NixOS + Framework | 225 Members | |
| Discussing NixOS in the context of the Framework laptop | 50 Servers |
| Sender | Message | Time |
|---|---|---|
| 10 May 2026 | ||
| so... you're creating a random key within a luks container to unlock your zfs pool | 15:42:00 | |
| i guess you could enroll that as a keyfile for your swap partition too | 15:42:34 | |
| since, once again, it has nothing to do with zfs at all | 15:42:58 | |
| yes, that seems a good way forward | 15:59:01 | |
| it's a rather strange way forward | 16:05:50 | |
| but, yes, it should get you there | 16:06:13 | |
i'm not really sure how boot.resumeDevice is going to play with that | 16:06:48 | |
| what you could do instead, is encrypt the entire disk (except your ESP partition if using systemd-boot) and within the unlocked container, set up your different filesystems | 16:07:42 | |
| that's what i'd call far more typical on single-disk installations | 16:08:09 | |
| why do you think this is strange? | 16:09:46 | |
| well, what does it accomplish? | 16:10:35 | |
| you increase complexity and gain, what? | 16:10:42 | |
| well, and we should probably clarify: are you using a framework laptop with a single disk for your system, or are you using multiple disks? | 16:11:56 | |
| yes, i have a single disk. | 16:12:07 | |
| okay, yeah, i'm going to call it strange then | 16:12:22 | |
| My goal is to use Yubikey to decrypt the disk. | 16:12:24 | |
| you can just do that, directly, on the single luks container that is your entire disk (sans your ESP partition if using systemd-boot) | 16:12:50 | |
| i do this on my FW13 | 16:13:07 | |
| i was using ZFS encryption instead of using Luks. | 16:13:19 | |
| no, you're using luks for your keyfile and then using that for zfs | 16:13:53 | |
| based on: https://discourse.nixos.org/t/yubikey-fido2-and-boot-initrd-systemd/60051/18?u=trumee | 16:14:10 | |
| anyway, what i've described is far simpler | 16:15:09 | |
| you are welcome to continue doing what you're doing, of course | 16:15:21 | |
this is what a single luks container containing various partitions (which in this case all happen to be btrfs, but could be a disparate | 16:16:31 | |
*
this is what a single luks container containing various partitions (which in this case all happen to be btrfs, but could be a disparate | 16:16:34 | |
| that is more accurate, my goal was to use native zfs encryption when i set the system up. | 16:16:52 | |
*
this is what a single luks container containing various partitions looks like (which in this case all happen to be btrfs, but could be a disparate | 16:16:54 | |
*
this is what a single luks container containing various partitions looks like (which in this case all happen to be btrfs, but could be a disparate | 16:17:33 | |
| this is what i have currently,
| 16:18:38 | |
| do you see and understand the difference? | 16:20:41 | |