2021-06-23 15:41:49 +08:00
|
|
|
<?xml version='1.0'?> <!--*-nxml-*-->
|
|
|
|
<!DOCTYPE refentry PUBLIC "-//OASIS//DTD DocBook XML V4.5//EN"
|
2023-12-25 22:48:33 +08:00
|
|
|
"http://www.oasis-open.org/docbook/xml/4.5/docbookx.dtd">
|
2021-06-23 15:41:49 +08:00
|
|
|
<!-- SPDX-License-Identifier: LGPL-2.1-or-later -->
|
|
|
|
|
|
|
|
<refentry id="systemd-creds"
|
|
|
|
xmlns:xi="http://www.w3.org/2001/XInclude">
|
|
|
|
|
|
|
|
<refentryinfo>
|
|
|
|
<title>systemd-creds</title>
|
|
|
|
<productname>systemd</productname>
|
|
|
|
</refentryinfo>
|
|
|
|
|
|
|
|
<refmeta>
|
|
|
|
<refentrytitle>systemd-creds</refentrytitle>
|
|
|
|
<manvolnum>1</manvolnum>
|
|
|
|
</refmeta>
|
|
|
|
|
|
|
|
<refnamediv>
|
|
|
|
<refname>systemd-creds</refname>
|
|
|
|
<refpurpose>Lists, shows, encrypts and decrypts service credentials</refpurpose>
|
|
|
|
</refnamediv>
|
|
|
|
|
|
|
|
<refsynopsisdiv>
|
|
|
|
<cmdsynopsis>
|
|
|
|
<command>systemd-creds</command>
|
|
|
|
<arg choice="opt" rep="repeat">OPTIONS</arg>
|
2022-06-02 21:58:33 +08:00
|
|
|
<arg choice="plain">COMMAND</arg>
|
|
|
|
<arg choice="opt" rep="repeat">ARGS</arg>
|
2021-06-23 15:41:49 +08:00
|
|
|
</cmdsynopsis>
|
|
|
|
</refsynopsisdiv>
|
|
|
|
|
|
|
|
<refsect1>
|
|
|
|
<title>Description</title>
|
|
|
|
|
|
|
|
<para><command>systemd-creds</command> is a tool for listing, showing, encrypting and decrypting unit
|
|
|
|
credentials. Credentials are limited-size binary or textual objects that may be passed to unit
|
|
|
|
processes. They are primarily used for passing cryptographic keys (both public and private) or
|
|
|
|
certificates, user account information or identity information from the host to services.</para>
|
|
|
|
|
2023-11-15 22:28:52 +08:00
|
|
|
<para>Credentials are configured in unit files via the <varname>ImportCredential=</varname>,
|
2023-01-13 23:22:46 +08:00
|
|
|
<varname>LoadCredential=</varname>, <varname>SetCredential=</varname>,
|
2023-11-15 22:28:52 +08:00
|
|
|
<varname>LoadCredentialEncrypted=</varname>, and <varname>SetCredentialEncrypted=</varname> settings, see
|
2021-06-23 15:41:49 +08:00
|
|
|
<citerefentry><refentrytitle>systemd.exec</refentrytitle><manvolnum>5</manvolnum></citerefentry> for
|
|
|
|
details.</para>
|
2022-04-22 21:43:11 +08:00
|
|
|
|
|
|
|
<para>For further information see <ulink url="https://systemd.io/CREDENTIALS">System and Service
|
|
|
|
Credentials</ulink> documentation.</para>
|
2021-06-23 15:41:49 +08:00
|
|
|
</refsect1>
|
|
|
|
|
|
|
|
<refsect1>
|
|
|
|
<title>Commands</title>
|
|
|
|
|
|
|
|
<para>The following commands are understood:</para>
|
|
|
|
|
|
|
|
<variablelist>
|
|
|
|
<varlistentry>
|
|
|
|
<term><command>list</command></term>
|
|
|
|
|
|
|
|
<listitem><para>Show a list of credentials passed into the current execution context. This command
|
|
|
|
shows the files in the directory referenced by the <varname>$CREDENTIALS_DIRECTORY</varname>
|
|
|
|
environment variable, and is intended to be executed from within service context.</para>
|
|
|
|
|
|
|
|
<para>Along with each credential name, the size and security state is shown. The latter is one of
|
|
|
|
<literal>secure</literal> (in case the credential is backed by unswappable memory,
|
|
|
|
i.e. <literal>ramfs</literal>), <literal>weak</literal> (in case it is backed by any other type of
|
|
|
|
memory), or <literal>insecure</literal> (if having any access mode that is not 0400, i.e. if readable
|
2023-08-23 00:52:36 +08:00
|
|
|
by anyone but the owner).</para>
|
|
|
|
|
|
|
|
<xi:include href="version-info.xml" xpointer="v250"/></listitem>
|
2021-06-23 15:41:49 +08:00
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term><command>cat</command> <replaceable>credential...</replaceable></term>
|
|
|
|
|
|
|
|
<listitem><para>Show contents of specified credentials passed into the current execution
|
|
|
|
context. Takes one or more credential names, whose contents shall be written to standard
|
|
|
|
output.</para>
|
|
|
|
|
|
|
|
<para>When combined with <option>--json=</option> or <option>--transcode=</option> the output is
|
2023-08-23 00:52:36 +08:00
|
|
|
transcoded in simple ways before outputting.</para>
|
|
|
|
|
|
|
|
<xi:include href="version-info.xml" xpointer="v250"/></listitem>
|
2021-06-23 15:41:49 +08:00
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term><command>setup</command></term>
|
|
|
|
|
2021-12-13 01:56:07 +08:00
|
|
|
<listitem><para>Generates a host encryption key for credentials, if one has not been generated
|
|
|
|
already. This ensures the <filename>/var/lib/systemd/credential.secret</filename> file is initialized
|
2021-06-23 15:41:49 +08:00
|
|
|
with a random secret key if it doesn't exist yet. This secret key is used when encrypting/decrypting
|
|
|
|
credentials with <command>encrypt</command> or <command>decrypt</command>, and is only accessible to
|
|
|
|
the root user. Note that there's typically no need to invoke this command explicitly as it is
|
|
|
|
implicitly called when <command>encrypt</command> is invoked, and credential host key encryption
|
2023-08-23 00:52:36 +08:00
|
|
|
selected.</para>
|
|
|
|
|
|
|
|
<xi:include href="version-info.xml" xpointer="v250"/></listitem>
|
2021-06-23 15:41:49 +08:00
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
2021-12-13 01:56:07 +08:00
|
|
|
<term><command>encrypt</command> <replaceable>input|-</replaceable> <replaceable>output|-</replaceable></term>
|
2021-06-23 15:41:49 +08:00
|
|
|
|
|
|
|
<listitem><para>Loads the specified (unencrypted plaintext) input credential file, encrypts it and
|
2022-04-21 21:36:03 +08:00
|
|
|
writes the (encrypted ciphertext) output to the specified target credential file. The resulting file
|
2021-06-23 15:41:49 +08:00
|
|
|
may be referenced in the <varname>LoadCredentialEncrypted=</varname> setting in unit files, or its
|
|
|
|
contents used literally in <varname>SetCredentialEncrypted=</varname> settings.</para>
|
|
|
|
|
|
|
|
<para>Takes two file system paths. The file name part of the output path is embedded as name in the
|
|
|
|
encrypted credential, to ensure encrypted credentials cannot be renamed and reused for different
|
|
|
|
purposes without this being noticed. The credential name to embed may be overridden with the
|
|
|
|
<option>--name=</option> setting. The input or output paths may be specified as <literal>-</literal>,
|
|
|
|
in which case the credential data is read from/written to standard input and standard output. If the
|
|
|
|
output path is specified as <literal>-</literal> the credential name cannot be derived from the file
|
|
|
|
system path, and thus should be specified explicitly via the <option>--name=</option> switch.</para>
|
|
|
|
|
2022-04-21 21:36:03 +08:00
|
|
|
<para>The credential data is encrypted and authenticated symmetrically with one of the following
|
|
|
|
encryption keys:</para>
|
2021-06-23 15:41:49 +08:00
|
|
|
|
|
|
|
<orderedlist>
|
|
|
|
<listitem><para>A secret key automatically derived from the system's TPM2 chip. This encryption key
|
|
|
|
is not stored on the host system and thus decryption is only possible with access to the original
|
|
|
|
TPM2 chip. Or in other words, the credential secured in this way can only be decrypted again by the
|
|
|
|
local machine.</para></listitem>
|
|
|
|
|
|
|
|
<listitem><para>A secret key stored in the <filename>/var/lib/systemd/credential.secret</filename>
|
|
|
|
file which is only accessible to the root user. This "host" encryption key is stored on the host
|
|
|
|
file system, and thus decryption is possible with access to the host file system and sufficient
|
|
|
|
privileges. The key is automatically generated when needed, but can also be created explicitly with
|
|
|
|
the <command>setup</command> command, see above.</para></listitem>
|
|
|
|
|
|
|
|
<listitem><para>A combination of the above: an encryption key derived from both the TPM2 chip and
|
|
|
|
the host file system. This means decryption requires both access to the original TPM2 chip and the
|
|
|
|
OS installation. This is the default mode of operation if a TPM2 chip is available and
|
|
|
|
<filename>/var/lib/systemd/</filename> resides on persistent media.</para></listitem>
|
|
|
|
</orderedlist>
|
|
|
|
|
|
|
|
<para>Which of the three keys shall be used for encryption may be configured with the
|
man: "the initial RAM disk" → "the initrd"
In many places we spelled out the phrase behind "initrd" in full, but this
isn't terribly useful. In fact, no "RAM disk" is used, so emphasizing this
is just confusing to the reader. Let's just say "initrd" everywhere, people
understand what this refers to, and that it's in fact an initramfs image.
Also, s/i.e./e.g./ where appropriate.
Also, don't say "in RAM", when in fact it's virtual memory, whose pages
may or may not be loaded in page frames in RAM, and we have no control over
this.
Also, add <filename></filename> and other minor cleanups.
2022-09-15 20:43:59 +08:00
|
|
|
<option>--with-key=</option> switch. Depending on the use-case for the encrypted credential the key
|
|
|
|
to use may differ. For example, for credentials that shall be accessible from the initrd, encryption
|
|
|
|
with the host key is not appropriate, since access to the host key is typically not available from
|
|
|
|
the initrd. Thus, for such credentials only the TPM2 key should be used.</para>
|
2021-06-23 15:41:49 +08:00
|
|
|
|
|
|
|
<para>Encrypted credentials are always encoded in Base64.</para>
|
|
|
|
|
|
|
|
<para>Use <command>decrypt</command> (see below) to undo the encryption operation, and acquire the
|
|
|
|
decrypted plaintext credential from the encrypted ciphertext credential.</para>
|
|
|
|
|
|
|
|
<para>The credential data is encrypted using AES256-GCM, i.e. providing both confidentiality and
|
|
|
|
integrity, keyed by a SHA256 hash of one or both of the secret keys described above.</para>
|
2023-08-23 00:52:36 +08:00
|
|
|
|
|
|
|
<xi:include href="version-info.xml" xpointer="v250"/>
|
2021-06-23 15:41:49 +08:00
|
|
|
</listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
2021-12-13 01:56:07 +08:00
|
|
|
<term><command>decrypt</command> <replaceable>input|-</replaceable>
|
|
|
|
<optional><replaceable>output|-</replaceable></optional></term>
|
2021-06-23 15:41:49 +08:00
|
|
|
|
|
|
|
<listitem><para>Undoes the effect of the <command>encrypt</command> operation: loads the specified
|
2022-04-21 21:36:03 +08:00
|
|
|
(encrypted ciphertext) input credential file, decrypts and authenticates it and writes the (decrypted
|
|
|
|
plaintext) output to the specified target credential file.</para>
|
2021-06-23 15:41:49 +08:00
|
|
|
|
|
|
|
<para>Takes one or two file system paths. The file name part of the input path is compared with the
|
|
|
|
credential name embedded in the encrypted file. If it does not match decryption fails. This is done
|
|
|
|
in order to ensure that encrypted credentials are not re-purposed without this being detected. The
|
|
|
|
credential name to compare with the embedded credential name may also be overridden with the
|
2021-12-13 01:56:07 +08:00
|
|
|
<option>--name=</option> switch. If the input path is specified as <literal>-</literal>, the
|
|
|
|
encrypted credential is read from standard input. If only one path is specified or the output path
