clevis VS linux-secureboot-kit

Compare clevis vs linux-secureboot-kit and see what are their differences.

clevis

Automated Encryption Framework (by latchset)

linux-secureboot-kit

Tool for complete hardening of Linux boot chain with UEFI Secure Boot (by Snawoot)
InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
clevis linux-secureboot-kit
25 1
816 66
2.1% -
6.2 0.3
13 days ago almost 4 years ago
Shell Shell
GNU General Public License v3.0 only MIT License
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

clevis

Posts with mentions or reviews of clevis. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-09-16.

linux-secureboot-kit

Posts with mentions or reviews of linux-secureboot-kit. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2021-01-03.
  • Linux-native TPM-backed Bitlocker
    5 projects | /r/linux | 3 Jan 2021
    u/Richard__M I am not sure how much you've dug into the architecture of Mortar, but TL;DR it bypasses grub entirely. A friend of mine developed Snawoot/linux-secureboot-kit which leverages grub's GPG capabilities to essentially daisy-chain trust and accomplish the same thing, but ran into frustrations with broken implementations of the feature with some distributions (*ahem* debian). In my opinion, chaining trust also introduces complexity which case lead to security vulnerabilities both from the software being chained, and through "oops" coding trying to get them to play nicely.

What are some alternatives?

When comparing clevis and linux-secureboot-kit you can also consider the following projects:

linux-luks-tpm-boot - A guide for setting up LUKS boot with a key from TPM in Linux

mortar - Framework to join Linux's physical security bricks.

zfs-boottime-encryption - Unlocking ZFS datasets at boot

safeboot - Scripts to slightly improve the security of the Linux boot process with UEFI Secure Boot and TPM support

sedutil - Use sedutil for setting up and using self encrypting drives (SEDs) that comply with the TCG OPAL 2.00 standard. This includes the requisite pre-boot authentication image.

TrustedGRUB2 - DEPRECATED TPM enabled GRUB2 Bootloader

EMBA - EMBA - The firmware security analyzer

tang - Tang binding daemon

sbupdate - Generate and sign kernel images for UEFI Secure Boot on Arch Linux