Open secretmango opened 1 month ago
Hi @secretmango, thank you for using cryptreboot :) I've tested cryptreboot on Debian and it should work. Have you applied Debian-specific tips? https://github.com/phantom-node/cryptreboot?tab=readme-ov-file#no-symlinks-to-the-most-recent-kernel-and-initramfs
I will try the tips, thank you. It is a very plain, fresh Debian 12 install.
I keep my fingers crossed.
hi, wait so am I correct that for it to work I need to have my kernel unencrypted?
Normally afaik, grub deals with the LUKS unlocking and has its own kernel? Not sure about that.
This could be an issue.
And are you sure that these /tmp files are the same issue?
Cryptreboot is neutral in terms of how you store your kernel. You can keep it on an unencrypted /boot partition (the most common setup), on an encrypted partition having GRUB to unlock it, or wherever else you want. The only requirement is that the kernel and initramfs must be available to the cryptreboot when you want to reboot the system.
Were you able to restart your system using the "Troubleshooting" link I provided earlier? If not, please provide the exact commands you entered and the result you got.
I have a PC I want to setup. I used Debian because I need cryptreboot.
Default Debian install, ext4 with encrypted LVM.
And idea?