blob: a27d49979d117a0a8516fd60c5a5cab6654506db (
about) (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
|
mkinitcpio-ykfde
================
**Full disk encryption with Yubikey (Yubico key)**
This allows to automatically unlock a LUKS encrypted hard disk from `systemd`-
enabled initramfs.
Requirements, building, installing and usage
--------------------------------------------
Most of this is generic, but it still differs in detail for
distributions. Please look at what matches best for you.
* [mkinitcpio based initramfs (Arch Linux, ...)](README-mkinitcpio.md)
* [dracut based initramfs (Fedora, ...)](README-dracut.md)
Limitation / TODO
-----------------
* [systemd password agents](http://www.freedesktop.org/wiki/Software/systemd/PasswordAgents/)
do not support nested queries. That is why we can not ask for a
password ourselfs, breaking two factor authentication (2FA).
* When using your additional initramfs `grub-mkconfig` does not know
about that. Regenerating `grub` configuration file `grub.cfg` will
overwrite our changes.
### Upstream
URL: [GitHub.com](https://github.com/eworm-de/mkinitcpio-ykfde)
Mirror: [eworm.de](http://git.eworm.de/cgit.cgi/mkinitcpio-ykfde/)
|