Confirm Tang Key Implementation on Encrypted Device

Follow these steps to confirm that the Tang Key configuration applied to a host encrypted partition or volume was successfully implemented.

What Do You Need?

Steps

  1. In the Cockpit web console Storage page, select a drive from the Drives table.

  2. In the Storage [model name] page, navigate to the Partitions table.
  3. In the Partitions table, find the row with the encrypted partition or volume and then click the down arrow icon to expand the table information.

    An Encryption tab appears.

  4. Click the Encryption tab and navigate to Key section.
  5. In the Keys section, verify that the Tang server properties appear in the Keys list, for example:

    Keys
    Passphrase                               Slot 0
    Keyserver: tangserver.example.com:7500   Slot 1
  6. Perform the following steps to verify that the bindings are available for early boot:
    1. In the Cockpit web console, click Terminal to access the terminal window.
    2. Use the lsinitrd command to verify that the host Clevis bindings are available for early boot, for example:
      sudo lsinitrd | grep clevis

      Output similar to the following appears:

      clevis
      clevis-pin-sss
      clevis-pin-tang
      clevis-pin-tpm2
      -rwxr-xr-x   1 root  root   1600 May 3 16:30 usr/bin/clevis
      -rwxr-xr-x   1 root  root   1654 May 3 16:30 usr/bin/clevis-decrypt
      ...
      -rwxr-xr-x   2 root  root     45 May 3 16:30 usr/lib/dracut/hooks/initqueue/settled/60-clevis-hook.sh
      -rwxr-xr-x   1 root  root   2257 May 3 16:30 usr/libexec/clevis-luks-askpass