On 07/04/2013 01:25:59 AM, Jérémy Bobbio wrote:
> Hi Karl,
> 
> Karl O. Pinc:
> > When installing dropbear after creating a cryptroot setup
> > dropbear creates new keys in /etc/initramfs-tools/etc/dropbear/
> > instead of using the keys in /etc/dropbear/.  This can cause
> > headaches when the ssh client compains of changed host keys.
> 
> This can cause headaches… but it is also a security feature.
> The initramfs must be stored unencrypted for the system to be able to
> boot. Using the same key as the running system means that the
> encrypted
> root will not protect the SSH key anymore.
> 
> It all depends on one's threat model, but I think that blindly
> reducing
> the security of the system SSH key is not a good idea…

Fair enough.

A couple of thoughts come to mind.  There should
at least be a note of this made in section 8 of the
README.Debian for cryptsetup.  (I'll see about
sending a patch.)

In my ideal world there would be
a debconf option which provides control over
whether or not there's a different host key
in the initramfs.  Perhaps this should be
recategorized as a wishlist item.

Regards,


Karl <k...@meme.com>
Free Software:  "You don't pay back, you pay forward."
                 -- Robert A. Heinlein


--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to