@Obsolesce said in Decrypting a LUKS encrypted drive at boot:
@DustinB3403 Oh is it the boot/os drive of a VM?
No it wouldn't be the boot partition, but a secondary array (R1).
@EddieJennings said in Decrypting a LUKS encrypted drive at boot:
I know it's not your ideal, but have you tried to use /etc/crypttab and store the key in a file somewhere that's owned by root and has 400 permissions, just to see if that method can do the automatic unlocking of the encrypted device?
If you're making said file that /etc/crypttab will use remember to do echo -n 'whatever' > yourfile, instead of just echo, else you'll bang your head against the wall not understanding why the stored password isn't working. Ask me how I know. 😉
I haven't tried it.
@dbeato said in Decrypting a LUKS encrypted drive at boot:
Did this work for you? https://www.malachisoord.com/2023/11/04/decrypt-additiona-luks-encrypted-volumes-on-boot/
I've never seen it, will review.