I'm trying to unlock cryptdisks over wifi+ssh. It's fairly common to have luks disks + ssh, but I've never seen a tutorial geared towards wifi.
In fact, if you run update-initramfs -u -v -k $(uname -r)
as suggested in this post and every other post essentially, the script explicitly lists wireless
and a bunch of similar sounding kernel modules as excluded. I have gone about the business of editing out those exclusions, and also trying these patches
Nothing seems to work. On boot, the pi is not visible on the network (interface wlan0 not found
is commonly shown), and dropbear-initramfs never seems to "answer". nmap
never shows the device or port.
Rather than debug my particular setup (which I would appreciate)...
is there a canonical way to have dropbear-initramfs pick up over a wifi network so that I can retreive keyfiles or ssh in before cryptsetup asks for passwords
I'm on a PI-zero-w or 4b with latest raspbian