Combine that with the 20-30 seconds my system takes to do bios memory training on the DDR5 ram and we’re practically back to the “go make some coffee while the system boots up” days 🤦
As another DDR5 user, it’s not always this bad - there’s a bios setting that makes it remember the previous configuration and skips this step, but sometimes it still needs to do it, and then it can take a minute or two
I’m pretty sure the main system startup bottleneck is me typing the disk encryption passphrase.
Combine that with the 20-30 seconds my system takes to do bios memory training on the DDR5 ram and we’re practically back to the “go make some coffee while the system boots up” days 🤦
we need open source firmware
If only Coreboot supported more devices…
Glad I haven’t built a modern chipset PC yet, didn’t realize it was this bad.
As another DDR5 user, it’s not always this bad - there’s a bios setting that makes it remember the previous configuration and skips this step, but sometimes it still needs to do it, and then it can take a minute or two
Those where the good days. You always had fresh coffee when your computer was ready for work.
I can relate to this hahaha
I wish to replace it with a yubikey, but I don’t even know if it’s supported.
It is supported by systemd to use FIDO2 + pin to decrypt luks partitions with many security keys, including Yubikeys. I use it every day on my laptop.
It is, I have it set up on my laptop. It’s a bit finicky in how it works and it’s not easy to setup, but it is possible.
Does it work by emulating the keyboard and typing in the password? Or by the encrypted protocol that works using the on device secret?
Both should be possible. I am using the psuedo 2FA method. First I type the PIN and after that I confirm with YubiKey.
You can’t even use a fucking fingerprint scanner while being in the system, that package is borked for months and nobody seem to care to solve it.
I think using Yubikey at boot time is quite out of reach
My system bottleneck is the damn Bios Post