Back to bug 1784524

Who When What Removed Added
Red Hat Bugzilla 2019-12-17 16:04:18 UTC Pool ID sst_platform_security_rhel_8
Sergio Correia 2020-01-10 12:44:14 UTC Keywords Triaged
Status NEW ASSIGNED
Martin Zelený 2020-01-10 13:10:34 UTC CC mzeleny
QA Contact qe-baseos-security mzeleny
Sergio Correia 2020-01-14 04:05:06 UTC Status ASSIGNED MODIFIED
Fixed In Version clevis-11-8.el8
errata-xmlrpc 2020-01-14 04:09:29 UTC Status MODIFIED ON_QA
errata-xmlrpc 2020-02-06 16:03:58 UTC Status ON_QA VERIFIED
Mirek Jahoda 2020-02-12 15:35:14 UTC CC mjahoda
Docs Contact mjahoda
Doc Type If docs needed, set a value Enhancement
Sergio Correia 2020-02-13 11:02:42 UTC CC scorreia
Sergio Correia 2020-04-22 13:37:36 UTC Doc Text Feature: Improved clevis support for decrypting multiple LUKS devices on boot

Reason: Previously, it was required to do heavy (error-prone) changes to the system configuration in order to have clevis properly decrypt multiple devices on boot -- see https://access.redhat.com/articles/4500491.

Result: clevis now supports decrypting multiple devices on boot in a simpler way: 1) basically `clevis luks bind` the LUKS devices and 2) update the initramfs with `dracut -fv --regenerate-all`
Mirek Jahoda 2020-04-22 13:49:09 UTC Doc Text Feature: Improved clevis support for decrypting multiple LUKS devices on boot

Reason: Previously, it was required to do heavy (error-prone) changes to the system configuration in order to have clevis properly decrypt multiple devices on boot -- see https://access.redhat.com/articles/4500491.

Result: clevis now supports decrypting multiple devices on boot in a simpler way: 1) basically `clevis luks bind` the LUKS devices and 2) update the initramfs with `dracut -fv --regenerate-all`
.`Clevis` now provides improved support for decrypting multiple LUKS devices on boot

The `clevis` packages have been updated to provide better support for decrypting multiple LUKS-encrypted devices on boot. Prior to this improvement, the administrator had to perform complicated changes to the system configuration to enable the proper decryption of multiple devices by Clevis on boot. With this release, you can set up the decryption by using the `clevis luks bind` command and updating the initramfs through the `dracut -fv --regenerate-all` command.

For more details, see the link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/security_hardening/configuring-automated-unlocking-of-encrypted-volumes-using-policy-based-decryption_security-hardening[Configuring automated unlocking of encrypted volumes using policy-based decryption] section.
Mirek Jahoda 2020-04-27 12:09:37 UTC Doc Text .`Clevis` now provides improved support for decrypting multiple LUKS devices on boot

The `clevis` packages have been updated to provide better support for decrypting multiple LUKS-encrypted devices on boot. Prior to this improvement, the administrator had to perform complicated changes to the system configuration to enable the proper decryption of multiple devices by Clevis on boot. With this release, you can set up the decryption by using the `clevis luks bind` command and updating the initramfs through the `dracut -fv --regenerate-all` command.

For more details, see the link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/security_hardening/configuring-automated-unlocking-of-encrypted-volumes-using-policy-based-decryption_security-hardening[Configuring automated unlocking of encrypted volumes using policy-based decryption] section.
.Clevis now provides improved support for decrypting multiple LUKS devices on boot

The `clevis` packages have been updated to provide better support for decrypting multiple LUKS-encrypted devices on boot. Prior to this improvement, the administrator had to perform complicated changes to the system configuration to enable the proper decryption of multiple devices by Clevis on boot. With this release, you can set up the decryption by using the `clevis luks bind` command and updating the initramfs through the `dracut -fv --regenerate-all` command.

For more details, see the link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/security_hardening/configuring-automated-unlocking-of-encrypted-volumes-using-policy-based-decryption_security-hardening[Configuring automated unlocking of encrypted volumes using policy-based decryption] section.
errata-xmlrpc 2020-04-28 00:26:05 UTC Status VERIFIED RELEASE_PENDING
errata-xmlrpc 2020-04-28 15:37:11 UTC Status RELEASE_PENDING CLOSED
Resolution --- ERRATA
Last Closed 2020-04-28 15:37:11 UTC
errata-xmlrpc 2020-04-28 15:37:23 UTC Link ID Red Hat Product Errata RHEA-2020:1595
Red Hat One Jira (issues.redhat.com) 2023-06-26 14:39:47 UTC Link ID Red Hat Issue Tracker RHELPLAN-31602

Back to bug 1784524