I’m happy with regular password FDE, i think i’m more likely to encounter hardware failure (and then need to read the drive from another machine) than theft of the drive.
It’s a good point though, I’m sure many people do need this feature. Ubuntu is “working on it” but so far i guess it’s mostly not working except for VMs
I have a media center that serves over the internet via VPN, I don’t want to leave it unencrypted but I also don’t want to have to go home and type in a pass every time California has a power outage, which is monthly during the dry fire season and >monthly during the “storm” season. I wouldn’t care as much for my personal laptop or anything, but for servers it seems like an absolute must have and…what is Linux for if not servers?
I think the traditional way to do that is via dm-crypt, which you can set up with an ssh server.
You can also use a network-shared file rather than a password for LUKS but it’s not as straightforward to set up as a password. If you are doing something like tailscale then it’d be unlocked as long as you are on the VPN
Typing in a password in-person at a data center would be a huge hassle, agreed
But…it’s literally what the tpm chip is for. Like there may be other options, but the tpm chip’s purpose in life is to do this thing. And it’s been doing that for a decade. Seems pretty traditional to me. But Linux folks in some venues treat it like a plague that needs to be eradicated.
Windows requires pressing next 12 times, what are you people smoking and can I haz?
See, Ubuntu only requires pressing next 6 times, and Fedora is only 8.
That’s essentially what it boils down to nowadays.
Unless you want tpm backed full disk encryption in which case… Good luck
One click for Mac and windows, a lifetime of fun for Linux (except arch w/sysdboot which works pretty good)
I’m happy with regular password FDE, i think i’m more likely to encounter hardware failure (and then need to read the drive from another machine) than theft of the drive.
It’s a good point though, I’m sure many people do need this feature. Ubuntu is “working on it” but so far i guess it’s mostly not working except for VMs
I have a media center that serves over the internet via VPN, I don’t want to leave it unencrypted but I also don’t want to have to go home and type in a pass every time California has a power outage, which is monthly during the dry fire season and >monthly during the “storm” season. I wouldn’t care as much for my personal laptop or anything, but for servers it seems like an absolute must have and…what is Linux for if not servers?
I think the traditional way to do that is via dm-crypt, which you can set up with an ssh server.
You can also use a network-shared file rather than a password for LUKS but it’s not as straightforward to set up as a password. If you are doing something like tailscale then it’d be unlocked as long as you are on the VPN
Typing in a password in-person at a data center would be a huge hassle, agreed
But…it’s literally what the tpm chip is for. Like there may be other options, but the tpm chip’s purpose in life is to do this thing. And it’s been doing that for a decade. Seems pretty traditional to me. But Linux folks in some venues treat it like a plague that needs to be eradicated.
Looking at RHEL docs it seems to also work there. The same instructions probably work in Fedora but idk I’ve never done it myself
I’ve done the recommendation for opensuse and fedora, both failed to boot properly. Weirdly arch was the easy one that worked out of box.