Commit 95513205 authored by sajolida's avatar sajolida
Browse files

Explain how we could unlock the backup Persistence without password

parent a7bb7415
......@@ -106,10 +106,13 @@ Implementation note:
- It might be possible to reuse the same LUKS header to create the
backup Persistence without prompting for a passphrase.
At first glance, cryptsetup luksHeaderBackup/luksHeaderRestore should
work to create that backups LUKS volume; and then, to unlock it, one
could dump the master key from memory and pass it to cryptsetup open
At first glance:
* To create the backup Persistence,
<span class="command">cryptsetup luksHeaderBackup/luksHeaderRestore</span> should work.
* To unlock the backup Persistence,
<span class="command">sudo dmsetup table --showkeys TailsData_unlocked</span> should dump the master key from memory and
<span class="command">cryptsetup --master-key-file</span> should unlock with the master key.
Supports Markdown
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment