-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Encrypted volume/filesystem support #2
Comments
We have a first issue regarding the container's own filesystem. I'm putting this topic aside at the moment, in order to focus on encrypting volumes (i.e. the private workspace). Using CryptsetupI think we could use At container creation
At container startSteps 3 and 5 At container stop
ProblemsThere are multiple problems with this solution:
Going further
Closing thoughts, I started a PoC with |
You must run the cryptsetup command from the container itself, not from the host for many reason. |
Okay, according to our meeting today, let's work as follows:
A standard, shared, workplace is then replaced with an LUKS container that only the exegol container decrypts, opens and mounts. This feature will probably require a better |
Food for thought, let's also study the ability to support FIDO2 tokens. |
Another solution might be gocryptfs: https://wiki.archlinux.org/title/Gocryptfs |
Interesting option !
|
The needs
No response
Description
It'd be awesome to interface with LUKS or similar alternatives to handle encrypted volumes.
This would be an option at the creation of the container, to have the
workspace
volume (and possibly the other part of the container filesystem) encrypted with LUKS (or something else) and a key set by the user.It would look like this at the creation of a new container
exegol start container image --luks
It would look like this at the start of an existing container
exegol start container image --luks
Open to suggestions
Alternatives
No response
Additional context
No response
The text was updated successfully, but these errors were encountered: