Richard Freeman wrote:
> On 5/16/2025 12:59 PM, whiteman808 wrote:
>> Hello,
>>
>> Are there any advantages from putting Linux on encrypted root at bare
>> metal server if I often access remotely server from ssh, and
>> sometimes need to reboot it? What about key supplied during unlocking
>> server after reboot or manually power on? Giving remotely password
>> doesn't seems safe to me.
>>
>> I want to protect against burglary and I'm not sure whether doing
>> full disk encryption is a right way to go. Maybe should I just
>> instead of trying to focus on the software side try to take more care
>> of physical security?
>>
> Burglary is a difficult use case to protect against, because as you
> point out you need to provide the key somehow at boot.  There are
> TPM-based approaches that are not well-supported on Linux distros
> which try to ensure that the key is only readable if the disk is
> booted normally, but you're still vulnerable to any physical access OS
> vulnerability.
>
> I run servers with full disk encryption on SOME of my storage, but not
> the OS drives. I store the key in a file on the OS drive. This
> obviously provides no security against burglary, but the benefit is
> that when a disk with sensitive data fails it is encrypted with a
> strong key (no memorable passphrase). You need both the OS disk and
> the encrypted disk to read anything sensitive, so I can just toss the
> failed disk in the trash. This also allows unattended boot.
>
> Another approach you could consider is putting the key on another host
> available over the network. Your initramfs/etc could use a credential
> stored on it to access the remote host and retrieve the disk key. The
> remote host could be a Pi hidden someplace non-obvious. Then if the
> host is stolen and not kept powered on continuously (ie not a
> sophisticated attacker) the disk won't be readable, but it would boot
> just fine as long as it is attached to your LAN.
>
> There might be some other variations on a theme like that using some
> sort of credential vault software. Approaches like that could also be
> used to remotely disable the device if you can't access it - the
> credential vault could be told to not provide the key any longer.
>
> In any case there are definitely use-cases for full disk encryption
> that still add value even if it isn't as secure as having to remember
> a LUKS key on boot.
>


That is what I do.  My OS is on plain file systems and can boot without
me doing anything.  Won't help if someone breaks into my house and
steals the puter tho.  My data is encrypted until I type in the
password.  I even have /home on a plain file system, so I can login to
the GUI. 

OP:  I've read, never did this tho, that some laptops require a password
to even start booting.  Some Linux users even have other things, like a
init thingy, that requires a password to boot, likely to access root
file system.  Basically, everything is password protected.  If someone
steals the laptop, well, unless they can reset everything and reinstall
a new OS, it's pretty worthless.  The data is secure tho.  You may want
to look at how people set up their laptops to prevent theft and see if
that would work in your case.  Really, that's kinda what you want to
accomplish even tho it is a desktop and not so easy to carry off. 

I've also read that some super secret gov't laptops have a lot of
security built in.  That may be something else you can look into if you
really want to lock down a puter and your BIOS supports that sort of
security level. 

Just a couple thoughts that may help. 

Dale

:-)  :-) 

Reply via email to