]> git.ipfire.org Git - thirdparty/systemd.git/commitdiff
cryptenroll: add TPM2 PIN documentation
authorGrigori Goronzy <greg@chown.ath.cx>
Fri, 18 Feb 2022 11:51:00 +0000 (12:51 +0100)
committerGrigori Goronzy <greg@chown.ath.cx>
Tue, 15 Mar 2022 20:17:00 +0000 (21:17 +0100)
man/systemd-cryptenroll.xml

index d5fdb54cdd174694273ead70349595a069c21fe5..58a46267680e142f5c2e958fed96254adac21127 100644 (file)
         signatures likely will validate against pre-existing certificates.</para></listitem>
       </varlistentry>
 
+      <varlistentry>
+        <term><option>--tpm2-with-pin=</option><replaceable>BOOL</replaceable></term>
+
+        <listitem><para>When enrolling a TPM2 device, controls whether to require the user to enter a PIN
+        when unlocking the volume in addition to PCR binding, based on TPM2 policy authentication. Defaults
+        to <literal>no</literal>. Despite being called PIN, any character can be used, not just numbers.
+        </para>
+
+        <para>Note that incorrect PIN entry when unlocking increments the
+        TPM dictionary attack lockout mechanism, and may lock out users for a prolonged time, depending on
+        its configuration. The lockout mechanism is a global property of the TPM,
+        <command>systemd-cryptenroll</command> does not control or configure the lockout mechanism. You may
+        use tpm2-tss tools to inspect or configure the dictionary attack lockout, with
+        <citerefentry><refentrytitle>tpm2_getcap</refentrytitle><manvolnum>1</manvolnum></citerefentry> and
+        <citerefentry><refentrytitle>tpm2_dictionarylockout</refentrytitle><manvolnum>1</manvolnum></citerefentry>
+        commands, respectively.</para></listitem>
+      </varlistentry>
+
       <varlistentry>
         <term><option>--wipe-slot=</option><arg rep="repeat">SLOT</arg></term>