From owner-freebsd-hackers@freebsd.org Sat Sep 12 22:46:33 2020 Return-Path: Delivered-To: freebsd-hackers@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 3AB443E49A4 for ; Sat, 12 Sep 2020 22:46:33 +0000 (UTC) (envelope-from eric@metricspace.net) Received: from mail.metricspace.net (static-108-31-38-18.washdc.fios.verizon.net [108.31.38.18]) by mx1.freebsd.org (Postfix) with ESMTP id 4BpnmR5qwfz4bvW for ; Sat, 12 Sep 2020 22:46:31 +0000 (UTC) (envelope-from eric@metricspace.net) Received: from [IPv6:2001:470:1f11:617:3210:b3ff:fe77:ca3f] (unknown [IPv6:2001:470:1f11:617:3210:b3ff:fe77:ca3f]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange ECDHE (P-384) server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) (Authenticated sender: eric) by mail.metricspace.net (Postfix) with ESMTPSA id 66AFB11478 for ; Sat, 12 Sep 2020 22:46:30 +0000 (UTC) To: freebsd-hackers@freebsd.org From: Eric McCorkle Subject: ZFS encryption and loader Autocrypt: addr=eric@metricspace.net; prefer-encrypt=mutual; keydata= mDMEXonLJBYJKwYBBAHaRw8BAQdA4oHU11A8qtqD0EtRofyORHbGX1ZIT/mnk9eceKQx56q0 JEVyaWMgTWNDb3JrbGUgPGVyaWNAbWV0cmljc3BhY2UubmV0PoiZBBMWCABBAhsDBQkB4TOA BQsJCAcCBhUKCQgLAgQWAgMBAh4BAheAFiEEPfuJobsx0Me4pIwLPOOjZtwQVqwFAl6JzIAC GQEACgkQPOOjZtwQVqy2DgD+IRCNNfb7C16fjEHazDMBwmBIMz+CTJUdhoz73P9iy0cA/ixK 83qOW46q1fpCpaZtPvv0FRpcZ5EppnNQ0Yuh40YLuDgEXonLJBIKKwYBBAGXVQEFAQEHQCxw rRXlvDoXgDGv2WMrLy9UaJ4fNWXIdlaiiKZIH7lBAwEIB4h+BBgWCAAmFiEEPfuJobsx0Me4 pIwLPOOjZtwQVqwFAl6JyyQCGwwFCQHhM4AACgkQPOOjZtwQVqxS7wD+JgzZC4995EL9j2iB qhPUZTIgs61IypLoDx+o1zsSfvkBALs+/jvkQL4plT0hGtfFaa0iMnLeIXKd/1FSNGSD9hQI Message-ID: <676dfde0-4202-1dc9-f90c-420fe9bbae27@metricspace.net> Date: Sat, 12 Sep 2020 18:46:20 -0400 User-Agent: Mozilla/5.0 (X11; FreeBSD amd64; rv:68.0) Gecko/20100101 Thunderbird/68.11.0 MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="MdwR9JJrKKe9A9tlNeYTSgAXS5EodMik3" X-Rspamd-Queue-Id: 4BpnmR5qwfz4bvW X-Spamd-Bar: - Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=none (mx1.freebsd.org: domain of eric@metricspace.net has no SPF policy when checking 108.31.38.18) smtp.mailfrom=eric@metricspace.net X-Spamd-Result: default: False [-1.89 / 15.00]; RCVD_VIA_SMTP_AUTH(0.00)[]; ARC_NA(0.00)[]; FREEFALL_USER(0.00)[eric]; FROM_HAS_DN(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MID_RHS_MATCH_FROM(0.00)[]; HAS_ATTACHMENT(0.00)[]; MIME_GOOD(-0.20)[multipart/signed,multipart/mixed,text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-hackers@freebsd.org]; AUTH_NA(1.00)[]; RCPT_COUNT_ONE(0.00)[1]; NEURAL_HAM_LONG(-0.96)[-0.955]; TO_DN_NONE(0.00)[]; NEURAL_SPAM_SHORT(0.37)[0.375]; DMARC_NA(0.00)[metricspace.net]; NEURAL_HAM_MEDIUM(-0.21)[-0.211]; SIGNED_PGP(-2.00)[]; R_SPF_NA(0.00)[no SPF record]; RCVD_NO_TLS_LAST(0.10)[]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:+,3:~]; ASN(0.00)[asn:701, ipnet:108.31.0.0/16, country:US]; RCVD_COUNT_TWO(0.00)[2]; MAILMAN_DEST(0.00)[freebsd-hackers] X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.33 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 12 Sep 2020 22:46:33 -0000 This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --MdwR9JJrKKe9A9tlNeYTSgAXS5EodMik3 Content-Type: multipart/mixed; boundary="XOftPZwQwI7Ugj4pCklj4qbreuKZ4bOwF"; protected-headers="v1" From: Eric McCorkle To: freebsd-hackers@freebsd.org Message-ID: <676dfde0-4202-1dc9-f90c-420fe9bbae27@metricspace.net> Subject: ZFS encryption and loader --XOftPZwQwI7Ugj4pCklj4qbreuKZ4bOwF Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: quoted-printable I'm thinking of migrating to ZFS encryption from GELI in the near future.= Does anyone know offhand what the state of support for ZFS encryption in loader looks like, and if there's support for passing keys to the kernel for boot-time loading? (I can look at adding these if they're missing) --XOftPZwQwI7Ugj4pCklj4qbreuKZ4bOwF-- --MdwR9JJrKKe9A9tlNeYTSgAXS5EodMik3 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- iHUEARYIAB0WIQQ9+4mhuzHQx7ikjAs846Nm3BBWrAUCX11PvAAKCRA846Nm3BBW rAmYAP0dffylp5Qb1gBV+eg2LsuY1y1db0XwOxXl8YfV5ggDnwD9GgSuiJB6dhQ7 XzM3EAhXgNiJcctuRuCsd9TXnSspWA4= =gHeC -----END PGP SIGNATURE----- --MdwR9JJrKKe9A9tlNeYTSgAXS5EodMik3--