ZFS-FIDO2-CLEAR-KEY(8) | System Manager's Manual | ZFS-FIDO2-CLEAR-KEY(8) |
zfs-fido2-clear-key
—
rewrap ZFS dataset key in passsword and clear tzpfms FIDO2
metadata
zfs-fido2-clear-key |
dataset |
After verifying dataset was encrypted with
the tzpfms
FIDO2
backend:
zfs
change-key
-o
keylocation=prompt
-o
keyformat=passphrase
dataset,credMgmt
’ feature and has a PIN
set, tries to delete the credential from the device,xyz.nabijaczleweli:tzpfms.
{backend
,
key
} properties from
dataset.For every removal failure and missing device or PIN an instruction for manual removal with fido2-token(1) is issued.
See zfs-fido2-change-key(8) for a detailed description.
TZPFMS_PASSPHRASE_HELPER
TZPFMS_PASSPHRASE_HELPER
is set and nonempty, it
will be run via /bin/sh
-c
to provide each passphrase, instead.
The standard output stream of the helper is tied to an anonymous file and used in its entirety as the passphrase, except for a trailing new-line, if any. The arguments are:
If the helper doesn't exist (the shell exits with 127), a diagnostic is issued and the normal prompt is used as fall-back. If it fails for any other reason, the prompting is aborted.
FIDO_DEBUG
When creating, the first device which supports the
‘hmac-secret
’ extension is used. When
loading, the assertion yielding the key is shopped around to every such
device.
The libfido2 documentation at https://developers.yubico.com/libfido2/.
To all who support further development, in particular:
https://todo.sr.ht/~nabijaczleweli/fzifdso
~nabijaczleweli/tzpfms@lists.sr.ht, archived at https://lists.sr.ht/~nabijaczleweli/tzpfms.
March 11, 2024 | fzifdso 0.4.1 |