Re: Fedora 32 System-Wide Change proposal: Disallow Empty Password By Default

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thursday, December 5, 2019 2:56:22 AM MST Lennart Poettering wrote:
> Uh, first of all plain full disk encryption like we set it up
> typically on Fedora provides confidentiality, not integrity. For the
> OS image itself you want integrity though, confidentiality is not
> needed (after all anyone can download Fedora from the Internet,
> everyone knows all the bits and bytes in it anyway, it's inherently
> public information, there's zero point in encrypting it).

I have to disagree. The system itself is not just the list of packages 
installed, but can certainly include software that an individual or company 
wrote themselves or purchased , and do not wish to lose to a breach. This also 
includes global configuration files, which may include, for example, a VPN 
configuration, network configuration and so on.

> Unless you combine dm-crypt with dm-integrity (which we currently
> generally do not do), or you use dm-verity you are not actually
> protecting the OS from undetected modification.

Well, you are, in that the average attacker have to break or steal a key to 
decrypt the drive first. Sure, it wouldn't stop a sophisticated attack.

> And there's no point in encrypting /boot, because that contains only
> public information too. If you want to protect your boot chain, use
> something like a complete SecureBoot chain, but that too is something
> we currently don't actually support on Fedora. (because initrds are
> not verified).

This is not generally true either. Encrypting /boot helps to ensure that /boot 
is not modified, and is generally paired with GRUB signature validation. In 
some setups, this GRUB configuration is moved to flash storage.

> Anyway, figure out your threat model, and figure out how you want to
> protect what, and understand that for different parts of the
> installation different rules apply.

I don't believe this as the case, as specified above.

> And yes, I think encrypting the home directory with the user's own password
> makes most sense.

I suppose that's a good *start*, where users wouldn't use encryption 
otherwise.

-- 
John M. Harris, Jr.
Splentity

_______________________________________________
devel mailing list -- devel@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to devel-leave@xxxxxxxxxxxxxxxxxxxxxxx
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/devel@xxxxxxxxxxxxxxxxxxxxxxx




[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Fedora Announce]     [Fedora Users]     [Fedora Kernel]     [Fedora Testing]     [Fedora Formulas]     [Fedora PHP Devel]     [Kernel Development]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Gimp]     [Yosemite News]

  Powered by Linux