summaryrefslogtreecommitdiff
path: root/man/systemd-cryptenroll.xml
diff options
context:
space:
mode:
authorLennart Poettering <lennart@poettering.net>2021-11-02 13:37:27 +0100
committerLuca Boccassi <luca.boccassi@gmail.com>2021-11-02 15:03:11 +0000
commit0bada3f8b72e07bc8926b28957681abb5622039a (patch)
tree39e39e9f8a5d50ff7ba055a5dc3db57c65c2c79c /man/systemd-cryptenroll.xml
parentc7448e741a6881b9cc12ded61d71a51dfabb61e7 (diff)
downloadsystemd-0bada3f8b72e07bc8926b28957681abb5622039a.tar.gz
man: document cryptenroll limitations
Let's document this for now. We should be able to lift these limitations sooner or later, at which point we can drop this documentation again. These two limitations are a pitfall that people should be aware of, before going FIDO2-only. See: #20230 #19208
Diffstat (limited to 'man/systemd-cryptenroll.xml')
-rw-r--r--man/systemd-cryptenroll.xml17
1 files changed, 17 insertions, 0 deletions
diff --git a/man/systemd-cryptenroll.xml b/man/systemd-cryptenroll.xml
index f763a19149..3b140c37cd 100644
--- a/man/systemd-cryptenroll.xml
+++ b/man/systemd-cryptenroll.xml
@@ -61,6 +61,23 @@
</refsect1>
<refsect1>
+ <title>Limitations</title>
+
+ <para>Note that currently when enrolling a new key of one of the five supported types listed above, it is
+ required to first provide a passphrase or recovery key (i.e. one of the latter two key types). For
+ example, it's currently not possible to unlock a device with a FIDO2 key in order to enroll a new FIDO2
+ key. Instead, in order to enroll a new FIDO2 key, it is necessary to provide an already enrolled regular
+ passphrase or recovery key. Thus, if in future key roll-over is desired it's generally recommended to
+ combine TPM2, FIDO2, PKCS#11 key enrollment with enrolling a regular passphrase or recovery key.</para>
+
+ <para>Also note that support for enrolling multiple FIDO2 tokens is currently not too useful, as while
+ unlocking <command>systemd-cryptsetup</command> cannot identify which token is currently plugged in and
+ thus does not know which authentication request to send to the device. This limitation does not apply to
+ tokens enrolled via PKCS#11 — because tokens of this type may be identified immediately, before
+ authentication.</para>
+ </refsect1>
+
+ <refsect1>
<title>Options</title>
<para>The following options are understood:</para>