Fedora encrypted disk unlocking via SSH
Introduction⌗
Since my keyboard and mouse are paired to my computer via Bluetooth and I always encrypt my hard drives with LUKS2, I ran into a chicken egg problem. At this early boot stage, the entire Bluetooth stack is not yet responsive. As a result, I can’t enter my password. The simplest solution is a wired keyboard, but then I would have multiple keyboards on the table and thus less space. Fortunately there is gsauthof/dracut-sshd an implementation to provide SSH access to initramfs early user space. As soon as you have identified yourself with your SSH key on the computer, you get the possibility to unlock the system. After successfully entering the password, the SSH session is closed and the boot process continues on the decrypted hard drive.
The documentation of this Dracut module is very well structured and easy to understand. Therefore I recommend everyone to have a look into the project repository. Since I have gone through the setup process a bit more often under Fedora, I still thought it would be useful to make a short write-up.
This guide was created on a Fedora 37 system.
Installation⌗
In the first step, we activate the Copr repository that belongs to the Dracut module and install the package.
It may be that a dependency called dracut-network
is installed too.
This is module is necessary to establish a network connection in the early boot phase.
In the next step we add two parameters to the kernel options in /etc/default/grub
:
rd.neednet=1
to make the network stack availableip=dhcp
so that the first network interface can get an IP from the DHCP (WARNING: footgun)
If the system has multiple active network ports, the IP configuration is handled on a first come, first served basis. In the worst case, it is then not possible to reach the machine via the actually desired network and to unlock it accordingly. This can be prevented by specifying the desired network interface and possibly even the entire IP configuration in the parameter.
For example a static IP configuration:
Or a dynamic one with specified interface:
More informations about ip networking in early user space:
The modification in /etc/default/grub
should look something like this:
In the next step, we need to activate the new boot configuration. To do this, we execute the following commands:
For successful authentication to the SSH server, we need to make sure that an authorized key is configured for the root user:
On recent Fedora installations root accounts are locked with !
instead of *
in /etc/shadow
by default.
According to the documentation of the module it is sufficient to specify an asterisk instead of an exclamation mark.
This is unfortunately wrong and another footgun!
Instead, a password must be created for the root user. Don’t worry, in the default OpenSSH server configuration the password login for the superuser is forbidden. So the system will not become more insecure.
Finally we can now update the initramfs configuration with Dracut:
The following modules should now appear in the output of the command:
After restarting the system, the decryption prompt appears as usual. Additionally, we can now connect to the machine via SSH to enter the password.
Hint⌗
I recommend everyone to fully encrypt dedicated servers. With dracut-sshd unlocking is now much easier and does not need BMC or remote KVM. On my Hetzner server I was able to configure this module without a KVM using chroot and a rescue image.
If you prefer a completely passwordless but network-bound solution, you may like to read on here: