public:unlocking_debian_luks_with_a_yubikey_at_boot
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| public:unlocking_debian_luks_with_a_yubikey_at_boot [2024/03/19 23:13] – [On the Debian system] thomas | public:unlocking_debian_luks_with_a_yubikey_at_boot [2024/03/22 23:20] (current) – thomas | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| ====== Unlocking Debian LUKS with a Yubikey at boot ====== | ====== Unlocking Debian LUKS with a Yubikey at boot ====== | ||
| + | |||
| + | You can use a Yubikey to unlock a Debian system at boot. For general info on managing LUKS, see [[public: | ||
| ===== On the Yubikey ===== | ===== On the Yubikey ===== | ||
| Line 79: | Line 81: | ||
| </ | </ | ||
| - | Now, only the combination of your Yubikey and passphrase will be able to unlock the disk! | + | Now, only the combination of your Yubikey |
| + | |||
| + | ===== Optional: bypass the passphrase ===== | ||
| + | :!: If you bypass the passphrase, you'll only rely on something you have, and not something you know. **I strongly advise against this** as it is less secure, but it can be preferred in some environments where interaction is not feasible. | ||
| + | |||
| + | Open ''/ | ||
| + | |||
| + | <code bash> | ||
| + | YUBIKEY_CHALLENGE=" | ||
| + | </ | ||
| + | |||
| + | Then, update your initramfs again: | ||
| + | <code bash> | ||
| + | update-initramfs -u | ||
| + | </ | ||
| ===== References ===== | ===== References ===== | ||
| https:// | https:// | ||
| https:// | https:// | ||
| + | |||
| + | {{tag> | ||
public/unlocking_debian_luks_with_a_yubikey_at_boot.1710890007.txt.gz · Last modified: by thomas
