You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Just like how "crypt" module opens luks encrypted root via cryptsetup. It would be great if dracut could unlock bcachefs encrypted partitions a similar way. In userspace the way to unlock a bcachefs encrypted drive and mount it is:
bcachefs unlock /dev/sdaX
# type password
mount /dev/sdaX /mountpoint
However, it is a bit different on systemd for some reason where you need to specify a -k value. And from my testing in fedora 40 beta (my current system uses openrc) I had this issue where I had to type the password again when mounting it (could be a bug with fedora 40 beta).
bcachefs unlock -k session /dev/sdaX
# type password
bcachefs mount /dev/sdaX /mountpoint
# type password again
Just like how "crypt" module opens luks encrypted root via cryptsetup. It would be great if dracut could unlock bcachefs encrypted partitions a similar way. In userspace the way to unlock a bcachefs encrypted drive and mount it is:
However, it is a bit different on systemd for some reason where you need to specify a -k value. And from my testing in fedora 40 beta (my current system uses openrc) I had this issue where I had to type the password again when mounting it (could be a bug with fedora 40 beta).
There is more of an explanation on their website https://bcachefs.org/Encryption/.
The text was updated successfully, but these errors were encountered: