Re: Using a keyfile with full disk encryption (saout: to exclusive)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



This might do you:
http://grub.johnlane.ie/

/D

On 10/04/2016 11:43 AM, Arno Wagner - arno@xxxxxxxxxxx wrote:
> Hi Tim,
> 
> full disk encryption is provided by your distribution, usually
> by some mechanism in the initrd. This is out of scope for this
> mailing-list here.
> 
> However I can tell you that I have personally done something 
> similar to what you want.
> 
> What you need to do is either drop to a shell in the initrd
> and mount the usb-key using that, or that you modify the 
> code in the initrd to mount that USB-stick and read the passphrase
> from it. The other thing you could do with a remotely-accessible 
> shell in the initrd is that you could use that to 
> mount the encrypted volumes manually yourself and then 
> continue the root process, on debian with something like this:
> 
>     exec switch_root /mnt/root /sbin/init
> 
> You copuld also hardcode the passprase in the initrd and
> place initrd and kernel on that USB-key. That is what I have 
> done.
> 
> I can give you a bit of background about what a Debian initrd 
> looks like, and Ubuntu may be similar. All action happens in
> /init, which on the initrd is a shell-script executed
> by busybox and hence pretty straight-forward to change. For
> testing, I just used the following "init". You can use something 
> like this to find out what commands work. After that
> you can put in your custom init instead. You can also add
> binaries to teh initrd, but you must make sure they are
> either statically compiled or all libraries are there.
> 
> ----
> #!/bin/sh
> 
> export PATH=/sbin:/bin
> [ -d /sys ] || mkdir /sys
> [ -d /proc ] || mkdir /proc
> [ -d /tmp ] || mkdir /tmp
> mount -t sysfs -o nodev,noexec,nosuid sysfs /sys
> mount -t proc -o nodev,noexec,nosuid proc /proc
> 
> echo
> echo "initrd is running"
> echo "Using BusyBox..."
> echo
> exec /bin/ash --login
> ----
> 
> Now, how do you create or modify an initrd? Best reference I 
> have is this one here: 
> 
> http://www.thegeekstuff.com/2009/07/how-to-view-modify-and-recreate-initrd-img/
> 
> Regards,
> Arno
> 
> 
> 
> 
> On Tue, Oct 04, 2016 at 10:37:36 CEST, Tim Kerby wrote:
>> I've enabled full disk encryption on a recent server install of Ubuntu
>> (using the checkbox in the installer).  This is there mainly for security
>> when disks are replaced
>>
>> Unfortunately, we've had a few power failures and the requirement to enter
>> the passphrase for LUKS at the physical terminal is an issue.
>>
>> I'd be happy to keep a keyfile on a USB key or SD card as I could mount
>> these internal to the server which is physically secured
>>
>> Is there a method to ensure the USB key is mounted prior to the password
>> prompt and adding the keyfile as an additional method at startup?
>>
>> Thanks
>>
>> Tim
>>
>> _______________________________________________
>> dm-crypt mailing list
>> dm-crypt@xxxxxxxx
>> http://www.saout.de/mailman/listinfo/dm-crypt
> 

_______________________________________________
dm-crypt mailing list
dm-crypt@xxxxxxxx
http://www.saout.de/mailman/listinfo/dm-crypt



[Index of Archives]     [Device Mapper Devel]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Packaging]     [Fedora SELinux]     [Yosemite News]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux