On Wednesday 04 November 2020 08:34:00 am Slávek Banko via tde-users wrote:
On Wednesday 04 of November 2020 13:06:32 Janek
Stolarek wrote:
Somehow I imagined/hoped that R14.0.9 will be followed by R14.1.0. What
is the roadmap for the R14.1.0 release? I am eagerly awaiting support
for decrypting encrypted external drives, which I believe Michele is
working on as part of R14.1.0.
Yes, support for unlocking / locking encrypted disks is one of the things
that will be in R14.1.0. If you want to test it, you can consider using
the PTB repository => Preliminary Testing Builds, which is based on the
master branch.
I've been using LUKS for a long time on several different distributions, all
with TDE installed. So this conversation has made me curious how TDE
having ‘support for unlocking / locking encrypted disks’ is different than
what is currently in use?
Current usage:
root keyfile {optional for non-root drives, must use passkey on root drive*}
/etc/crypttab
/etc/fstab
And AFAIK, that works for any drive (USB or otherwise) ‘see-able’ by the
system.
How’s the TDE process going to look? Will it interfere with current usage of
LUKS? (Seriously don’t want all my drives to just ‘stop working!’)
Thanks,
Michael
* That’s not technically true, there are some hybrid USB holds the passkey
methodologies. (Granted you’d probably want to store the USB in a safe. And
how paranoid do you have to be to not let an employee be able to unlock their
system by themselves....)