Update README: dropbearconvert requires OpenSSH keys in PEM format. Changed installation script to rely on variables, especially the list of handled private key types, to that it automatically packages expected private keys, instead of having to explicitely name/package them.
Personal ArchLinux package combining dropbear and cryptsetup in initrd for unlocking LUKS-encrypted devices either locally (boot console) or remotely over SSH.
The code was reworked from legacy dropbear_initrd_encrypt AUR package.
Installation
After cloning the repo, installation is done as for an AUR package, e.g.:
makepkg -sri
Dropbear
SSH server key need to be generated for dropbear.
Either a new key can be generated with dropbearkey, e.g.:
dropbearkey -t ecdsa -f /etc/dropbear/dropbear_ecdsa_host_key
Or an existing OpenSSH key can be converted with dropbearconvert (useful so that the server fingerprint is the same with both), e.g.:
dropbearconvert openssh dropbear /etc/ssh/ssh_host_ecdsa_key /etc/dropbear/dropbear_ecdsa_host_key
Notes:
rsaanded25519types are also handled- OpenSSH keys must be in
PEMformat fordropbearconvertto properly work
Configuration
As explained upon installation, the following things need to be done:
- add the authorized SSH public key to
/etc/dropbear/initrd.authorized_keys - add the
ip=kernel command parameter to the bootloader configuration (see https://wiki.archlinux.org/index.php/Mkinitcpio#Using_net)- e.g. with
grub: addip=:::::eth0:dhcptoGRUB_CMDLINE_LINUX_DEFAULTin/etc/default/grub, and re-generate the configuration withgrub-mkconfig -o /boot/grub/grub.cfg
- e.g. with
- in the
HOOKSsection of/etc/mkinitcpio.conf, addssh-cryptsetupbeforefilesystems; then rebuild the initramfs:mkinitcpio -p linux- when using a non-standard keyboard layout, it is also useful to add the
keymaphook beforessh-cryptsetup, and also movekeyboardbeforekeymap
- when using a non-standard keyboard layout, it is also useful to add the
The LUKS-encrypted devices to unlock are derived from /etc/crypttab.
Some options can be set in /etc/initcpio/sshcs_env (file is sourced in initrd shell):
sshcs_opt_debug: whether to be more verbose about ongoing actions- default: 0
- any non-zero value to enable
sshcs_opt_timeout_ipconfig: time (in seconds) to configure IP- default: 10 seconds
sshcs_opt_listen: SSH listening port- default: 22
sshcs_opt_timeout_poweroff: time (in seconds) to unlock devices before automatic powering off- default (and minimum value): 2 minutes
- negative value to deactivate
For example:
sshcs_opt_timeout_ipconfig=30
sshcs_opt_listen=2222
sshcs_opt_timeout_poweroff=-1
Building notes
- Modify the sources (features in
src, and/or package building files) - If
srcwas modified- archive the
srcfolder in$pkgname-$pkgver.tar.xzfile; e.g.:tar -cJf initrd-ssh-cryptsetup-0.7.tar.xz src - upload the archive on the online repository (pointed by
PKGBUILD)
- archive the
- Update ChangeLog
- Update
PKGBUILD- bump
pkgverifsrcwas modified, orpkgrelif building files were modified - refresh
md5sumsif necessary (based onmd5sum initrd-ssh-cryptsetup-*.tar.xz initrd-ssh-cryptsetup.installoutput)
- bump
- Delete generated archive file if any