Dropbear¶
Dropbear is a small, cross-platform SSH server and client implementation designed for embedded systems. It can do many things, but the use-case most useful to Podinate is to use it to perform remote unlocking of a root partition.
Unlocking Encrypted Disk¶
These instructions apply to Ubuntu, the recommended server OS for Podinate. Dropbear unlocks encrypted disks by being installed to the initramfs, which is a small system that is loaded before Linux, its job is to mount required filesystems and boot Linux.
Installing Dropbear¶
- Log in to the server
- Switch to root user
- Update the system
- Install the Dropbear package
- Configure Dropbear server options:
Paste the following line at the end of the file:
The meaning of these options is:
-I 180
- Set an inactivity timeout of 180 seconds.-j
- Disable SSH local port forwarding-k
- Disable remote SSH port forwarding too-p 2222
- Listen on pot 2222. If the default port 22 is used, a warning will show on connection because the Dropbear and host SSH server keys are different.-s
- Disable password-less login-c cryptroot-unlock
- Dropbear will ignore any command sent by the user and run cryptroot-unlock instead. This means nothing else can be done in a Dropbear session.
- Configure static IP (optional)
Add the following line to the end of the file:
The options are as follows:
192.168.1.100
- The static IP to set192.168.1.1
- The network gateway to use255.255.255.0
- The subnet mask to usedropbear
- The hostname to set
- Add your SSH public key to dropbear:
- Update the initramfs to enable our Dropbear configuration
Test the Installation¶
- To test the instal, reboot the server and try to unlock it with Dropbear:
- On the machine you want to unlock the disk from, run: Accept the fingerprint shown, and you will immediately be prompted for the unlock password. The output will look like: And the session will be closed.