|
|
|
|
specified as <literal>-</literal>, the decrypted credential is written to standard output. In this
|
|
|
|
mode, the expected name embedded in the credential cannot be derived from the path and should be
|
|
|
|
specified explicitly with <option>--name=</option>.</para>
|
2021-06-23 15:41:49 +08:00
|
|
|
|
|
|
|
<para>Decrypting credentials requires access to the original TPM2 chip and/or credentials host key,
|
|
|
|
see above. Information about which keys are required is embedded in the encrypted credential data,
|
2023-08-23 00:52:36 +08:00
|
|
|
and thus decryption is entirely automatic.</para>
|
|
|
|
|
|
|
|
<xi:include href="version-info.xml" xpointer="v250"/></listitem>
|
2021-06-23 15:41:49 +08:00
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<xi:include href="standard-options.xml" xpointer="help" />
|
|
|
|
<xi:include href="standard-options.xml" xpointer="version" />
|
|
|
|
</variablelist>
|
|
|
|
</refsect1>
|
|
|
|
|
|
|
|
<refsect1>
|
|
|
|
<title>Options</title>
|
|
|
|
|
|
|
|
<variablelist>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term><option>--system</option></term>
|
|
|
|
|
|
|
|
<listitem><para>When specified with the <command>list</command> and <command>cat</command> commands
|
|
|
|
operates on the credentials passed to system as a whole instead of on those passed to the current
|
|
|
|
execution context. This is useful in container environments where credentials may be passed in from
|
2023-08-23 00:52:36 +08:00
|
|
|
the container manager.</para>
|
|
|
|
|
|
|
|
<xi:include href="version-info.xml" xpointer="v250"/></listitem>
|
2021-06-23 15:41:49 +08:00
|
|
|
</varlistentry>
|
|
|
|
|
2024-01-16 23:56:12 +08:00
|
|
|
<varlistentry>
|
|
|
|
<term><option>--user</option></term>
|
|
|
|
|
|
|
|
<listitem><para>When specified with the <command>encrypt</command> and <command>decrypt</command>
|
|
|
|
commands encrypts a user-scoped (rather than a system-scoped) credential. Use <option>--uid=</option>
|
|
|
|
to select which user the credential is from. Such credentials may only be decrypted from the
|
|
|
|
specified user's context, except if privileges can be acquired. Generally, when an encrypted
|
|
|
|
credential shall be used in the per-user service manager it should be encrypted with this option set,
|
2024-02-02 08:25:51 +08:00
|
|
|
when it shall be used in the system service manager it should be encrypted without.</para>
|
2024-01-16 23:56:12 +08:00
|
|
|
|
|
|
|
<para>Internally, this ensures that the selected user's numeric UID and username, as well as the
|
|
|
|
system's
|
|
|
|
<citerefentry><refentrytitle>machine-id</refentrytitle><manvolnum>5</manvolnum></citerefentry> are
|
|
|
|
incorporated into the encryption key.</para>
|
|
|
|
|
|
|
|
<xi:include href="version-info.xml" xpointer="v256"/></listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term><option>--uid=</option></term>
|
|
|
|
|
|
|
|
<listitem><para>Specifies the user to encrypt the credential for. Takes a user name or numeric
|
|
|
|
UID. If set, implies <option>--user</option>. If set to the special string <literal>self</literal>
|
|
|
|
sets the user to the user of the calling process. If <option>--user</option> is used without
|
|
|
|
<option>--uid=</option> then <option>--uid=self</option> is implied, i.e. the credential is encrypted
|
|
|
|
for the calling user.</para>
|
|
|
|
|
|
|
|
<xi:include href="version-info.xml" xpointer="v256"/></listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
2021-06-23 15:41:49 +08:00
|
|
|
<varlistentry>
|
|
|
|
<term><option>--transcode=</option></term>
|
|
|
|
|
|
|
|
<listitem><para>When specified with the <command>cat</command> or <command>decrypt</command>
|
|
|
|
commands, transcodes the output before showing it. Takes one of <literal>base64</literal>,
|
|
|
|
<literal>unbase64</literal>, <literal>hex</literal> or <literal>unhex</literal> as argument, in order
|
|
|
|
to encode/decode the credential data with Base64 or as series of hexadecimal values.</para>
|
|
|
|
|
|
|
|
<para>Note that this has no effect on the <command>encrypt</command> command, as encrypted
|
2023-08-23 00:52:36 +08:00
|
|
|
credentials are unconditionally encoded in Base64.</para>
|
|
|
|
|
|
|
|
<xi:include href="version-info.xml" xpointer="v250"/></listitem>
|
2021-06-23 15:41:49 +08:00
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term><option>--newline=</option></term>
|
|
|
|
|
|
|
|
<listitem><para>When specified with <command>cat</command> or <command>decrypt</command> controls
|
|
|
|
whether to add a trailing newline character to the end of the output if it doesn't end in one,
|
|
|
|
anyway. Takes one of <literal>auto</literal>, <literal>yes</literal> or <literal>no</literal>. The
|
|
|
|
default mode of <literal>auto</literal> will suffix the output with a single newline character only
|
2023-08-23 00:52:36 +08:00
|
|
|
when writing credential data to a TTY.</para>
|
|
|
|
|
|
|
|
<xi:include href="version-info.xml" xpointer="v250"/></listitem>
|
2021-06-23 15:41:49 +08:00
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term><option>--pretty</option></term>
|
|
|
|
<term><option>-p</option></term>
|
|
|
|
|
|
|
|
<listitem><para>When specified with <command>encrypt</command> controls whether to show the encrypted
|
|
|
|
credential as <varname>SetCredentialEncrypted=</varname> setting that may be pasted directly into a
|
2023-04-25 18:58:15 +08:00
|
|
|
unit file. Has effect only when used together with <option>--name=</option> and <literal>-</literal>
|
2023-08-23 00:52:36 +08:00
|
|
|
as the output file.</para>
|
|
|
|
|
|
|
