I'm trying to unlock cryptdisks over wifi+ssh. It's fairly common to have luks disks + ssh, but I've never seen a tutorial geared towards wifi.
In fact, if you run update-initramfs -u -v -k $(uname -r) as suggested in this post and every other post essentially, the script explicitly lists wireless and a bunch of similar sounding kernel modules as excluded. I have gone about the business of editing out those exclusions, and also trying these patches
Nothing seems to work. On boot, the pi is not visible on the network (interface wlan0 not found is commonly shown), and dropbear-initramfs never seems to "answer". nmap never shows the device or port.
Rather than debug my particular setup (which I would appreciate)...
is there a canonical way to have dropbear-initramfs pick up over a wifi network so that I can retreive keyfiles or ssh in before cryptsetup asks for passwords
I'm on a PI-zero-w or 4b with latest raspbian