qaz to Linux@lemmy.mlEnglish • edit-29 months agoTIL You can use systemd-analyze plot > plot.svg to plot the service startup time to find bottleneckslemmy.worldimagemessage-square60fedilinkarrow-up1790arrow-down116file-text
arrow-up1774arrow-down1imageTIL You can use systemd-analyze plot > plot.svg to plot the service startup time to find bottleneckslemmy.worldqaz to Linux@lemmy.mlEnglish • edit-29 months agomessage-square60fedilinkfile-text
minus-square@jsdz@lemmy.mllinkfedilink165•9 months agoI'm pretty sure the main system startup bottleneck is me typing the disk encryption passphrase.
minus-squareastrsklinkfedilink29•9 months agoCombine that with the 20-30 seconds my system takes to do bios memory training on the DDR5 ram and we’re practically back to the “go make some coffee while the system boots up” days 🤦
minus-square@DolphinMath@slrpnk.netlinkfedilinkEnglish2•edit-29 months agoIf only Coreboot supported more devices…
minus-square@GodIsNull@feddit.delinkfedilink1•9 months agoThose where the good days. You always had fresh coffee when your computer was ready for work.
minus-square@magikmw@lemm.eelinkfedilink6•9 months agoI wish to replace it with a yubikey, but I don't even know if it's supported.
minus-squareUllebe1linkfedilink14•edit-29 months agoIt is supported by systemd to use FIDO2 + pin to decrypt luks partitions with many security keys, including Yubikeys. I use it every day on my laptop.
minus-square@Skeletonek@lemmy.ziplinkfedilinkEnglish8•9 months agoIt is, I have it set up on my laptop. It's a bit finicky in how it works and it's not easy to setup, but it is possible.
minus-square@stifle867@programming.devlinkfedilink3•9 months agoDoes it work by emulating the keyboard and typing in the password? Or by the encrypted protocol that works using the on device secret?
minus-square@Skeletonek@lemmy.ziplinkfedilinkEnglish1•9 months agoBoth should be possible. I am using the psuedo 2FA method. First I type the PIN and after that I confirm with YubiKey.
minus-square@Contend6248@feddit.delinkfedilink2•9 months agoYou can't even use a fucking fingerprint scanner while being in the system, that package is borked for months and nobody seem to care to solve it. I think using Yubikey at boot time is quite out of reach
minus-square@Flex@lemmy.worldlinkfedilink4•9 months agoFucking true. Does anyone know why this is so slow?
I'm pretty sure the main system startup bottleneck is me typing the disk encryption passphrase.
Combine that with the 20-30 seconds my system takes to do bios memory training on the DDR5 ram and we’re practically back to the “go make some coffee while the system boots up” days 🤦
we need open source firmware
If only Coreboot supported more devices…
Those where the good days. You always had fresh coffee when your computer was ready for work.
I can relate to this hahaha
My system bottleneck is the damn Bios Post
I wish to replace it with a yubikey, but I don't even know if it's supported.
It is supported by systemd to use FIDO2 + pin to decrypt luks partitions with many security keys, including Yubikeys. I use it every day on my laptop.
It is, I have it set up on my laptop. It's a bit finicky in how it works and it's not easy to setup, but it is possible.
Does it work by emulating the keyboard and typing in the password? Or by the encrypted protocol that works using the on device secret?
Both should be possible. I am using the psuedo 2FA method. First I type the PIN and after that I confirm with YubiKey.
You can't even use a fucking fingerprint scanner while being in the system, that package is borked for months and nobody seem to care to solve it.
I think using Yubikey at boot time is quite out of reach
Fucking true. Does anyone know why this is so slow?