|
<xi:include href="version-info.xml" xpointer="v250"/></listitem>
|
2021-06-23 15:41:49 +08:00
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
2024-04-12 17:12:15 +08:00
|
|
|
<term><option>--name=<replaceable>name</replaceable></option></term>
|
2021-06-23 15:41:49 +08:00
|
|
|
|
|
|
|
<listitem><para>When specified with the <command>encrypt</command> command controls the credential
|
|
|
|
name to embed in the encrypted credential data. If not specified the name is chosen automatically
|
|
|
|
from the filename component of the specified output path. If specified as empty string no
|
|
|
|
credential name is embedded in the encrypted credential, and no verification of credential name is
|
|
|
|
done when the credential is decrypted.</para>
|
|
|
|
|
|
|
|
<para>When specified with the <command>decrypt</command> command control the credential name to
|
|
|
|
validate the credential name embedded in the encrypted credential with. If not specified the name is
|
|
|
|
chosen automatically from the filename component of the specified input path. If no credential name
|
|
|
|
is embedded in the encrypted credential file (i.e. the <option>--name=</option> with an empty string
|
|
|
|
was used when encrypted) the specified name has no effect as no credential name validation is
|
|
|
|
done.</para>
|
|
|
|
|
|
|
|
<para>Embedding the credential name in the encrypted credential is done in order to protect against
|
|
|
|
reuse of credentials for purposes they weren't originally intended for, under the assumption the
|
2023-08-23 00:52:36 +08:00
|
|
|
credential name is chosen carefully to encode its intended purpose.</para>
|
|
|
|
|
|
|
|
<xi:include href="version-info.xml" xpointer="v250"/></listitem>
|
2021-06-23 15:41:49 +08:00
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
2024-04-12 17:12:15 +08:00
|
|
|
<term><option>--timestamp=<replaceable>timestamp</replaceable></option></term>
|
2021-06-23 15:41:49 +08:00
|
|
|
|
|
|
|
<listitem><para>When specified with the <command>encrypt</command> command controls the timestamp to
|
|
|
|
embed into the encrypted credential. Defaults to the current time. Takes a timestamp specification in
|
|
|
|
the format described in
|
2022-01-07 22:50:05 +08:00
|
|
|
<citerefentry><refentrytitle>systemd.time</refentrytitle><manvolnum>7</manvolnum></citerefentry>.</para>
|
2021-06-23 15:41:49 +08:00
|
|
|
|
|
|
|
<para>When specified with the <command>decrypt</command> command controls the timestamp to use to
|
|
|
|
validate the "not-after" timestamp that was configured with <option>--not-after=</option> during
|
2023-08-23 00:52:36 +08:00
|
|
|
encryption. If not specified defaults to the current system time.</para>
|
|
|
|
|
|
|
|
<xi:include href="version-info.xml" xpointer="v250"/></listitem>
|
2021-06-23 15:41:49 +08:00
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
2024-04-12 17:12:15 +08:00
|
|
|
<term><option>--not-after=<replaceable>timestamp</replaceable></option></term>
|
2021-06-23 15:41:49 +08:00
|
|
|
|
|
|
|
<listitem><para>When specified with the <command>encrypt</command> command controls the time when the
|
|
|
|
credential shall not be used anymore. This embeds the specified timestamp in the encrypted
|
|
|
|
credential. During decryption the timestamp is checked against the current system clock, and if the
|
|
|
|
timestamp is in the past the decryption will fail. By default no such timestamp is set. Takes a
|
|
|
|
timestamp specification in the format described in
|
2023-08-23 00:52:36 +08:00
|
|
|
<citerefentry><refentrytitle>systemd.time</refentrytitle><manvolnum>7</manvolnum></citerefentry>.</para>
|
|
|
|
|
|
|
|
<xi:include href="version-info.xml" xpointer="v250"/></listitem>
|
2021-06-23 15:41:49 +08:00
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
|
|
|
<term><option>--with-key=</option></term>
|
|
|
|
<term><option>-H</option></term>
|
|
|
|
<term><option>-T</option></term>
|
|
|
|
|
2022-04-14 20:46:40 +08:00
|
|
|
<listitem><para>When specified with the <command>encrypt</command> command controls the
|
|
|
|
encryption/signature key to use. Takes one of <literal>host</literal>, <literal>tpm2</literal>,
|
2023-11-20 23:22:33 +08:00
|
|
|
<literal>host+tpm2</literal>, <literal>null</literal>, <literal>auto</literal>,
|
2022-04-14 20:46:40 +08:00
|
|
|
<literal>auto-initrd</literal>. See above for details on the three key types. If set to
|
|
|
|
<literal>auto</literal> (which is the default) the TPM2 key is used if a TPM2 device is found and not
|
|
|
|
running in a container. The host key is used if <filename>/var/lib/systemd/</filename> is on
|
|
|
|
persistent media. This means on typical systems the encryption is by default bound to both the TPM2
|
|
|
|
chip and the OS installation, and both need to be available to decrypt the credential again. If
|
|
|
|
<literal>auto</literal> is selected but neither TPM2 is available (or running in container) nor
|
|
|
|
<filename>/var/lib/systemd/</filename> is on persistent media, encryption will fail. If set to
|
2023-11-20 23:22:33 +08:00
|
|
|
<literal>null</literal> a fixed zero length key is used (thus, in this mode no confidentiality
|
2022-04-14 20:46:40 +08:00
|
|
|
nor authenticity are provided!). This logic is useful to cover for systems that lack a TPM2 chip but
|
|
|
|
where credentials shall be generated. Note that decryption of such credentials is refused on systems
|
|
|
|
that have a TPM2 chip and where UEFI SecureBoot is enabled (this is done so that such a locked down
|
|
|
|
system cannot be tricked into loading a credential generated this way that lacks authentication
|
|
|
|
