Re: Whole Disk Encryption + SSD

2021-07-02 Thread David Christensen
On 7/2/21 8:02 AM, David Wright wrote: On Thu 01 Jul 2021 at 20:43:09 (-0700), David Christensen wrote: On 7/1/21 7:55 PM, David Wright wrote: On Mon 28 Jun 2021 at 13:36:35 (-0700), David Christensen wrote: I do not set the 'discard' (trim) option in fstab(5). If and when I want to erase un

Re: Whole Disk Encryption + SSD

2021-07-02 Thread Michael Stone
On Fri, Jul 02, 2021 at 10:02:18AM -0500, David Wright wrote: But what happens with an SSD? If, after the rm step above, you # fstrim /home the mountpoint, where /etc/fstab has the line /dev/mapper/luks-fedcba98-7654-3210-… LABEL1 ext4 /home then what gets zeroed If everything's appropriately

Re: Whole Disk Encryption + SSD

2021-07-02 Thread David Wright
On Thu 01 Jul 2021 at 20:43:09 (-0700), David Christensen wrote: > On 7/1/21 7:55 PM, David Wright wrote: > > On Mon 28 Jun 2021 at 13:36:35 (-0700), David Christensen wrote: > > > > > I do not set the 'discard' (trim) option in fstab(5). If and when I > > > want to erase unused blocks (such as b

Re: Whole Disk Encryption + SSD

2021-07-01 Thread David Christensen
On 7/1/21 7:55 PM, David Wright wrote: On Mon 28 Jun 2021 at 13:36:35 (-0700), David Christensen wrote: I do not set the 'discard' (trim) option in fstab(5). If and when I want to erase unused blocks (such as before taking an image), I use fstrim(8). Can you elaborate on a couple of things:

Re: Whole Disk Encryption + SSD

2021-07-01 Thread David Wright
On Mon 28 Jun 2021 at 13:36:35 (-0700), David Christensen wrote: > I do not set the 'discard' (trim) option in fstab(5). If and when I > want to erase unused blocks (such as before taking an image), I use > fstrim(8). Can you elaborate on a couple of things: How do you "take an image". Is this

Re: Whole Disk Encryption + SSD

2021-06-29 Thread Stefan Monnier
>> > Along with SED, I suggest that you also implement Secure Boot. >> Can someone give me pointers to actually known attacks (not >> hypothetical ones, which I can invent myself without much difficulty) >> that would have been prevented by Secure Boot? > [2] https://en.wikipedia.org/wiki/Evil_ma

Re: Whole Disk Encryption + SSD

2021-06-29 Thread David Christensen
On 6/29/21 5:02 AM, piorunz wrote: I don't trust SED, after listening to Steve Gibson analysis on state of this feature. Audio podcast: http://media.GRC.com/sn/SN-689.mp3 Transcript: https://www.grc.com/sn/sn-689.pdf His findings were sourced, among other things, on work of security researcher

Re: Whole Disk Encryption + SSD

2021-06-29 Thread David Christensen
On 6/29/21 12:47 AM, to...@tuxteam.de wrote: On Mon, Jun 28, 2021 at 07:56:47PM -0400, Stefan Monnier wrote: Along with SED, I suggest that you also implement Secure Boot. Can someone give me pointers to actually known attacks (not hypothetical ones, which I can invent myself without much diff

Re: Whole Disk Encryption + SSD

2021-06-29 Thread piorunz
Hi David, Thanks for your reply. On 28/06/2021 21:36, David Christensen wrote: Software encryption (dm-crypt, Linux Unified Key System (LUKS), etc.) for a system drive is typically applied to the swap, root, and/or data partitions, but the master boot record (partition table and boot loader),

Re: Whole Disk Encryption + SSD

2021-06-29 Thread Jonathan Dowland
On Mon, Jun 28, 2021 at 01:36:35PM -0700, David Christensen wrote: I do not set the 'discard' (trim) option in fstab(5). If and when I want to erase unused blocks (such as before taking an image), I use fstrim(8). I believe this is installed and enabled by default in Bullseye (at least new in

Re: Whole Disk Encryption + SSD

2021-06-29 Thread tomas
On Mon, Jun 28, 2021 at 07:56:47PM -0400, Stefan Monnier wrote: > > Along with SED, I suggest that you also implement Secure Boot. > > Can someone give me pointers to actually known attacks (not > hypothetical ones, which I can invent myself without much difficulty) > that would have been prevente

Re: Whole Disk Encryption + SSD

2021-06-28 Thread Stefan Monnier
> Along with SED, I suggest that you also implement Secure Boot. Can someone give me pointers to actually known attacks (not hypothetical ones, which I can invent myself without much difficulty) that would have been prevented by Secure Boot? I can see that subverting the early boot might be a goo

Re: Whole Disk Encryption + SSD

2021-06-28 Thread David Christensen
On 6/28/21 1:36 PM, David Christensen wrote: (Dell factory default for drives is 'RAID'; 'ACPI' may be required). Correction: AHCI. David

Re: Whole Disk Encryption + SSD

2021-06-28 Thread David Christensen
On 6/28/21 7:52 AM, piorunz wrote: Hi all, I've got about 5 years old HP laptop with SSD SATA drive 240 GB. Debian Bullseye will be installed on it once it's released, as my secondary computer to use. I have question regarding whole disk encryption. What technology should I use, to have encrypti

Re: Whole Disk Encryption + SSD

2021-06-28 Thread Jochen Spieker
piorunz: > > I have question regarding whole disk encryption. What technology should > I use, to have encryption of everything, or at least /home, but preserve > free blocks and have TRIM? The canonical answer is "LUKS". You can configure it during installation if you want to. I always use LVM as

Whole Disk Encryption + SSD

2021-06-28 Thread piorunz
Hi all, I've got about 5 years old HP laptop with SSD SATA drive 240 GB. Debian Bullseye will be installed on it once it's released, as my secondary computer to use. I have question regarding whole disk encryption. What technology should I use, to have encryption of everything, or at least /home,