Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add auto-unlocking support #27

Open
wants to merge 5 commits into
base: master
Choose a base branch
from

Conversation

mkszuba
Copy link

@mkszuba mkszuba commented Jan 20, 2021

I would very much like you to consider merging this, as non-interactive authentication is IMHO the one killer feature still missing from sedutil PBA. The original PR, aimed at original DTA sedutil, can be found here: Drive-Trust-Alliance#86.

If the original author is no longer around or not interested in adapting this to the current master, I am willing to step in.

Original PR description follows.


This will allow the SSD to be unlocked with any combination of:

  • USB device plugged at boot time
  • Reading from a TPM NVRAM slot (with or without a password)
  • Using a Yubikey Challenge/Response (requires a password)

This gives much more flexibility in unlocking the SSD and allows the actual SSD encryption password to be completely random (which is more secure) while still allowing an easy way to unlock the SSD as long as a second factor is present and conditions are met.

@rustPyth
Copy link

Brilliant!
I am looking for this Auto unlocking as well!
I have built the USB boot disk with sedutil.com instruction,
Please how can I load this Auto unlocking function?
Thanks

@jimkoen
Copy link

jimkoen commented Apr 30, 2021

Does the autounlock work with TPM1.2 based systems as well?

@jimkoen
Copy link

jimkoen commented Jun 2, 2021

I would very much like you to consider merging this, as non-interactive authentication is IMHO the one killer feature still missing from sedutil PBA. The original PR, aimed at original DTA sedutil, can be found here: Drive-Trust-Alliance#86.

If the original author is no longer around or not interested in adapting this to the current master, I am willing to step in.

Original PR description follows.

This will allow the SSD to be unlocked with any combination of:

* USB device plugged at boot time

* Reading from a TPM NVRAM slot (with or without a password)

* Using a Yubikey Challenge/Response (requires a password)

This gives much more flexibility in unlocking the SSD and allows the actual SSD encryption password to be completely random (which is more secure) while still allowing an easy way to unlock the SSD as long as a second factor is present and conditions are met.

I think the original author is dead jim, If you could step in, that would be amazing.

@bluecmd
Copy link

bluecmd commented Jun 2, 2021

Shameless plug; I have written a Go library to replace having to use sedutil - https://github.com/bluecmd/go-tcg-storage - and I am implementing a PBA based on u-root at my place of work (https://github.com/elastx/elx-pba). Happy to accept contributions there if you want! We will use machine UUID to unlock disks, but happy to include support for TPMs etc if somebody else wants to write and maintain it.

We currently use sedutil-cli to do the initial setup and our own PBA image to do the "every day" unlocking.

I am available at the Open Source Firmware Slack (https://slack.osfw.dev/) if anyone wants to discuss this more!

@romanad
Copy link

romanad commented Feb 1, 2022

Please consider to add auto-unlock feature.

@i-sheremet
Copy link

+1 For the feature 🙏

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

8 participants