Full Disk Encryption: Difference between revisions
imported>MrVanDalo mNo edit summary |
imported>Chexier Update boot.initrd.luks.devices configuration |
||
Line 27: | Line 27: | ||
"..." | "..." | ||
boot.initrd.luks.devices = | boot.initrd.luks.devices = { | ||
luksroot = { | |||
device = "/dev/disk/by-id/<disk-name>-part2"; | |||
allowDiscards = true; | |||
keyFileSize = 4096; | |||
# pinning to /dev/disk/by-id/usbkey works | |||
keyFile = "/dev/sdb"; | |||
}; | |||
}; | |||
}</syntaxhighlight> | }</syntaxhighlight> | ||
As of right now (2017-08-18) the NixOS options do not provide means to hide a key after the MBR as described in [https://bbs.archlinux.org/viewtopic.php?id=158507 this article in the archlinux forums]. More specificially you will need to be able to provide a keyOffset | As of right now (2017-08-18) the NixOS options do not provide means to hide a key after the MBR as described in [https://bbs.archlinux.org/viewtopic.php?id=158507 this article in the archlinux forums]. More specificially you will need to be able to provide a keyOffset | ||
Line 112: | Line 111: | ||
}; | }; | ||
boot.loader.efi.efiSysMountPoint = "/boot/efi"; | boot.loader.efi.efiSysMountPoint = "/boot/efi"; | ||
boot.initrd.luks.devices = | boot.initrd.luks.devices = { | ||
root = { | |||
device = "/dev/disk/by-uuid/TODO"; | |||
preLVM = true; | |||
}; | |||
}; | |||
</syntaxhighlight> | </syntaxhighlight> | ||
= zimbatm's laptop recommendation = | = zimbatm's laptop recommendation = |