Control: tag -1 moreinfo Hi,
On Tue, 19 Mar 2024 at 12:37:08 +0100, Daniel Gröber wrote: > In that setup there's really no point to reusing the hosts' private > keys and expose them in the initrd unencrypted. Agreed, but AFAICT that's not the case anymore since 2015.68-1. New host keys are generated at postinst stage, and used for initramfs only. But not when upgrading of course, as this would break pinned key material. https://salsa.debian.org/debian/dropbear/-/commit/1c4975743d659b121231b30f8e641b211b1448ee So AFAICT the host's private keys are only used when upgrading from pre-2015.68-1, and in that case the change should be announced via d/NEWS. > Would you accept a patch to allow configuring the dropbear hook > behaviour to generate a new host key instead of reusing the host's > key? What would be use case of generating transient keys when generating the initramfs image? Such keys would not be pinable, and if that's acceptable then a similar behavior (keys generated at boot time not at initramfs generation time) can be achieved with DROPBEAR_OPTIONS="-R". Cheers, -- Guilhem.
signature.asc
Description: PGP signature