Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 21 Jul 2021 12:43:52 +0000
From:      bugzilla-noreply@freebsd.org
To:        geom@FreeBSD.org
Subject:   [Bug 254637] [PATCH] Read kern.geom.eli.passphrase from UEFI variable for unattended boot without passphrase on disk
Message-ID:  <bug-254637-14739-Z6y1rK00TA@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-254637-14739@https.bugs.freebsd.org/bugzilla/>
References:  <bug-254637-14739@https.bugs.freebsd.org/bugzilla/>

next in thread | previous in thread | raw e-mail | index | archive | help

https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=254637

--- Comment #1 from ruben@verweg.com ---
Tried the patch on VMWare and a Clevo NL5xRU notebook with the geli password as
a efi var.
Besides VMWare UEFI being fickly works as intended. 

Though this is not UEFI secure boot it is a convenient way for server systems
to have both full disk encryption and unattended reboots. 

I feel it is at the administrators discretion to determine wether to have a
key/passphrase in unprotected nvram is different than on a unprotected boot
partition

It would address the need of people who installed their zfs systems using a
separate boot pool using preconfigured keys and want to consolidate that into a
single pool so bectl/beadm starts to work for them.

-- 
You are receiving this mail because:
You are the assignee for the bug.


Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-254637-14739-Z6y1rK00TA>