Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Consistency in kernel key list usage #276

Open
phedders opened this issue May 26, 2024 · 1 comment
Open

Consistency in kernel key list usage #276

phedders opened this issue May 26, 2024 · 1 comment

Comments

@phedders
Copy link

Short version - it seems "bcachefs unlock" gets a key into the @U user list, but bcachefs mount searches for a key in the @s session list.

Advice in various places suggests to use keyctl link @U @s - however this does not always work.

If my suspicion is correct, then it would make more sense for unlock to put the key in the Session list OR for mount to check the User list.

My preference would be that mount checks @U AND @s. Kent suggested it would be more secure for unlock to put the key in the session list. In my experience so far, the kernel session list is very flakey.

I am also no sure why (perhaps this is a second issue?) it is required to unlock before mount anyway - bcachefs mount asks for a passphrase but doesnt seem to use it.

OBThanks: to Kent and all the others creating this amazing code - thankyou!

@tmuehlbacher
Copy link

I think that this should be better in v1.9.1 or even completely resolved?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants