mkinitcpio-ykfde
Full disk encryption with Yubikey (Yubico key) (by eworm-de)
dracut-crypt-ssh
dracut initramfs module to start dropbear sshd during boot to unlock the root filesystem with the (cryptsetup) LUKS passphrase remotely (by dracut-crypt-ssh)
mkinitcpio-ykfde | dracut-crypt-ssh | |
---|---|---|
2 | 4 | |
105 | 272 | |
- | 1.5% | |
2.3 | 4.6 | |
4 months ago | 7 months ago | |
C | C | |
GNU General Public License v3.0 only | GNU General Public License v3.0 only |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
mkinitcpio-ykfde
Posts with mentions or reviews of mkinitcpio-ykfde.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2023-01-31.
-
sd-encrypt, LUKS partition unlock and YubiKey - Erratic behavior
I am interested in running a self-signed Secure Boot LUKS setup that I could unlock with my YubiKey. I've tried an initramfs hook in my other devices and it works. However, I read this section about unlocking the LUKS partition with systemd and its integrated enrollment tool (systemd-cryptenroll) and my interest was piqued since it meant an integrated solution that doesn't depend on a third-party one.
-
Second factor LUKS encryption via Yubikey on Fedora 33
Found a solution myself: https://github.com/eworm-de/mkinitcpio-ykfde/blob/master/README-dracut.md
dracut-crypt-ssh
Posts with mentions or reviews of dracut-crypt-ssh.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2021-11-11.
-
Remote LUKS unlocking
From homepage:
-
Remotely unlocking headless server
https://github.com/dracut-crypt-ssh/dracut-crypt-ssh/commit/6ae8c358d24989ac7c6e625609bd1af4cf8ce1de has been merged - it at least helps resolve the ed25519 issue you were having.
-
A Home Router Built on Void Linux and ZFSBootMenu
dcssh
What are some alternatives?
When comparing mkinitcpio-ykfde and dracut-crypt-ssh you can also consider the following projects:
libfido2 - Provides library functionality for FIDO2, including communication with a device over USB or NFC.
dracut-sshd - Provide SSH access to initramfs early user space on Fedora and other systems that use Dracut
yubico-pam - Yubico Pluggable Authentication Module (PAM)
ubuntu-server-zfsbootmenu - Ubuntu zfsbootmenu install script
OpenSSL - TLS/SSL and crypto library
zfsbootmenu - ZFS Bootloader for root-on-ZFS systems with support for snapshots and native full disk encryption