information). If set to <literal>auto-initrd</literal> a TPM2 key is used if a TPM2 is found. If not
|
2023-11-20 23:22:33 +08:00
|
|
|
a fixed zero length key is used, equivalent to <literal>null</literal> mode. This option is
|
2022-04-14 20:46:40 +08:00
|
|
|
particularly useful to generate credentials files that are encrypted/authenticated against TPM2 where
|
|
|
|
available but still work on systems lacking support for this.</para>
|
2021-06-23 15:41:49 +08:00
|
|
|
|
|
|
|
<para>The <option>-H</option> switch is a shortcut for <option>--with-key=host</option>. Similar,
|
2022-01-07 22:50:05 +08:00
|
|
|
<option>-T</option> is a shortcut for <option>--with-key=tpm2</option>.</para>
|
2021-06-23 15:41:49 +08:00
|
|
|
|
2022-09-23 21:10:06 +08:00
|
|
|
<para>When encrypting credentials that shall be used in the initrd (where
|
|
|
|
<filename>/var/lib/systemd/</filename> is typically not available) make sure to use
|
2022-04-14 20:46:40 +08:00
|
|
|
<option>--with-key=auto-initrd</option> mode, to disable binding against the host secret.</para>
|
2021-06-23 15:41:49 +08:00
|
|
|
|
|
|
|
<para>This switch has no effect on the <command>decrypt</command> command, as information on which
|
2023-08-23 00:52:36 +08:00
|
|
|
key to use for decryption is included in the encrypted credential already.</para>
|
|
|
|
|
|
|
|
<xi:include href="version-info.xml" xpointer="v250"/></listitem>
|
2021-06-23 15:41:49 +08:00
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
2024-04-12 17:12:15 +08:00
|
|
|
<term><option>--tpm2-device=<replaceable>PATH</replaceable></option></term>
|
2021-06-23 15:41:49 +08:00
|
|
|
|
|
|
|
<listitem><para>Controls the TPM2 device to use. Expects a device node path referring to the TPM2
|
|
|
|
chip (e.g. <filename>/dev/tpmrm0</filename>). Alternatively the special value <literal>auto</literal>
|
|
|
|
may be specified, in order to automatically determine the device node of a suitable TPM2 device (of
|
|
|
|
which there must be exactly one). The special value <literal>list</literal> may be used to enumerate
|
2023-08-23 00:52:36 +08:00
|
|
|
all suitable TPM2 devices currently discovered.</para>
|
|
|
|
|
|
|
|
<xi:include href="version-info.xml" xpointer="v250"/></listitem>
|
2021-06-23 15:41:49 +08:00
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
2024-04-12 17:12:15 +08:00
|
|
|
<term><option>--tpm2-pcrs=<replaceable>PCR<optional>+PCR...</optional></replaceable></option></term>
|
2021-06-23 15:41:49 +08:00
|
|
|
|
|
|
|
<listitem><para>Configures the TPM2 PCRs (Platform Configuration Registers) to bind the encryption
|
|
|
|
key to. Takes a <literal>+</literal> separated list of numeric PCR indexes in the range 0…23. If not
|
|
|
|
used, defaults to PCR 7 only. If an empty string is specified, binds the encryption key to no PCRs at
|
|
|
|
all. For details about the PCRs available, see the documentation of the switch of the same name for
|
2023-08-23 00:52:36 +08:00
|
|
|
<citerefentry><refentrytitle>systemd-cryptenroll</refentrytitle><manvolnum>1</manvolnum></citerefentry>.</para>
|
|
|
|
|
|
|
|
<xi:include href="version-info.xml" xpointer="v250"/></listitem>
|
2021-06-23 15:41:49 +08:00
|
|
|
</varlistentry>
|
|
|
|
|
2022-08-17 23:28:49 +08:00
|
|
|
<varlistentry>
|
2024-04-12 17:12:15 +08:00
|
|
|
<term><option>--tpm2-public-key=<replaceable>PATH</replaceable></option></term>
|
|
|
|
<term><option>--tpm2-public-key-pcrs=<replaceable>PCR<optional>+PCR...</optional></replaceable></option></term>
|
2022-08-17 23:28:49 +08:00
|
|
|
|
|
|
|
<listitem><para>Configures a TPM2 signed PCR policy to bind encryption to, for use with the
|
|
|
|
<command>encrypt</command> command. The <option>--tpm2-public-key=</option> option accepts a path to
|
|
|
|
a PEM encoded RSA public key, to bind the encryption to. If this is not specified explicitly, but a
|
|
|
|
file <filename>tpm2-pcr-public-key.pem</filename> exists in one of the directories
|
|
|
|
<filename>/etc/systemd/</filename>, <filename>/run/systemd/</filename>,
|
|
|
|
<filename>/usr/lib/systemd/</filename> (searched in this order), it is automatically used. The
|
|
|
|
<option>--tpm2-public-key-pcrs=</option> option takes a list of TPM2 PCR indexes to bind to (same
|
|
|
|
syntax as <option>--tpm2-pcrs=</option> described above). If not specified defaults to 11 (i.e. this
|
|
|
|
binds the policy to any unified kernel image for which a PCR signature can be provided).</para>
|
|
|
|
|
|
|
|
<para>Note the difference between <option>--tpm2-pcrs=</option> and
|
|
|
|
<option>--tpm2-public-key-pcrs=</option>: the former binds decryption to the current, specific PCR
|
|
|
|
values; the latter binds decryption to any set of PCR values for which a signature by the specified
|
|
|
|
public key can be provided. The latter is hence more useful in scenarios where software updates shall
|
2023-08-23 00:52:36 +08:00
|
|
|
be possible without losing access to all previously encrypted secrets.</para>
|
|
|
|
|
|
|
|
<xi:include href="version-info.xml" xpointer="v252"/></listitem>
|
2022-08-17 23:28:49 +08:00
|
|
|
</varlistentry>
|
|
|
|
|
|
|
|
<varlistentry>
|
2024-04-12 17:12:15 +08:00
|
|
|
<term><option>--tpm2-signature=<replaceable>PATH</replaceable></option></term>
|
2022-08-17 23:28:49 +08:00
|
|
|
|
|
|
|
<listitem><para>Takes a path to a TPM2 PCR signature file as generated by the
|
|
|
|
<citerefentry><refentrytitle>systemd-measure</refentrytitle><manvolnum>1</manvolnum></citerefentry>
|
|
|
|
tool and that may be used to allow the <command>decrypt</command> command to decrypt credentials that
|
man: fix issues reported by the manpage-l10n project
Fixes #25780.
