• @[email protected]
    link
    fedilink
    English
    27 hours ago

    I have a media center that serves over the internet via VPN, I don’t want to leave it unencrypted but I also don’t want to have to go home and type in a pass every time California has a power outage, which is monthly during the dry fire season and >monthly during the “storm” season. I wouldn’t care as much for my personal laptop or anything, but for servers it seems like an absolute must have and…what is Linux for if not servers?

    • @Peasley
      link
      1
      edit-2
      4 hours ago

      I think the traditional way to do that is via dm-crypt, which you can set up with an ssh server.

      You can also use a network-shared file rather than a password for LUKS but it’s not as straightforward to set up as a password. If you are doing something like tailscale then it’d be unlocked as long as you are on the VPN

      Typing in a password in-person at a data center would be a huge hassle, agreed

      • @[email protected]
        link
        fedilink
        English
        11 hour ago

        But…it’s literally what the tpm chip is for. Like there may be other options, but the tpm chip’s purpose in life is to do this thing. And it’s been doing that for a decade. Seems pretty traditional to me. But Linux folks in some venues treat it like a plague that needs to be eradicated.

        • @Peasley
          link
          11 hour ago

          Looking at RHEL docs it seems to also work there. The same instructions probably work in Fedora but idk I’ve never done it myself