Project Description

The key protector support in GRUB2 is on the way and it currently supports only TPM2. This project is aim to explore the possibility to extend the key protector to support Yubikey to store the LUKS key.

Goal for this Hackweek

  • Study the protocols/applications supported by Yubikey
  • Read the code of utoken-decrypt
  • Implement Yubikey support in GRUB2 if possible

Resources

Looking for hackers with the skills:

grub2

This project is part of:

Hack Week 23

Activity

  • about 2 months ago: michael-chang joined this project.
  • about 1 year ago: emiler liked this project.
  • about 1 year ago: hennevogel liked this project.
  • about 1 year ago: michael-chang liked this project.
  • about 1 year ago: e_bischoff liked this project.
  • about 1 year ago: gary_lin removed keyword fido2 from this project.
  • about 1 year ago: gary_lin started this project.
  • about 1 year ago: gary_lin added keyword "grub2" to this project.
  • about 1 year ago: gary_lin added keyword "fido2" to this project.
  • about 1 year ago: gary_lin originated this project.

  • Comments

    Be the first to comment!

    Similar Projects

    Create DRM drivers for VESA and EFI framebuffers by tdz

    Description

    We already have simpledrm for firmware framebuffers. But the driver is originally for ARM boards, not PCs. It is already overloaded with code to support both use cases. At the same time it is missing possible features for VESA and EFI, such as palette modes or EDID support. We should have DRM drivers for VESA and EFI interfaces. The infrastructure exists already and initial drivers can be forked from simpledrm.

    Goals

    • Initially, a bare driver for VESA or EFI should be created. It can take functionality from simpledrm.
    • Then we can begin to add additional features. The boot loader can provide EDID data. With VGA hardware, VESA can support paletted modes or color management. Example code exists in vesafb.