Encrypted disk
#1
Has anyone looked into running the pbpro with full disk encryption? It works really nicely on x86, but since the whole boot mechanism is different, there is no guarantee it will work out of the box.

Thanks,
#2
(09-27-2019, 02:29 PM)jpakkane Wrote: Has anyone looked into running the pbpro with full disk encryption? It works really nicely on x86, but since the whole boot mechanism is different, there is no guarantee it will work out of the box.

Thanks,

One thing I plan to look into, is to use an encrypting file system like OpenZFS or BTRFS. Both also allow alternate boot environments using snapshots, which save space. OpenZFS allows having an encrypted root filesystem, if the "/boot" is un-encrypted.

I've used LUKS before, but there are certain advantages to FS managed encryption.
--
Arwen Evenstar
Princess of Rivendale
#3
(09-27-2019, 04:22 PM)Arwen Wrote:
(09-27-2019, 02:29 PM)jpakkane Wrote: Has anyone looked into running the pbpro with full disk encryption? It works really nicely on x86, but since the whole boot mechanism is different, there is no guarantee it will work out of the box.

Thanks,

One thing I plan to look into, is to use an encrypting file system like OpenZFS or BTRFS. Both also allow alternate boot environments using snapshots, which save space. OpenZFS allows having an encrypted root filesystem, if the "/boot" is un-encrypted.

I've used LUKS before, but there are certain advantages to FS managed encryption.

I'm highly interested in any how-to for such encryption for PBP as well.
#4
I was able to set up crypttab just like on other arches and it works great, BUT I had to build a custom version of mrfixit2001's kernel with DM_CRYPT enabled in the config, and create and configure an initramfs. Not the most newbie-friendly way to do full disk encryption, but it proves that it's possible.
#5
Getting filesystem encryption up and running on Debian was more effort than I thought. It should be easier on Ubuntu as it comes with a dm-crypt module and an initrd.

My notes on how I encrypted the /home partition on Debian are available on my website (click on the website icon below). You definitely need to understand what you are doing.

By setting up filesystem encryption, you lose the ability to run MrFixIT's update script as this takes the liberty to overwrite files which I replaced a/o edited. You need to manually merge his updates from then on.
#6
If encrypting just the home directory is enough (and for most people it is), then ecryptfs is an option. It won't work on the Debian image, though, because the required kernel module is not available.
#7
(11-04-2019, 11:02 AM)jpakkane Wrote: If encrypting just the home directory is enough (and for most people it is), then ecryptfs is an option.

I have to admit I have never heard of eCryptfs.

Benchmarks: https://www.phoronix.com/scan.php?page=a...-418&num=1: eCryptfs is slower and has a higher cpu overhead.

Functionality:

ECryptsfs can't encrypt swap.

ECryptfs does not require a dedicated partition. That's not a problem on my desktop where I have lots of hard disk space, but a big plus on my Pinebook Pro where I can't afford to "lose" diskspace by having free diskspace on the wrong partition.



By the way, what does one gain by full-disk encryption? The term is misleading as one does not encrypt the /boot partition including the kernel and initrd.

If one wants to prevent someone from tempering with the root filesystem, then that's also possible by replacing the initrd with one that that includes a backdoor. The backdoor can modify the root filesystem right after it's unencrypted and before the boot continues.

(11-04-2019, 11:02 AM)jpakkane Wrote: It won't work on the Debian image, though, because the required kernel module is not available.


There is no voodoo magic in building the right kernel module.
#8
Quote:By the way, what does one gain by full-disk encryption? The term is misleading as one does not encrypt the /boot partition including the kernel and initrd.

If one wants to prevent someone from tempering with the root filesystem, then that's also possible by replacing the initrd with one that that includes a backdoor. The backdoor can modify the root filesystem right after it's unencrypted and before the boot continues.

A number of things, compared to filesystem-layer encryption:
  • While you can keep all private data in your homedir, it's easy to leak outside that - /var/log, swap, /etc, /tmp, etc.
  • Performance & reliability - dm-crypt translates one block device to another. eCryptFS has to implement a POSIX filesystem that saves to another POSIX filesystem.
  • Metadata leakage: while eCryptFS encrypts filenames, the directory structure, file count, file size, etc is all preserved in the encrypted version. If I can see that you have a directory with around 1000 files in it, whose directory structure and file sizes match an untarred torbrowser.tar.gz, that's information.
#9
You answered what I was asking for but not what I meant  Big Grin

I was interested in the advantage of luks / over luks /home. I think that boils down to:

Quote:While you can keep all private data in your homedir, it's easy to leak outside that - /var/log, swap, /etc, /tmp, etc.

Swap can be trivially encrypted with luks as well. /tmp can be made a memory filesystem - that's not the default in our Debian, though. It's really not great exposing /var/log and /etc.
#10
(11-05-2019, 08:56 PM)Der Geist der Maschine Wrote: You answered what I was asking for but not what I meant  Big Grin

I was interested in the advantage of luks / over luks /home. I think that boils down to:

Quote:While you can keep all private data in your homedir, it's easy to leak outside that - /var/log, swap, /etc, /tmp, etc.

Swap can be trivially encrypted with luks as well. /tmp can be made a memory filesystem - that's not the default in our Debian, though. It's really not great exposing /var/log and /etc.

Yeah, so LUKS on home+swap is in between FDE and eCryptFS /home. However, on my PCs I generally use a Btrfs or ZFS root partition, with a subvolume for /home. This allows space to be shared freely between /, /home, and other volumes, unlike partitioning. So I have a small /boot, and everything else is in one partition (swap is a file on /). So FDE is simpler and more convenient, IMHO.


Possibly Related Threads…
Thread Author Replies Views Last Post
Question Manjaro with Full Disk Encryption and GRUB dumetrulo 1 1,747 02-02-2024, 02:45 AM
Last Post: frankkinney
  Issue with booting Manjaro from encrypted NVMe drive on pbp Cs137 1 968 08-18-2023, 01:58 AM
Last Post: juliamenendez
  Encrypted Root jaredoconnor 1 976 01-19-2023, 02:27 PM
Last Post: Cs137
  Enter disk description passphrase Galaxy9 1 787 01-14-2023, 02:49 PM
Last Post: fxc
Information Install Void Linux with near-full-disk encryption dumetrulo 3 3,075 09-05-2022, 12:00 PM
Last Post: petersen77
  Manjaro Arm Encrypted EMMC detrexer 8 7,822 03-20-2020, 12:13 PM
Last Post: GloriousCoffee

Forum Jump:


Users browsing this thread: 1 Guest(s)