Updated
about 1 year
ago.
4 hacker ♥️.
4 followers.
Project Description
The key protector support in GRUB2 is on the way and it currently supports only TPM2. This project is aim to explore the possibility to extend the key protector to support Yubikey to store the LUKS key.
Goal for this Hackweek
- Study the protocols/applications supported by Yubikey
- Read the code of utoken-decrypt
- Implement Yubikey support in GRUB2 if possible
Resources
- Automatic Disk Unlock with TPM2
- utokten-decrypt: Minimal utility for using yubikeys for Full Disk Encryption
- virtual-fido: FIDO2 device emulation (maybe useful for testing)
- Yubikey PIV: Yubikey PIV introduction
Looking for hackers with the skills:
This project is part of:
Hack Week 23
Activity
Comments
Be the first to comment!
Similar Projects
Create DRM drivers for VESA and EFI framebuffers by tdz
Description
We already have simpledrm for firmware framebuffers. But the driver is originally for ARM boards, not PCs. It is already overloaded with code to support both use cases. At the same time it is missing possible features for VESA and EFI, such as palette modes or EDID support. We should have DRM drivers for VESA and EFI interfaces. The infrastructure exists already and initial drivers can be forked from simpledrm.
Goals
- Initially, a bare driver for VESA or EFI should be created. It can take functionality from simpledrm.
- Then we can begin to add additional features. The boot loader can provide EDID data. With VGA hardware, VESA can support paletted modes or color management. Example code exists in vesafb.