Centos – Best way to secure Kickstart encrypted partition passwords

centoskickstartluks

I have a CentOS 6.5 environment that boots up servers using Kickstart. One of the requirements of our Kickstart is that the partitions are encrypted. Since Anaconda can only take plain text passwords for LUKS encrypted partitions, what's the best way to secure the Kickstart config files? We are currently serving them over HTTP and soon to be HTTPS.

Best Answer

What we do is kickstart with a dummy password and then change it after installation.