gchristensen changed the topic of #nixos-security to: Vulnerability Roundup Issues: https://github.com/NixOS/nixpkgs/issues?utf8=%E2%9C%93&q=is%3Aissue+is%3Aopen+Vulnerability+roundup + https://broken.sh
elvishjerricco has quit [Ping timeout: 260 seconds]
midchildan has quit [Ping timeout: 272 seconds]
tazjin has quit [Ping timeout: 260 seconds]
davidtwco has quit [Ping timeout: 260 seconds]
lirzhv has quit [Ping timeout: 260 seconds]
feepo has quit [Ping timeout: 260 seconds]
haiko has quit [Ping timeout: 260 seconds]
kalbasit has quit [Ping timeout: 272 seconds]
_ris has quit [Ping timeout: 252 seconds]
davidtwco has joined #nixos-security
davidtwco has quit [Ping timeout: 245 seconds]
anselmolsm has quit [Quit: Konversation terminated!]
justan0theruser has joined #nixos-security
justanotheruser has quit [Ping timeout: 258 seconds]
midchildan has joined #nixos-security
haiko has joined #nixos-security
lirzhv has joined #nixos-security
feepo has joined #nixos-security
elvishjerricco has joined #nixos-security
davidtwco has joined #nixos-security
kalbasit has joined #nixos-security
tazjin has joined #nixos-security
FRidh has joined #nixos-security
kleisli has quit [Ping timeout: 265 seconds]
vesper11 has quit [Ping timeout: 260 seconds]
vesper11 has joined #nixos-security
<flokli> gchristensen: look into the systemd-homed PR
<gchristensen> link?
* gchristensen won't click that
justan0theruser is now known as justanotheruser
Synthetica has joined #nixos-security
Bruno[m]1 has left #nixos-security ["User left"]
anselmolsm has joined #nixos-security
kleisli has joined #nixos-security
<flokli> Will gchristensen Google for it? ;-)
<gchristensen> probably not today, too busy
<flokli> With systemd master (or an already open PR), it should be possible to use a yubikey to decrypt a luks keyslot
<gchristensen> oh nice
<flokli> With in-initrd systemd, this should even be possible for the root container
<flokli> Homed is a bit more than that
<flokli> Basically, homedirs can be encrypted loop mounts, and the key to decrypt can come from your unlock password
<flokli> So it can wipe the decryption key from ram before suspending (freeze the volume), and can use the key later on
<flokli> Same with yubikeys there as well if I'm not mistaken
<flokli> The homed part is understandably quite new and controversial. But all the groundwork for better interaction and integration of crypto volumes did land in systemd too
<flokli> Which is another reason for why I want to finally fix the cryptsetup stuff :-D
<flokli> (systemd with cryptsetup support, that is)
_ris has joined #nixos-security
ris has joined #nixos-security
_ris has quit [Ping timeout: 240 seconds]
<{^_^}> zfsonlinux/zfs#9852 (by ghfields, 9 minutes ago, open): Autounlock ZFS Encrypted Root Filesystems using TPM 2.0
kleisli has quit [Ping timeout: 260 seconds]
kleisli has joined #nixos-security
kleisli has quit [Ping timeout: 260 seconds]
kleisli has joined #nixos-security
kleisli has quit [Ping timeout: 260 seconds]
kleisli has joined #nixos-security
kleisli has quit [Ping timeout: 260 seconds]
justanotheruser has quit [Ping timeout: 260 seconds]
justanotheruser has joined #nixos-security
Synthetica has quit [Quit: Connection closed for inactivity]