tinyssh is great. One use case for it that people may not know about: using it during Linux boot so you can remotely unlock encrypted drives. I have a headless NAS server that uses dm-crypt/LUKS under ZFS. When I update my kernel/ZFS I remotely reboot the server, wait a few seconds, and then ssh into a tinyssh powered encryption key prompt to unlock the drives. (I am immediately booted from ssh, as tinyssh exits.) I can then ssh again a few seconds later and I'm hitting openssh on a fully booted machine that wasn't able to open the drives without my intervention.https://github.com/grazzolini/mkinitcpio-tinyssh
jethro_tell|1 year ago
No reason to support two ssh daemons when you can do it with one.
The difference in size on your init image is minimal and you probably aren't even trying to optimize for space there.
If you don't know the size of your rd off the top of your head then it almost certainly doesn't matter.
streb-lo|1 year ago
https://wiki.archlinux.org/title/dm-crypt/Specialties#Remote...
bretthoerner|1 year ago
forty|1 year ago
At some point I wanted to do something with utrablue [1], to work over network rather than Bluetooth, but then it was in go and I got lazy suddenly :)
[1] https://github.com/ANSSI-FR/ultrablue
bretthoerner|1 year ago
In my case, I can't. This is a NAS in my house and this is mostly to prevent me from having to go to another room and plug in a monitor and keyboard. (Also, I've done this from across the country after a power outage.)
The threat vectors I'm protecting against are I guess mostly theft of the entire machine, or forgetting to wipe the drives when I eventually toss them out. Mostly, it's just fun practice because I'm a nerd and every drive should be encrypted.
For my use-case, the auto-unlock-by-polling-a-specific-LAN-IP linked in this thread would probably be fine, for example.
crote|1 year ago
teddyh|1 year ago
The idea is that you should configure the timeout to be long enough to allow for a normal kernel panic and reboot, but hopefully short enough that it would be hard for anyone to compromise the server in that time. It’s not a perfect solution, but it’s the best anyone has come up with as far as I know.
(Disclosure: I am a co-author of Mandos.)
mbreese|1 year ago
The server itself may have been physically breached, and if so you can’t trust anything. But, if your host key matches, you should be confident that at least you’re logging into the correct machine (there was no IP takeover).
rand846633|1 year ago
If the booting machine has been compromised and i use my usb connected keyboard to enter the full disk encryption key I would run into the exact same issues, no?
jsmith99|1 year ago
pmorici|1 year ago
toast0|1 year ago
This is for my personal hosting which if someone wants to take over, I guess I'd be more curious than upset.
slug|1 year ago
https://packages.debian.org/bookworm/dropbear-initramfs https://packages.ubuntu.com/jammy/dropbear-initramfs
teddyh|1 year ago
(Obligatory disclaimer: I am a co-author of Mandos)
justin_oaks|1 year ago
gymbeaux|1 year ago
bretthoerner|1 year ago
orev|1 year ago
babuskov|1 year ago
https://access.redhat.com/documentation/en-us/red_hat_enterp...
It's fully automated and supposed to be much more secure.
Has anyone got experience with it?
traceroute66|1 year ago
Clevis+Tang is good. There's also Keylime which takes a different approach to the same[1].
[1] https://keylime.dev/
soraminazuki|1 year ago
ahepp|1 year ago
teddyh|1 year ago
Reboot your server while you sleep!
Disclosure: I am a co-author of Mandos.
jethro_tell|1 year ago
krab|1 year ago
https://github.com/ViktorStiskala/cryptsetup-ssh-unlocker
teddyh|1 year ago
(Again, disclosure: I am the co-author of Mandos.)
1vuio0pswjnm7|1 year ago
Agreed.
A static tinysshd works well for the small userlands I create.