf@lappy.randomroad.net> (raw)
In-Reply-To: <87png18o7d.fsf@nckx>

[-- Attachment #1: Type: text/plain, Size: 1318 bytes --]


Hi Danny, Tobias,

>>> A mention LUKS2 is not supported in the docs might be nice.
>>
>> I agree.
>
> Same.  Would you consider submitting a patch, David?  Or writing the
> text?

My original email had a patch attached (or should have). Apologies -
there was no [PATCH] on the subject. Attaching here in case.

>> But better yet would be to implement LUKS2 in the uuid code.

I intend to take a look at this when I get time in the next week or so.

> Has LUKS2 support[0] been added to GRUB yet?  Last I checked it
> hadn't.

I don't believe GRUB has LUKS2 support for booting from an encrypted
partition merged yet. The last I saw there was a patch for LUKS2 but it
didn't support the Argon 2i PBKDF which is the default you get when you
use LUKS2 in distros where a separate `/boot` is kept unencrypted, so it
wouldn't be useful yet.

It would still be good to be able to boot from LUKS1 but mount non-boot
LUKS2 partitions, so people like me coming from other distros can mount
their encrypted `/home` or similar without having to convert to LUKS1.

I have actually converted to LUKS1, which requires converting the key to
pbkdf2 first...

cryptsetup luksConvertKey --pbkdf=pbkdf2 /dev/sdc1
cryptsetup convert /dev/sdc1 --type luks1

...but I can easily create LUKS2 things to work on the UUID code.

Cheers,

DT


[-- Warning: decoded text below may be mangled, UTF-8 assumed --]
[-- Attachment #2: 0001-Mention-no-LUKS2-in-luks-device-mapping-doc.patch --]
[-- Type: text/x-patch, Size: 1286 bytes --]

From 97ed4c1859e797adf4ba813ac7db3d1b8261a569 Mon Sep 17 00:00:00 2001
From: David Trudgian <EMAIL>
Date: Mon, 30 Dec 2019 21:37:35 -0600
Subject: [PATCH] Mention no LUKS2 in luks-device-mapping doc

---
 doc/guix.texi | 5 +++++
 1 file changed, 5 insertions(+)

diff --git a/doc/guix.texi b/doc/guix.texi
index 70e3dfea6a..232d99d508 100644
--- a/doc/guix.texi
+++ b/doc/guix.texi
@@ -69,6 +69,7 @@ Copyright @copyright{} 2019 Jakob L. Kreuze@*
 Copyright @copyright{} 2019 Kyle Andrews@*
 Copyright @copyright{} 2019 Alex Griffin@*
 Copyright @copyright{} 2019 Guillaume Le Vaillant@*
+Copyright @copyright{} 2019 David C. Trudgian@*
 
 Permission is granted to copy, distribute and/or modify this document
 under the terms of the GNU Free Documentation License, Version 1.3 or
@@ -11470,6 +11471,10 @@ This must be a @code{mapped-device-kind} object, which specifies how
 This defines LUKS block device encryption using the @command{cryptsetup}
 command from the package with the same name.  It relies on the
 @code{dm-crypt} Linux kernel module.
+
+Note that currently only LUKS1 encrypted devices are supported. Existing
+LUKS2 devices can be opened and mounted after boot, using
+@code{cryptsetup luksOpen}.
 @end defvr
 
 @defvr {Scheme Variable} raid-device-mapping
-- 
2.24.1


  reply	other threads:[~2020-01-03  2:08 UTC|newest]

Thread overview: 6+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2019-12-31  3:47 [bug#38826] doc: Mention no LUKS2 for luks-device-mapping David Trudgian
2020-01-02 22:32 ` Danny Milosavljevic
2020-01-02 22:53   ` Tobias Geerinckx-Rice via Guix-patches via
2020-01-03  1:56     ` David Trudgian [this message]
2020-01-10 15:39     ` [bug#38826] Fwd: [bug #55093] Add LUKS2 support Tobias Geerinckx-Rice via Guix-patches via
2020-01-10 19:03       ` David Trudgian
     [not found] <20181125-133249.sv131345.66349@savannah.gnu.org>
     [not found] ` <20190329-085821.sv141454.39342@savannah.gnu.org>
     [not found]   ` <20190529-204303.sv92573.55917@savannah.gnu.org>
     [not found]     ` <20191104-210711.sv164522.57380@savannah.gnu.org>
     [not found]       ` <20191104-214103.sv131345.42463@savannah.gnu.org>

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

  List information: https://guix.gnu.org/

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=8736cxl2um.fsf@lappy.randomroad.net \
    --to=dave@trudgian.net \
    --cc=38826@debbugs.gnu.org \
    --cc=dannym@scratchpost.org \
    --cc=me@tobias.gr \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
Code repositories for project(s) associated with this public inbox

	https://git.savannah.gnu.org/cgit/guix.git

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).