Control: tag -1 moreinfo

Hi,

On Tue, 19 Mar 2024 at 12:37:08 +0100, Daniel Gröber wrote:
> In that setup there's really no point to reusing the hosts' private
> keys and expose them in the initrd unencrypted.

Agreed, but AFAICT that's not the case anymore since 2015.68-1.  New
host keys are generated at postinst stage, and used for initramfs only.
But not when upgrading of course, as this would break pinned key
material.

    
https://salsa.debian.org/debian/dropbear/-/commit/1c4975743d659b121231b30f8e641b211b1448ee

So AFAICT the host's private keys are only used when upgrading from
pre-2015.68-1, and in that case the change should be announced via
d/NEWS.

> Would you accept a patch to allow configuring the dropbear hook
> behaviour to generate a new host key instead of reusing the host's
> key?

What would be use case of generating transient keys when generating the
initramfs image?  Such keys would not be pinable, and if that's
acceptable then a similar behavior (keys generated at boot time not at
initramfs generation time) can be achieved with DROPBEAR_OPTIONS="-R".

Cheers,
-- 
Guilhem.

Attachment: signature.asc
Description: PGP signature

Reply via email to