/srv/irclogs.ubuntu.com/2022/10/09/#ubuntu-server.txt

lolekalkisg: hi, last time you gave the link to a repo with scripts to have working vlan with dropbear during boot. I'm reading the readme and checking the scripts yet I'm not sure with one thing. After boot I should also properly configure the networking so the network scripts etc to have vlans and so on?07:41
alkisgHi lolek , I haven't actually used dropbear but from a quick glance I did last time, it seems to me it brings down networking on exit; so yes you're supposed to properly configure networking using netplan, vlans etc later on07:43
lolekok, that's awsome07:43
lolekbut hmm you said you haven't used it so you're using something else?07:43
alkisglolek: I'm very familiar with initramfs-tools because I'm developing ltsp.org, but no, I'm not using full disk encryption07:44
lolekoh ok07:45
alkisgWell actually I do need to unlock home automatically on some servers, but I'm using home-grown scripts to ask data from nearby servers and make sure the server is still onsite, and then I unlock it automatically, not manually07:45
alkisg*encrypted home07:45
lolekalkisg: the ltsp... nice... well καλημέρα then ;) 07:46
alkisgΚαλημέρα! :D07:46
alkisgI.e. each server provides an md5sum of its hardware (even asks some from remote locations), then they are xor'ed, then the result unlocks a gpg encoded secret, which unlocks home07:46
alkisgSo attackers would need to steal all servers from multiple sites to get the unlocking to work07:47
lolekinteresting approach 07:50
arraybolt3[m]alkisg: md5? I mean it should be enough, but I'd want to use SHA256 to avoid spoofing.07:54
alkisgarraybolt3: the key is that they don't know the md5sum07:55
alkisgSpoofing works if they know it and they want to generate a source for it07:55
arraybolt3[m]Ah, makes sense. I must be tired :)07:55
=== rfm_ is now known as rfm
=== Eickmeyer is now known as NotEickmeyer
=== Eickmeyer0 is now known as Eickmeyer

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!