> Man page: crypttab.5
> Issue 1: Missing fullstop
> Issue 2: I<cipher=>, I<hash=>, I<size=> → B<cipher=>, B<hash=>, B<size=>
>
> "Force LUKS mode\\&. When this mode is used, the following options are "
> "ignored since they are provided by the LUKS header on the device: "
> "I<cipher=>, I<hash=>, I<size=>"
Seems OK to me. The full stop is there and has been for at least a few years. And we use <option> for the markup, which is appropriate here.
> Man page: crypttab.5
> Issue 1: Missing fullstop
> Issue 2: I<cipher=>, I<hash=>, I<keyfile-offset=>, I<keyfile-size=>, I<size=> → B<cipher=>, B<hash=>, B<keyfile-offset=>, B<keyfile-size=>, B<size=>
>
> "Use TrueCrypt encryption mode\\&. When this mode is used, the following "
> "options are ignored since they are provided by the TrueCrypt header on the "
> "device or do not apply: I<cipher=>, I<hash=>, I<keyfile-offset=>, I<keyfile-"
> "size=>, I<size=>"
Same.
> Man page: journalctl.1
> Issue 1: make be → may be
Fixed.
> Issue 2: below\\&. → below:
Fixed.
> Man page: journalctl.1
> Issue: Colon at the end?
>
> "The following commands are understood\\&. If none is specified the default "
> "is to display journal records\\&."
> msgstr ""
> "Die folgenden Befehle werden verstanden\\&. Falls keiner festgelegt ist, ist "
> "die Anzeige von Journal-Datensätzen die Vorgabe\\&."
This is a bit awkward, but I'm not sure how to fix it.
> Man page: kernel-install.8
> Issue: methods a fallback → methods fallback
It was correct, but I added a comma to make the sense clearer.
> Man page: loader.conf.5
> Issue 1: secure boot variables → Secure Boot variables
> Issue 2: one → one for (multiple times)
>
> "Supported secure boot variables are one database for authorized images, one "
> "key exchange key (KEK) and one platform key (PK)\\&. For more information, "
> "refer to the \\m[blue]B<UEFI specification>\\m[]\\&\\s-2\\u[2]\\d\\s+2, "
> "under Secure Boot and Driver Signing\\&. Another resource that describe the "
> "interplay of the different variables is the \\m[blue]B<EDK2 "
> "documentation>\\m[]\\&\\s-2\\u[3]\\d\\s+2\\&."
"one of" would sound strange. "One this and one that" is OK.
> Man page: loader.conf.5
> Issue: systemd-boot → B<systemd-boot>(7)
Fixed.
> Man page: logind.conf.5
> Issue: systemd-logind → B<systemd-logind>(8)
We use <filename>systemd-logind</> on subsequent references… I think that's good enough.
> Man page: nss-myhostname.8
> Issue: B<getent> → B<getent>(1)
Fixed.
> Man page: nss-resolve.8
> Issue: B<systemd-resolved> → B<systemd-resolved>(8)
The first reference does this, subsequent are shorter.
> Man page: os-release.5
> Issue: Portable Services → Portable Services Documentation?
Updated.
> Man page: pam_systemd_home.8
> Issue: auth and account use "reason", while session and password do not?
Reworded.
> Man page: portablectl.1
> Issue: In systemd-portabled.service(8): Portable Services Documentation
Updated.
> Man page: repart.d.5
> Issue: The partition → the partition
Fixed.
> Man page: repart.d.5
> Issue: B<systemd-repart> → B<systemd-repart>(8)
The first reference does this. I also change this one, because it's pretty far down in the text.
> Man page: systemd.1
> Issue: kernel command line twice?
>
> "Takes a boolean argument\\&. If false disables importing credentials from "
> "the kernel command line, qemu_fw_cfg subsystem or the kernel command line\\&."
Apparently this was fixed already.
> Man page: systemd-boot.7
> Issue: enrollement → enrollment
Fixed.
> Man page: systemd-cryptenroll.1
> Issue: multiple cases: any specified → the specified
Reworded.
> Man page: systemd-cryptenroll.1
> Issue: If this this → If this
Fixed tree-wide.
> Man page: systemd-cryptsetup-generator.8
> Issue: and the initrd → and in the initrd
"Is honoured by the initrd" is OK, because we often speak about the initrd as a single unit. But in the same paragraph we also used "in the initrd", which makes the other use look sloppy. I changed it to "in the initrd" everywhere in that file.
> Man page: systemd.directives.7
> Issue: Why are these two quoted (but not others)?
>
> "B<\\*(Aqh\\*(Aq>"
>
> B<\\*(Aqs\\*(Aq>"
>
> "B<\\*(Aqy\\*(Aq>"
This is autogenerated from files… We use slightly different markup in different files, and it's just too hard to make it consistent. We gave up on this.
> Man page: systemd.exec.5
> Issue 1: B<at>(1p) → B<at>(1)
> Issue 2: B<crontab>(1p) → B<crontab>(1)
Fixed.
> Man page: systemd.exec.5
> Issue: B<select()> → B<select>(2)
Fixed.
> Man page: systemd.exec.5
> Issue: qemu → B<qemu>(1)
The man page doesn't seem to be in any of the canonical places on the web.
