Re: Feedback on default partitioning and encryption

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, Apr 28, 2020 at 10:37 AM Simo Sorce <simo@xxxxxxxxxx> wrote:
>
> I have a hard time commenting over the next 2 becuse it seem like the
> probelm is not just technical, but there is no clear vision of whether
> there is one and only one solution or if multiple solutions need to be
> considered.

The short term is necessarily limited to the existing functionality of
the installer. Shall "encrypt my data" be enabled by default or not?
Seems like a good idea, but there are  knock on effects that have
various deleterious effects. Is it worth enabling only in the short
term? Or should it be left as is, and focus on the long term design
and planning?

There are few examples of encryption enabled by default in the desktop
world. Presently, that seems to be only Pop!_OS.

On mobile devices this is more common. But even more common than
encryption is trustworthiness (integrity and authenticity of the
image; and statelessness, with the option to do a reset).

Long term, many solutions need to be considered. And not only
technical, but their impact on release engineering.



> I personally prefer to encrypt the whole disk, because the machine I
> care for encrypting is a laptop that can potentially be
> stolen/displaced easily. However I do not care at all that there are
> two different step (encryption password and separate account password),
> and in fact I prefer to keep them separate because I join the laptop to
> a separate IDM system so the account password is not managed by the
> laptop.

Custom ways of account management aren't going away. The scope of this
topic is: Fedora Workstation defaults.

Today's full disk encryption (except /boot) paradigm is long term
untenable. The negatives are the sole reason why they're not used by
default, even in a short term context.

The working group's evaluation so far, shows that alternatives are
only available in the long term. Hence the (re) evaluation of whether
encryption by default is such a good thing, that it should be enabled
by default for Fedora 33, despite the limitations of the current
design.



> I would love to have TPM integration, but just using TPM is useless for
> my use case, because if they steal my laptop they also get my TPM
> chip. TPM is cool only as an additional component but alone it is
> somewhat useless. If clevis is used then you can compose the TPM *and*
> a passphrase (or other item like a tang server or a phone/bluetooth
> beacon).

TPM is in the long term category. Support for it in dmcrypt/cryptsetup
doesn't have an ETA. There's other integration work needed too. And I
don't think it's seriously considered for protecting user data, for
the reason you mention. Rather, it's considered for encrypting system
data.

It's not decided whether system data should be encrypted by default,
or made only opt in, and if so how to encrypt  them. The working group
is (perhaps painfully) aware that there are many options.

The bootloader, kernel, initramfs, /usr definitely need to be trusted
(implies a need for integrity and authenticity). It's likely that /etc
/var and ~/ need to be trusted. The bootloader, kernel, initramfs, and
/usr definitely do not need to be private, though it doesn't hurt to
do so, there's nothing secret about them. Whereas ~/ definitely needs
an option to be encrypted, possibly by default.

Depending on whether and how /home or each ~/ are encrypted, there are
considerations like user flatpaks and possible duplication and
excessive space consumption. If they are LUKS-on-loop files as
systemd-homed proposes, there are file system resize considerations
when additional users are added, or when users later added actually
have more space requirements. This is substantially more secure than
fscrypt+ext4, but is fscrypt adequate for Workstation users by
default?

The performance impact of LUKS-on-loop files is negligible. I'm not
certain about fscrypt's impact. But these are also further
considerations.

>
> So in the end I do not believe you can come up with a single schema for
> "workstation" unless you narrow down the scope of workstation to a
> smaller set of use cases to the exclusion of the others.

This is the dilemma. It necessarily needs a single schema, there is
only one default. Customizations aren't going away.



-- 
Chris Murphy
_______________________________________________
devel mailing list -- devel@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to devel-leave@xxxxxxxxxxxxxxxxxxxxxxx
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/devel@xxxxxxxxxxxxxxxxxxxxxxx




[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Fedora Announce]     [Fedora Users]     [Fedora Kernel]     [Fedora Testing]     [Fedora Formulas]     [Fedora PHP Devel]     [Kernel Development]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Gimp]     [Yosemite News]

  Powered by Linux