I have a CentOS 6.5 environment that boots up servers using Kickstart. One of the requirements of our Kickstart is that the partitions are encrypted. Since Anaconda can only take plain text passwords for LUKS encrypted partitions, what's the best way to secure the Kickstart config files? We are currently serving them over HTTP and soon to be HTTPS.
Centos – Best way to secure Kickstart encrypted partition passwords
centoskickstartluks
Related Topic
- Centos – What’s the best way to upgrade to centos 6
- Linux – Kickstart Key Error /dev/sda
- Kickstart CentOS 6 prompting for TCP/IP with network set to DHCP
- Centos kickstart script url installation with mirror
- How to additional routes be added to anaconda kickstart
- Lvm – Cannot get kernel to ask for LUKS password at boot after migrating the system from LVM to LVM on LUKS
Best Answer
What we do is kickstart with a dummy password and then change it after installation.