On Tuesday 27 December 2016 11:58:53 Pali Rohár wrote: > On Monday 26 December 2016 18:58:04 Cyril Brulebois wrote: > > Hi, > > > > Pali Rohár <firstname.lastname@example.org> (2016-12-26): > > > Package: debian-installer > > > Severity: normal > > > > > > Dear Maintainer, > > > > > > Debian installer refuse me to install entire system (including > > > /boot) on > > > > > > one encrypted partition. It shows me this red fatal error message: > > > [!!] Partition disks > > > > > > Encryption configuration failure > > > > > > You have selected the root file system to be stored on an > > > encrypted partition. This feature requires a separate /boot > > > partition on which the kernel and initrd can be stored. > > > > > > You should go back and setup a /boot partition. > > > > > > There are two buttons <Go Back> and <Continue> but both buttons > > > go back and refuse to continue... > > > > > > Then I tried to have separate /boot and separate / partitions, > > > both LUKS encrypted. But Debian installer again refused to > > > install such > > > > > > configuration. It show me another red fatal error message: > > > [!!] Partition disks > > > > > > Encrypted configuration failure > > > > > > You have selected the /boot file system to be stored on an > > > encrypted partition. This is not possible because the boot > > > loader would be unable to load the kernel and initrd. > > > Continuing now would result in an installation that cannot be > > > used. > > > > > > You should go back and choose a non-encrypted partition for he > > > /boot file system. > > > > > > Again there are two buttons: <Go Back> and <Continue> and again > > > both go back and does not allow me to process changes and > > > continue. > > > > > > And that error message is incorrect. Grub2 has already supports > > > for accessing LUKS partitions. Just add GRUB_ENABLE_CRYPTODISK=y > > > (or in older versions GRUB_CRYPTODISK_ENABLE=y) to > > > /etc/default/grub. > > > > > > Debian installer should allow users to install system on fully > > > encrypted disk (also with /boot) and should not force users to > > > have always /boot unencrypted. > > > > > > At least expert users should be able to skip that error message > > > and continue installation as error message is not truth anymore. > > > > FWIW: This is implemented in the partman-crypto package, see > > check.d/crypto_check_mountpoints > > > > And yeah, given latest grub features, updating this logic/these > > checks seems to make sense. > > > > I'm not sure about possible side effects / requirements (like > > having to preconfigure grub to have appropriate configuration > > bits); this would likely lead to having to update some > > documentation; one might have to be careful about archs where grub > > is available/can load stuff from an encrypted device. > > If such logic is complicated to implement, then for *expert* users > should be such installation allowed. Expert users could re-configure > grub2 as needed if they know what they are doing. > > But currently I'm not able to skip that error message in any way. Any progress for skipping this red fatal error message? -- Pali Rohár email@example.com
Description: This is a digitally signed message part.