Hi,

We have a problem now with using FAI to do an install which sets up a 2nd hard drive as an encrypted volume.

Our previous FAI server was running fai-server 5.10.3, and this worked. We use a partitioning scheme like:

disk_config disk1 disklabel:gpt bootable:1 fstabkey:uuid
primary  /boot/efi  100MiB vfat  rw
primary  /  370GiB  ext4  rw
primary  swap       10GiB-20GiB    swap    sw

disk_config disk2 disklabel:gpt fstabkey:uuid
primary    -    390GiB-500GiB - -

disk_config cryptsetup
luks - disk2.1 - -


During partitioning, this would then create a luks key file in /tmp/fai. We would then use a script to copy this keyfile to a safe location and use it in /etc/crypttab to unlock the drive on boot.

However, a while ago we made a new FAI server, this one running fai-server 6.2.3. Now, FAI partitions the drive and makes the keyfile in /tmp/fai but then almost immediately deletes it (you can see it if you cd to /tmp/fai and ls at the exact right moment). Then of course, as they file no longer exists we can't copy it anywhere, and can't get the drive to unlock.

Looking at the setup-storage man pages, it says:

"Crypto support requires some site-specific changes: If you use cryptsetup stanza, a *crypttab*(5) file and key files for all luks volumes will be created (unless you used the passphrase option). The key files are left in /tmp/fai; you will want to copy these to some removable media."

So it looks like this is still supposed to be the behaviour. But does anyone know why the luks keyfile is being immediately deleted from /tmp/fai after the partitoning? And either a way to stop it being deleted or a way to copy the key to somewhere else before it is deleted?

We have just tried updating fai-server to to 6.4.1, and recreating the nfsroot, but with no change in this behaviour.

Thanks,

Richard Grant

University of Leicester

Antwort per Email an