After rebuild of the efi image, the disk is decrypted and mounted without a prompt for entering the decryption password on my side.
Nothing is else is change by me on the default setup except the new efi image I generated.
How is this automatic boot working and how do I make the new EFI image prompt for password?
I want to sign the efi image so I can enable secure boot, but I noticed that happened…
Don't even start this toxic attitude.
I've read all over the arch wikies, stack exchange and so on, there is absolutely no information.
What is the idea behind "Garuda Team" members that flip off people telling them to google it anyway? I didn't ask how to install a package using pacman since I was too lazy to man it did I? Is this someway of saying that you have no Idea, but still make yourself useful?
dont even start that demanding attitude.
We still need to know what steps you took in order to give relevant ( aka not redundant ) information.
Tbh, for most of the questions people have all I do is putting the query into my search engine of choice trying to search for a solution
In this case its quite unclear where the code snippets came from so I think its a valid question as the topic is quite specific Also, secure boot is nothing supported by default as we advise to turn it off in order for booting live usb to suceed.
Its impossible to know everything, especially if the topic is something which most people wont ever touch. Still, its useful to do some basic troubleshooting & getting answers which might help someone who actually knows whats going on. This is also called teamwork
This doesn't have anything to do with secure boot. I haven't reached there yet.
I only mentioned it to give some backstory on why I was doing what I was doing.
Let me clarify the situation.
I did a clean install, no swap, FDE enabled, default partitions.
I generated a new efi image, using the commands, I don't know what you want me to say about it more than that, pretty much standard Linux process for generating an efi image...
added a boot entry using efibootmgr.
There isn't anything in-between step 1 and step 2, no other changes to system, nothing, crypttab is the same, everything is the same as a fresh install with exception to the above.
The issue:
On fresh install with FDE, before I regenerate the EFI I get prompted for luks password due to FDE, after the new boot entry and image regeneration I boot without being asked for password, by boot I mean successful login screen, so the disk is decrypted and mapped successfully.
I wanna know why is this happening and how to stop it from happening after a new EFI.
So no, the question isn't valid at all, secure boot is not enabled. Just some person that flipped me off for asking a valid question - so excuse my frustration.
I agree, you cannot know everything, that is why I am asking.
btw, what I am aiming at in the end is a FDE + secure boot + TPM.
This will greatly improve security on Garuda installed laptops and I am planning on writing a guide on it once done, don't hate before you know the full story.
EDIT: If someone knows what is going on I wouldn't be flamed like that for no reason at all
Yeah, but I haven't setup that yet so this isn't the cause for the automatic boot without a key. As far as I am aware this feature is not coming to cryptsetup before 2.4 nor does the Garuda installer supports this by default.
EDIT:
Just disabled TPM chip using UEFI, this is still the same. 100% not a feature of Garuda
Autobooting due to "/crypto_keyfile.bin" set in crypttab and mkinitcpio.conf.
When that key is removed the screen goes to a loading loop without password prompt, this is due to the plymouth hook in mkinitcpio.conf. After removing this hook and rebuilding the initial ramdisk all seems fine now, even the hook for TPM is working.
When finished with all the testing I'll post a guide or something in a another thread.
Thanks for all of your help, it was really productive for me.