Hi,
My goal is to run a debian base image with disk encryption.
Proxmox host has zfs filesystem.
VM is installed with encrypted “/root disk” and serial socket.
Now I have to enter my “passphrase” when rebooting.
It's annoying, but that's the disadvantage of encryption.
VM /etc/default/grub --- config “text console=tty0 console=ttyS0,115200n8”
- without entry
- passphrase entry is only possible via Proxmox GUI VM console “noVNC”
- with entry
- passphrase can be entered via Proxmox host cli “qm terminal vmid” and gui console xterm.js BUT no longer via “noVNC”
I don't really understand this...
What is the “best practice” for VM disk encryption and passphrase?
Thanks...
My goal is to run a debian base image with disk encryption.
Proxmox host has zfs filesystem.
VM is installed with encrypted “/root disk” and serial socket.
Now I have to enter my “passphrase” when rebooting.
It's annoying, but that's the disadvantage of encryption.
VM /etc/default/grub --- config “text console=tty0 console=ttyS0,115200n8”
- without entry
- passphrase entry is only possible via Proxmox GUI VM console “noVNC”
- with entry
- passphrase can be entered via Proxmox host cli “qm terminal vmid” and gui console xterm.js BUT no longer via “noVNC”
I don't really understand this...
What is the “best practice” for VM disk encryption and passphrase?
Thanks...