Back to bug 1784524
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Red Hat Bugzilla | 2019-12-17 16:04:18 UTC | Pool ID | sst_platform_security_rhel_8 | |
| Sergio Correia | 2020-01-10 12:44:14 UTC | Keywords | Triaged | |
| Status | NEW | ASSIGNED | ||
| Martin Zelený | 2020-01-10 13:10:34 UTC | CC | mzeleny | |
| QA Contact | qe-baseos-security | mzeleny | ||
| Sergio Correia | 2020-01-14 04:05:06 UTC | Status | ASSIGNED | MODIFIED |
| Fixed In Version | clevis-11-8.el8 | |||
| errata-xmlrpc | 2020-01-14 04:09:29 UTC | Status | MODIFIED | ON_QA |
| errata-xmlrpc | 2020-02-06 16:03:58 UTC | Status | ON_QA | VERIFIED |
| Mirek Jahoda | 2020-02-12 15:35:14 UTC | CC | mjahoda | |
| Docs Contact | mjahoda | |||
| Doc Type | If docs needed, set a value | Enhancement | ||
| Sergio Correia | 2020-02-13 11:02:42 UTC | CC | scorreia | |
| Sergio Correia | 2020-04-22 13:37:36 UTC | Doc Text | Feature: Improved clevis support for decrypting multiple LUKS devices on boot Reason: Previously, it was required to do heavy (error-prone) changes to the system configuration in order to have clevis properly decrypt multiple devices on boot -- see https://access.redhat.com/articles/4500491. Result: clevis now supports decrypting multiple devices on boot in a simpler way: 1) basically `clevis luks bind` the LUKS devices and 2) update the initramfs with `dracut -fv --regenerate-all` |
|
| Mirek Jahoda | 2020-04-22 13:49:09 UTC | Doc Text | Feature: Improved clevis support for decrypting multiple LUKS devices on boot Reason: Previously, it was required to do heavy (error-prone) changes to the system configuration in order to have clevis properly decrypt multiple devices on boot -- see https://access.redhat.com/articles/4500491. Result: clevis now supports decrypting multiple devices on boot in a simpler way: 1) basically `clevis luks bind` the LUKS devices and 2) update the initramfs with `dracut -fv --regenerate-all` | .`Clevis` now provides improved support for decrypting multiple LUKS devices on boot The `clevis` packages have been updated to provide better support for decrypting multiple LUKS-encrypted devices on boot. Prior to this improvement, the administrator had to perform complicated changes to the system configuration to enable the proper decryption of multiple devices by Clevis on boot. With this release, you can set up the decryption by using the `clevis luks bind` command and updating the initramfs through the `dracut -fv --regenerate-all` command. For more details, see the link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/security_hardening/configuring-automated-unlocking-of-encrypted-volumes-using-policy-based-decryption_security-hardening[Configuring automated unlocking of encrypted volumes using policy-based decryption] section. |
| Mirek Jahoda | 2020-04-27 12:09:37 UTC | Doc Text | .`Clevis` now provides improved support for decrypting multiple LUKS devices on boot The `clevis` packages have been updated to provide better support for decrypting multiple LUKS-encrypted devices on boot. Prior to this improvement, the administrator had to perform complicated changes to the system configuration to enable the proper decryption of multiple devices by Clevis on boot. With this release, you can set up the decryption by using the `clevis luks bind` command and updating the initramfs through the `dracut -fv --regenerate-all` command. For more details, see the link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/security_hardening/configuring-automated-unlocking-of-encrypted-volumes-using-policy-based-decryption_security-hardening[Configuring automated unlocking of encrypted volumes using policy-based decryption] section. | .Clevis now provides improved support for decrypting multiple LUKS devices on boot The `clevis` packages have been updated to provide better support for decrypting multiple LUKS-encrypted devices on boot. Prior to this improvement, the administrator had to perform complicated changes to the system configuration to enable the proper decryption of multiple devices by Clevis on boot. With this release, you can set up the decryption by using the `clevis luks bind` command and updating the initramfs through the `dracut -fv --regenerate-all` command. For more details, see the link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/security_hardening/configuring-automated-unlocking-of-encrypted-volumes-using-policy-based-decryption_security-hardening[Configuring automated unlocking of encrypted volumes using policy-based decryption] section. |
| errata-xmlrpc | 2020-04-28 00:26:05 UTC | Status | VERIFIED | RELEASE_PENDING |
| errata-xmlrpc | 2020-04-28 15:37:11 UTC | Status | RELEASE_PENDING | CLOSED |
| Resolution | --- | ERRATA | ||
| Last Closed | 2020-04-28 15:37:11 UTC | |||
| errata-xmlrpc | 2020-04-28 15:37:23 UTC | Link ID | Red Hat Product Errata RHEA-2020:1595 | |
| Red Hat One Jira (issues.redhat.com) | 2023-06-26 14:39:47 UTC | Link ID | Red Hat Issue Tracker RHELPLAN-31602 |
Back to bug 1784524