/srv/irclogs.ubuntu.com/2016/11/14/#ubuntu-us-pa.txt

teddy-dbearMorning peoples, critters and everything else10:48
ChinnoDogAnyone booting with /boot on an encrypted partition?14:40
iceyahoy14:57
jthanChinnoDog: I do15:25
jthanWait15:25
jthanI have15:25
jthanI don't anymore because it was a pita and not worth it15:25
jthanbecause chances are nothing on /boot is /that/ important anyway15:25
iceyjthan: I think the idea behind encrypting /boot is to protect the OS area, ie: if I get ahold of your computer and you haven't gotten /boot encrypted, I could muck with the environment itself15:28
jthanbut if / is still encrypted15:29
jthanyour data is protected still15:29
iceyuntil I give you a bad kernel?15:29
ChinnoDogThat and it is annoying to randomly run out of space on /boot15:29
jthanWhat's a bad kernel going to do?15:29
ChinnoDogAlso if you use btrfs snapshots and root is a separate partition then reverting to a previous snapshot will not revert your kernel15:29
jthanugh don't use btrfs yet. lol15:29
ChinnoDogIn any case, what do you have to do to get grub to boot from your encrypted partition?15:30
ChinnoDogI think the problem is that it won't load cryptodisk because running "ls" at the grub prompt doesn't show they decrypted block device15:30
jthanChinnoDog:     linux   /vmlinuz-linux root=UUID=f3a0f99b-56ac-495b-98e1-2ec2c160b008 rw cryptdevice=/dev/sda2:cryptroot quiet15:31
jthanhowever it depends which method to encrypt it in the first place you used15:32
ChinnoDogThat is the boot string but it doesn't seem to work when I enable cryptodisk in /etc/defaults/grub15:32
jthanicey: You can give me a bad kernel but my data is still safe and that's more important to me.15:32
iceyjthan: until you boot my malicious thing and get your data that way?15:33
jthanicey: your malicious thing is still going to decrypt my /?15:33
jthanChinnoDog: jonathan@karma:~$ cat /etc/default/grub | grep -i crypt15:33
jthanGRUB_CMDLINE_LINUX="cryptdevice=/dev/sda2:cryptroot"15:33
ChinnoDogDid that15:33
jthanthat's all I've got15:33
ChinnoDoghmm15:33
jthanand it Just Works(TM)15:33
iceyjthan: ideally, you don't know it's malicious and you decrypt it yourself ;-)15:33
jthanicey: Yeah, but if someone had their hands on my laptop the last thing I'm going to do is log in. However, I'm curious if you're referring to a specific exploit or have done this15:34
ChinnoDogI tried to do it with Ubuntu 16.04 at install. Chrooted to disk after installation and made those modifications but it doesn't work. I guess I will have to debug it further.15:34
jthanI always setup my partitioning and encrypted volumes and then install15:35
jthanidk how flexible the Ubuntu installer is15:35
iceyjthan: haven't, just considering the theoretical reason for encrypted /boot; do you mean that you would reformat the device if somebody else had unrestricted access to your machine for ...say 10 minutes?15:35
ChinnoDogjthan: What if a boot sector virus patches your /boot before grub loads?15:35
jthanicey: nobody would, first of all. But second of all, what's low level enough that you're going to be able to use entirely system calls that will send you my password15:35
jthanWhich, btw, is a one-use password15:35
jthanI just think you're proposing something that isn't actually plausible.15:35
iceyjthan: how do you encrypt the device with an OTP?15:36
jthanNot "one time"15:36
jthanI said one use15:36
jthanit's the only place that password is used.15:36
iceyah, cool15:36
jthanSo you could get it, but unless you're on my laptop again it's a no go15:36
jthanbut I also VERY highly doubt anyone would be on my laptop without me sitting there15:36
jthanand if they were, I'm dead and no longer care, but still encourage anyone to try.15:37
jthanThere are a lot of measures in place on $worklaptop to protect me and my data15:37
r00t^2icey: there are boot-time verifiers that attempt to mitigate evil maid attacks as well, i.e. https://github.com/grazzolini/mkinitcpio-chkcryptoboot17:03
=== r00t^2_ is now known as r00t^2

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!