-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256


On 21/11/2015 1:59 PM, David Christensen wrote:
> On 11/20/2015 01:04 AM, Pascal Hambourg wrote:
>> Anyone with physical access can do whatever they want. You can
>> set up restrictions in the BIOS or set restrictions in the boot
>> loader, but they still can take the disk out and read or modify
>> it with another machine.
>> 
>> To protect against this you can use encryption or set up a
>> password on the disk (ATA security functions). Note that
>> encryption alone does not protect against tampering, as the boot
>> part cannot be encrypted.
> 
> As I understand it, self-encrypting drives (SED) encrypt
> everything (including the boot partition).

You can do full disk enccryption, but you are right that you need
something to "boot" ... my solution is to use dropbear which offers an
ssh login via an authorized key; once I'm logged in to that
mini-environment, I then unlock LUKS volumes and go forward from
there.  Dropbear saves me from needing physical access to a keyboard
on the server and negates the need for BIOS involvement.

Kind Regards
AndrewM
-----BEGIN PGP SIGNATURE-----

iF4EAREIAAYFAlZQdEoACgkQqBZry7fv4vtqfQD+NP8ZZScwUJtqJqaldyFZ29Mb
2vnetS1Tc/6OXZeDxpgA/iO8/TnHWtpOguY2mI5uaHB1IoANC9Gup4LKHBmCxk8y
=VduW
-----END PGP SIGNATURE-----

Reply via email to