diff options
| author | Josh Rahm <joshuarahm@gmail.com> | 2023-02-25 12:06:25 -0700 |
|---|---|---|
| committer | Josh Rahm <joshuarahm@gmail.com> | 2023-02-25 12:06:25 -0700 |
| commit | 1a669da23bea9bb8c74cafd92e0819249ff13493 (patch) | |
| tree | 65bca35b435ed68de7defe509f5697a782fb6d0d /example.conf | |
| parent | 10c1fe4071f248e976d920b3ca29971670893f33 (diff) | |
| download | acquire-key-over-ssh-1a669da23bea9bb8c74cafd92e0819249ff13493.tar.gz acquire-key-over-ssh-1a669da23bea9bb8c74cafd92e0819249ff13493.tar.bz2 acquire-key-over-ssh-1a669da23bea9bb8c74cafd92e0819249ff13493.zip | |
Add ability to acquire the key from a separate drive and shred the key when finished.
Diffstat (limited to 'example.conf')
| -rw-r--r-- | example.conf | 45 |
1 files changed, 45 insertions, 0 deletions
diff --git a/example.conf b/example.conf new file mode 100644 index 0000000..cacf0f1 --- /dev/null +++ b/example.conf @@ -0,0 +1,45 @@ +# This is an example configuration for the acquire-key-over-ssh module + +# This is the interface the keyserver will be on. This script should +# wait until this interface is up before trying to connect to the keyserver. +keyserver_interface=eno2 + +# This is the host that contains the ssh server with the key. +keyserver_host=192.168.12.34 + +# The host's ssh port. +keyserver_port=22 + +# Username to ssh into. +keyserver_user=keyper + +# Uncomment the following if the key is stored on a block device. +# +# This device will be mounted before the key is retrieved. +# +# client_ssh_keys_device='/dev/disk/by-uuid/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx' + +# The mountpoint to mount the ssh-key drive on (from above). +# Uncomment if using the above configuration for keys stored on a device. +# This is where the script will mount the block device to. +# +# client_ssh_keys_mountpoint="/mnt/boot/" + +# The location of the identity file (after mounting). +# This defaults to /root/.ssh/id_rsa +# +# client_identity_file="/mnt/boot/ghost_key" + +# Shred the keys after use. This is useful to minimize the time an unencrypted +# private key is on disk. Only really makes sense if the keys are on disk. +# +# One can set up a systemd service that places the identity key on the drive +# during a routine shutdown, where it will be picked up, used to acquire the +# decryption key, and shredded. +# +# Assuming the drive can be mounted, the script will always shred the keys +# if this is set even if authentication failed. +# +# shred_keys_after_use=1 + +add_dracutmodules+=" acquire-key-over-ssh " |