mail archive of the rauc mailing list
 help / color / mirror / Atom feed
From: Brian Hutchinson <b.hutchman@gmail.com>
To: "Jan Lübbe" <jlu@pengutronix.de>, rauc@pengutronix.de
Subject: Re: [RAUC] Stumped, have a appfs partition that is encrypted, how to get RAUC to update it
Date: Fri, 23 Jul 2021 08:45:11 -0400	[thread overview]
Message-ID: <CAFZh4h_UAbL_f6Wu=OYSyH3JDe5Z4SYP=hc_OhyQjR-aJ9dgOw@mail.gmail.com> (raw)
In-Reply-To: <CAFZh4h8Hd+sBBNz9m1ZJvnHEg9hsL4R19cmKJ21Y9Asiss2B5Q@mail.gmail.com>


[-- Attachment #1.1: Type: text/plain, Size: 2617 bytes --]

On Thu, Jul 22, 2021 at 8:55 AM Brian Hutchinson <b.hutchman@gmail.com>
wrote:

>
> Hi Jan,
> D
> On Thu, Jul 22, 2021 at 8:16 AM Jan Lübbe <jlu@pengutronix.de> wrote:
>
>> On Thu, 2021-07-22 at 08:11 -0400, Brian Hutchinson wrote:
>> > Hello again,
>>
>> Hi!
>>
>> > I'm wanting to have a rootfs that is read-only SquashFS and a appfs
>> that is
>> > encrypted.
>>
>> I assume you want to have a A/B appfs.
>>
>
> Yes, have A/B for Kernel, dtb, rootfs and appfs.
>
>
>> How do you encrypt your appfs? dm-crypt or fscrypt?
>>
>
> So process in factory will set everything up on eMMC the first time with:
>
> cryptsetup luksFormat /dev/mmcblk2p1 & /dev/mmcblk2p2
> cryptsetup luksOpen /dev/mmcblk2p1 crypt_appfs1 (same thing for
> /dev/mmcblk2p2)
> mkfs.ext4 /dev/mapper/crypt_appfs1 & crypt_appfs2
>
> Then in normal use just have a script that figures out which slots we are
> starting, A or B to determine with appfs partition to use and cryptsetup
> luksOpen then mount /dev/mapper.
>
>
>
>> > And I'm kind of stumped.  I've searched the Documentation and archives
>> and it
>> > doesn't look like RAUC has native support for encrypted partitions but
>> in the
>> > archives I saw where one gentleman needed to create encrypted bundles
>> so this
>> > might be similar to my problem.
>>
>> Bundle encryption is independent of encryption in the rest of the system.
>>
>> > I know a bundle can have pre and post triggers so maybe I can use those
>> to
>> > cryptsetup luksOpen the partition and then mount it and then RAUC can
>> do it's
>> > normal thing ... but I've not researched that enough to know if that's
>> the way
>> > to go so thought I'd ask for some guidance to point me in the right
>> direction
>> > first.
>>
>> If you use dm-crypt, you can just use the device-mapper path for the
>> slot's
>> device= propert in system.conf. That way, the encryption is transparent
>> to rauc.
>>
>
> Not following how that would work since the inactive appfs would be
> "closed/encrypted".
>
> Thanks!
>
> Regards,
>
> Brian
>
>
Sorry, forgot to reply-all to last message.  So when I did my luksFormat
etc., I used a key-file that I created with openssl rand -base64 32 >
luks_appfs_key.  Are you telling me that if I add a key and put it in the
rauc key ring in /etc/rauc and in my system.conf refer to my appfs by
/dev/mapper name rauc will know what to do to "open" the inactive appfs to
do the update?

I guess I'm hung up on how the "open" will take place and how to tell rauc
about the key to use etc.

Regards,

Brian

[-- Attachment #1.2: Type: text/html, Size: 4700 bytes --]

[-- Attachment #2: Type: text/plain, Size: 66 bytes --]

_______________________________________________
RAUC mailing list

  parent reply	other threads:[~2021-07-23 12:45 UTC|newest]

Thread overview: 9+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2021-07-22 12:11 Brian Hutchinson
2021-07-22 12:16 ` Jan Lübbe
     [not found]   ` <CAFZh4h8Hd+sBBNz9m1ZJvnHEg9hsL4R19cmKJ21Y9Asiss2B5Q@mail.gmail.com>
2021-07-23 12:45     ` Brian Hutchinson [this message]
2021-07-23 13:40     ` Jan Lübbe
2021-07-30 13:33       ` Brian Hutchinson
2021-07-30 14:20         ` Brian Hutchinson
2021-07-30 16:29           ` Jan Lübbe
2021-08-02 15:22             ` Brian Hutchinson
2021-08-02 15:39               ` Jan Lübbe

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to='CAFZh4h_UAbL_f6Wu=OYSyH3JDe5Z4SYP=hc_OhyQjR-aJ9dgOw@mail.gmail.com' \
    --to=b.hutchman@gmail.com \
    --cc=jlu@pengutronix.de \
    --cc=rauc@pengutronix.de \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox