On Tue, 2016-03-15 at 16:59 -0400, Nathaniel McCallum wrote:
> Sorry for the cross-post! However, I figured it was the best way to
> reach all the right people.
> 
> I'm the author of the Tang[1] project. In a nutshell, Tang provides a
> way to bind an encrypted disk to a network. We currently provide
> automated unlocking of the root volume (via initramfs/systemd).
> 
> However, one of our use cases is securing removable devices so that
> they can only be unlocked when the host computer is on a secure
> network. I have looked a bit at the code for GVFS and udisks, but it
> wasn't immediately obvious to me the best way to proceed in adding
> support for this. So I'm here looking for suggestions.
> 
> More or less, in order to automatically recover a disk's key we need
> read access to the LUKS header and network access to perform the Tang
> exchange. It would be my strong preference not to expose the metadata
> in the LUKS header to unpriviledge users.
> 
> I attempted to test this by provisioning a USB key using Tang. Upon
> insertion, GNOME (properly) prompts for the password. If I attempt to
> unlock the disk in the background during this operation, the password
> prompt is properly removed. However, the disk does not appear as a
> standard removable disk any more in Nautilus.
> 
> Thoughts? Suggestions?

Look at the output of "udisksctl dump". If your device shows up there,
and depending on the value of the various properties it exposes
(especially the hints), it might be a bug in gvfs' udisks-based volume
monitor.

Cheers
_______________________________________________
devkit-devel mailing list
devkit-devel@lists.freedesktop.org
https://lists.freedesktop.org/mailman/listinfo/devkit-devel

Reply via email to