I added a link to online docs.
> Man page: systemd.exec.5
> Issue: variable → variables
Seems to be fixed already.
> Man page: systemd-integritysetup-generator.8
> Issue: systemd-integritysetup-generator → B<systemd-integritysetup-generator>
I changed <filename> to <command>.
> Man page: systemd-integritysetup-generator.8
> Issue: superfluous comma at the end
Already fixed.
> Man page: systemd-measure.1
> Issue: (see B<--pcr-bank=>) below → (see B<--pcr-bank=> below)
Reworded.
> Man page: systemd-measure.1
> Issue: =PATH> → =>I<PATH>
Fixed.
> Man page: systemd-measure.1.po
> Issue: B<--bank=DIGEST> → B<--bank=>I<DIGEST>
Fixed.
> Man page: systemd.netdev.5
> Issue: os the → on the
Appears to have been fixed already.
> Man page: systemd.netdev.5
> Issue: Onboard → On-board (as in previous string)
Updated.
> Man page: systemd.network.5
> Issue: B<systemd-networkd> -> B<systemd-networkd>(8)
First reference does this, subsequent do not.
> Man page: systemd.network.5
> Issue: B<netlabelctl> → B<netlabelctl>(8)
First reference does this, subsequent do not.
> Man page: systemd.network.5
> Issue: Missing verb (aquired? configured?) in the half sentence starting with "or by a "
I dropped the comma.
> Man page: systemd-nspawn.1
> Issue: All host users outside of that range → All other host users
Reworded.
> # FIXME no effect → no effect\\&.
> #. type: Plain text
> #: archlinux debian-unstable fedora-rawhide mageia-cauldron opensuse-tumbleweed
> msgid ""
> "Whichever ID mapping option is used, the same mapping will be used for users "
> "and groups IDs\\&. If B<rootidmap> is used, the group owning the bind "
> "mounted directory will have no effect"
A period is added. Not sure if there's some other issue.
> Man page: systemd-oomd.service.8
> Issue: B<systemd> → B<systemd>(1)
Done.
> Man page: systemd.path.5
> Issue 1: B<systemd.exec>(1) → B<systemd.exec>(5)
> Issue 2: This section does not (yet?) exist
Fixed.
> Man page: systemd-pcrphase.service.8
> Issue 1: indicate phases into TPM2 PCR 11 ??
> Issue 2: Colon at the end of the paragraph?
Fixed.
> Man page: systemd-pcrphase.service.8
> Issue: final boot phase → final shutdown phase?
Updated.
> Man page: systemd-pcrphase.service.8
> Issue: for the the → for the
Fixed tree-wide.
> Man page: systemd-portabled.service.8
> Issue: In systemd-portabled.service(8): Portable Services Documentation
Updated.
> Man page: systemd-pstore.service.8
> Issue: Here and the following paragraphs: . → \\&. // Upstream: What does this comment mean? // You normally write \\&. for a full dot (full stop etc.); here you write only "." (i.e. a plain dot).
>
> "and we look up \"localhost\", nss-dns will send the following queries to "
> "systemd-resolved listening on 127.0.0.53:53: first \"localhost.foobar.com\", "
> "then \"localhost.barbar.com\", and finally \"localhost\". If (hopefully) the "
> "first two queries fail, systemd-resolved will synthesize an answer for the "
> "third query."
Looks all OK to me.
> Man page: systemd.resource-control.5
> Issue: Missing closing bracket after link to Control Groups version 1
Fixed.
> Man page: systemd-sysext.8
> Issue: In systemd-portabled.service(8): Portable Services Documentation
Updated.
> Man page: systemd.timer.5
> Issue 1: B<systemd.exec>(1) → B<systemd.exec>(5)
> Issue 2: This section does not (yet?) exist
Fixed.
> Man page: systemd.unit.5
> Issue: that is → that are
Fixed.
> Man page: systemd-veritysetup-generator.8
> Issue: systemd-veritysetup-generator → B<systemd-veritysetup-generator>
>
> "systemd-veritysetup-generator implements B<systemd.generator>(7)\\&."
>
> "systemd-veritysetup-generator understands the following kernel command line "
> "parameters:"
Updated.
> Man page: systemd-volatile-root.service.8
> Issue: initrdyes → Initrd
Fixed.
> Man page: sysupdate.d.5
> Issue: : → \\&. (As above in TRANSFER)
Updated.
> Man page: sysupdate.d.5
> Issue: some → certain
Updated.
> Man page: sysupdate.d.5
> Issue 1: i\\&.e\\& → I\\&.e\\&
Fixed.
> Issue 2: the image → the system
"image" seems correct.
> Man page: tmpfiles.d.5
> Issue: systemd-tmpfiles → B<systemd-tmpfiles>(8)
Updated.
2023-01-11 23:45:59 +08:00
|
|
|
are bound to specific signed PCR values. If this is not specified explicitly, and a credential
|
2022-08-17 23:28:49 +08:00
|
|
|
with a signed PCR policy is attempted to be decrypted, a suitable signature file
|
|
|
|
<filename>tpm2-pcr-signature.json</filename> is searched for in <filename>/etc/systemd/</filename>,
|
|
|
|
<filename>/run/systemd/</filename>, <filename>/usr/lib/systemd/</filename> (in this order) and
|
2023-08-23 00:52:36 +08:00
|
|
|
used.</para>
|
|
|
|
|
|
|
|
<xi:include href="version-info.xml" xpointer="v252"/></listitem>
|
2022-08-17 23:28:49 +08:00
|
|
|
</varlistentry>
|
|
|
|
|
2024-04-04 23:05:18 +08:00
|
|
|
<varlistentry>
|
|
|
|
<term><option>--allow-null</option></term>
|
|
|
|
|
|
|
|
<listitem><para>Allow decrypting credentials that use an empty key.</para>
|
|
|
|
|
|
|
|
<xi:include href="version-info.xml" xpointer="v256"/></listitem>
|
|
|
|
</varlistentry>
|
|
|
|
|
2022-04-19 21:08:23 +08:00
|
|
|
<varlistentry>
|
|
|
|
<term><option>--quiet</option></term>
|
|
|
|
<term><option>-q</option></term>
|
|
|
|
|
2024-05-31 18:00:00 +08:00
|
|
|
<listitem><para>Suppress additional output.</para>
|
2023-08-23 00:52:36 +08:00
|
|
|
|
|
|
|
<xi:include href="version-info.xml" xpointer="v251"/></listitem>
|
2022-04-19 21:08:23 +08:00
|
|
|
</varlistentry>
|
|
|
|
|
2021-06-23 15:41:49 +08:00
|
|
|
<xi:include href="standard-options.xml" xpointer="no-pager" />
|
|
|
|
<xi:include href="standard-options.xml" xpointer="no-legend" />
|
|
|
|
<xi:include href="standard-options.xml" xpointer="json" />
|
|
|
|
</variablelist>
|
|
|
|
</refsect1>
|
|
|
|
|
|
|
|
<refsect1>
|
|
|
|
<title>Exit status</title>
|
|
|
|
|
|
|
|
<para>On success, 0 is returned.</para>
|
|
|
|
</refsect1>
|
|
|
|
|
|
|
|
<refsect1>
|
|
|
|
<title>Examples</title>
|
|
|
|
|
|
|
|
<example>
|
|
|
|
<title>Encrypt a password for use as credential</title>
|
|
|
|
|
|
|
|
<para>The following command line encrypts the specified password <literal>hunter2</literal>, writing the result
|
|
|
|
to a file <filename>password.cred</filename>.</para>
|
|
|
|
|
|
|
|
<programlisting># echo -n hunter2 | systemd-creds encrypt - password.cred</programlisting>
|
|
|
|
|
|
|
|
<para>This decrypts the file <filename>password.cred</filename> again, revealing the literal password:</para>
|
|
|
|
|
|
|
|
<programlisting># systemd-creds decrypt password.cred
|
|
|
|
hunter2</programlisting>
|
|
|
|
</example>
|
|
|
|
|
|
|
|
<example>
|
|
|
|
<title>Encrypt a password and include it in a unit file</title>
|
|
|
|
|
|
|
|
<para>The following command line prompts the user for a password and generates a
|
|
|
|
<varname>SetCredentialEncrypted=</varname> line from it for a credential named
|
|
|
|
<literal>mysql-password</literal>, suitable for inclusion in a unit file.</para>
|
|
|
|
|
|
|
|
<programlisting># systemd-ask-password -n | systemd-creds encrypt --name=mysql-password -p - -
|
|
|
|
🔐 Password: ****
|
|
|
|
SetCredentialEncrypted=mysql-password: \
|
|
|
|
k6iUCUh0RJCQyvL8k8q1UyAAAAABAAAADAAAABAAAAASfFsBoPLIm/dlDoGAAAAAAAAAA \
|
|
|
|
NAAAAAgAAAAAH4AILIOZ3w6rTzYsBy9G7liaCAd4i+Kpvs8mAgArzwuKxd0ABDjgSeO5k \
|
|
|
|
mKQc58zM94ZffyRmuNeX1lVHE+9e2YD87KfRFNoDLS7F3YmCb347gCiSk2an9egZ7Y0Xs \
|
|
|
|
700Kr6heqQswQEemNEc62k9RJnEl2q7SbcEYguegnPQUATgAIAAsAAAASACA/B90W7E+6 \
|
|
|
|
yAR9NgiIJvxr9bpElztwzB5lUJAxtMBHIgAQACCaSV9DradOZz4EvO/LSaRyRSq2Hj0ym \
|
|
|
|
gVJk/dVzE8Uxj8H3RbsT7rIBH02CIgm/Gv1ukSXO3DMHmVQkDG0wEciyageTfrVEer8z5 \
|
|
|
|
9cUQfM5ynSaV2UjeUWEHuz4fwDsXGLB9eELXLztzUU9nsAyLvs3ZRR+eEK/A==</programlisting>
|
|
|
|
|
|
|
|
<para>The generated line can be pasted 1:1 into a unit file, and will ensure the acquired password will
|
|
|
|
be made available in the <varname>$CREDENTIALS_DIRECTORY</varname><filename>/mysql-password</filename>
|
|
|
|
credential file for the started service.</para>
|
|
|
|
|
|
|
|
<para>Utilizing the unit file drop-in logic this can be used to securely pass a password credential to
|
|
|
|
a unit. A similar, more comprehensive set of commands to insert a password into a service
|
|
|
|
<filename>xyz.service</filename>:</para>
|
|
|
|
|
|
|
|
<programlisting># mkdir -p /etc/systemd/system/xyz.service.d
|
2023-11-08 17:31:55 +08:00
|
|
|
# systemd-ask-password -n | ( echo "[Service]" && systemd-creds encrypt --name=mysql-password -p - - ) >/etc/systemd/system/xyz.service.d/50-password.conf
|
2021-06-23 15:41:49 +08:00
|
|
|
# systemctl daemon-reload
|
|
|
|
# systemctl restart xyz.service</programlisting>
|
|
|
|
</example>
|
|
|
|
</refsect1>
|
|
|
|
|
|
|
|
<refsect1>
|
|
|
|
<title>See Also</title>
|
2023-12-23 02:09:32 +08:00
|
|
|
<para><simplelist type="inline">
|
|
|
|
<member><citerefentry><refentrytitle>systemd</refentrytitle><manvolnum>1</manvolnum></citerefentry></member>
|
|
|
|
<member><citerefentry><refentrytitle>systemd.exec</refentrytitle><manvolnum>5</manvolnum></citerefentry></member>
|
|
|
|
<member><citerefentry><refentrytitle>systemd-measure</refentrytitle><manvolnum>1</manvolnum></citerefentry></member>
|
|
|
|
</simplelist></para>
|
2021-06-23 15:41:49 +08:00
|
|
|
</refsect1>
|
|
|
|
|
|
|
|
</refentry>
|