yubikey-full-disk-encryption

Use YubiKey to unlock a LUKS partition (by agherzan)

Yubikey-full-disk-encryption Alternatives

Similar projects and alternatives to yubikey-full-disk-encryption

NOTE: The number of mentions on this list indicates mentions on common posts plus user suggested alternatives. Hence, a higher number means a better yubikey-full-disk-encryption alternative or higher similarity.

yubikey-full-disk-encryption reviews and mentions

Posts with mentions or reviews of yubikey-full-disk-encryption. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-04-13.
  • I have seen in a lot of posts here people say not to use Google Authentication for 2FA. Can someone simply explain why, and what should I use instead?
    2 projects | /r/Bitwarden | 13 Apr 2023
  • LUKS with Yubikey
    2 projects | /r/voidlinux | 8 Apr 2023
    Would using this be possible? https://github.com/agherzan/yubikey-full-disk-encryption/tree/master/src
  • Getting LUKS, Btrfs, Hibernation and Swap file working in tandem
    4 projects | news.ycombinator.com | 9 Mar 2023
    > Hibernate is less interesting, and apparently unsupported using secure boot anyway.

    That's not the case. I have a similar setup to yours (/ on ext4 with separate swap, on LVM on LUKS, separate /efi) and my box hibernates just fine with secure boot and auto-unlock via TPM.

    The difference with your setup is I don't use grub, but have the UEFI load a signed unified kernel image directly. Since this works so well, I never had a reason to mess around with yet another moving piece (grub or other bootloader).

    As another commenter said, I haven't attempted to mess around with the MOK. I just replaced all the secure boot keys with my own, and I've also signed MS's Windows key (but not the 3rd party one) for my dual-boot needs.

    ---

    For specifics: This is an up-to-date Arch Linux install, running on an HP EliteBook 840 G8 (11th gen intel). I know Debian may have older components than arch, but this setup has been working for more than a year now.

    IIRC, the most significant change was brought by systemd 251 which started supporting auto-unlocking LUKS with the TPM. Before that, on an older computer with the same general setup, hibernation worked well, too. I just needed to input the unlock password (which I was too lazy to do, so I just used my yubikey - see https://github.com/agherzan/yubikey-full-disk-encryption).

  • systemd 253 Released With Ukify Tool, systemd-cryptenroll Unlocking Via FIDO2 Tokens
    1 project | /r/linux | 18 Feb 2023
    Does yubikey-full-disk-encryption provide anything systemd 253 doesn't now?
  • Tillitis Security Key – Mullvad spin-off inspired by measured boot and DICE
    3 projects | news.ycombinator.com | 19 Sep 2022
    Do you mean something like this: https://github.com/agherzan/yubikey-full-disk-encryption
  • Encrypt data on server (Linux, LUKS) on Raspberry Pi
    2 projects | /r/HomeServer | 13 Sep 2022
    Full disk encryption is rarely as portable as simply encrypting the files you need. When I ran a “homemade” NAS, I had everything LUKS encrypted. I used a Yubikey to unlock the encrypted data.
  • Using a YubiKey to unlock LUKS - How to secure or encrypt /boot?
    2 projects | /r/linuxquestions | 11 Sep 2022
    A few days ago I akquiriere a Yubikey and I'm currently trying to set up 2FA with the Yubikey and a password to unlock the LUKS container. Since I am running Arch I came across the yubikey-full-disk-encryption package and tested it in an Arch VM. So far it worked really well. The only issue I am having is that compared to my old setup I need to have /boot unencrypted because it seems GRUB itself cannot deal with the 2FA setup and ykfde if /boot is encrypted. Previously I had most of /boot inside the LUKS volume with only the /efi part unencrypted (this is used when telling grub where the efi-directory is - see the previous guide for the full details please) and the GRUB_ENABLE_CRYPTODISK=y option set in the GRUB config.
  • LUKS boot unlock fido2 issue
    2 projects | /r/archlinux | 11 Jun 2022
    I don't know about the hanging, I use yubikey-full-disk-encryption which uses challenge-response (1FA or 2FA) which you can set up how many attempts to use the YubiKey before it falls back to the passphrase.
  • Is it possible to crack drive encryption without header?
    1 project | /r/linux4noobs | 18 Feb 2022
    Related: https://github.com/agherzan/yubikey-full-disk-encryption
  • How safe is encryption?
    2 projects | /r/PrivacyGuides | 31 Dec 2021
    https://github.com/cornelinux/yubikey-luks or https://github.com/agherzan/yubikey-full-disk-encryption with yubikey 5 will get you going. It is a bit expensive to get two keys (regular and backup), but these can be also used to secure most of the online accounts.
  • A note from our sponsor - InfluxDB
    www.influxdata.com | 31 May 2024
    Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality. Learn more →

Stats

Basic yubikey-full-disk-encryption repo stats
16
787
0.0
25 days ago

Sponsored
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com