You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I am customizing the official Flatcar image to integrate our components and encrypting the root partition using LUKS. The root partition is mounted on a separate system, and I’ve configured crypttab and fstab for automatic decryption during boot. However, the system fails to boot, and I observe the following errors during boot time:
Steps to Reproduce
Convert the Flatcar QEMU image to a raw disk image: qemu-img convert -O raw flatcar_production_qemu_image.img flatcar.raw
Set up the loop device and encrypt the root partition:
During boot, systemd-cryptsetup reads this configuration line.
It identifies the encrypted partition at /dev/disk/by-partlabel/ROOT.
Instead of prompting for a password or using a key file, it uses the TPM2 chip to automatically unlock the partition.
Once decrypted, the partition is made available at /dev/mapper/rootencrypted.
Impact
The system must have a TPM2 chip, and it must be properly configured and enabled in the BIOS/UEFI. If the TPM2 chip is missing or misconfigured, the partition will not be decrypted.
Ideal future situation
It should support manual password entry or a key from disk during boot time.
Current situation
I am customizing the official Flatcar image to integrate our components and encrypting the root partition using LUKS. The root partition is mounted on a separate system, and I’ve configured
crypttab
andfstab
for automatic decryption during boot. However, the system fails to boot, and I observe the following errors during boot time:Steps to Reproduce
Convert the Flatcar QEMU image to a raw disk image:
qemu-img convert -O raw flatcar_production_qemu_image.img flatcar.raw
Set up the loop device and encrypt the root partition:
After looking into code found that at boot time following things happen:
https://github.com/flatcar/bootengine/blob/flatcar-master/dracut/31decrypt-root/decrypt-root.service
Impact
The system must have a TPM2 chip, and it must be properly configured and enabled in the BIOS/UEFI. If the TPM2 chip is missing or misconfigured, the partition will not be decrypted.
Ideal future situation
It should support manual password entry or a key from disk during boot time.
Implementation options
This needs to be modified to allow other methods to decrypt the ROOT partition =>dracut/31decrypt-root/decrypt-root.service/
The text was updated successfully, but these errors were encountered: