/srv/irclogs.ubuntu.com/2017/08/20/#ubuntu-kernel.txt

=== JanC is now known as Guest58168
=== JanC_ is now known as JanC
_Xenial_Xerus_Is there any way to get  them to modify the kernel code for LUKS.21:28
_Xenial_Xerus_I can make some sort of lustration about why the keys need to be on a seperate partition.21:28
_Xenial_Xerus_Picture of a man pulling out the SDCARD.21:28
_Xenial_Xerus_Walking past police beating checkpoints.21:29
_Xenial_Xerus_Reaching the F.D.L. (food distribution location) and then returning to the computer without 8 necrosan neighbors data dumping the entire system during a home invasion.21:29
=== JanC_ is now known as JanC
_Xenial_Xerus_JanC call up infinity21:37
JanC?21:44
JanCI think you need to read documentation21:45
_Xenial_Xerus_Oh, you make a funny?21:46
JanChow to do what you ask for is explained in the cryptsetup manual (see e.g. the --header option)21:52
_Xenial_Xerus_JanC manually from a running kernel?21:53
_Xenial_Xerus_backup and restore header21:53
_Xenial_Xerus_This requires a second system.21:53
_Xenial_Xerus_Too much.21:53
JanCLUKS can have the key(s) on a separate device; you can suspend/resume a LUKS-encrypted device (suspend here means that the kernel erases the encryption key from memory); if you want you can automate the suspend/resume with udev or the like22:03
_Xenial_Xerus_JanC LUKS now allows for the header to be stored on /boot?22:42
_Xenial_Xerus_Can this be done from the ubuntu installer?22:42
_Xenial_Xerus_Last I looked into it the only way to remove the keys is to do a backup/restore manually from command line.22:42
JanCI think it always did, but maybe not from the installer22:42
_Xenial_Xerus_The LUKS code stores the keys in the header and the header at the start of the encrypted part.22:43
JanCAFAIK the kernel doesn't really care where the header/keys are; storing it there is just the default/usual way to do it with cryptsetup & most linux installers22:45
JanC(and you can always use bare dm-crypt also)22:46
_Xenial_Xerus_LUKS is designed so.22:58
_Xenial_Xerus_The keys are stored in the header, the header the beginning of the crypt part.22:59
_Xenial_Xerus_What do you mean bare dm-crypt, no LVM?23:01
_Xenial_Xerus_JanC?23:02
JanCmeaning dm-crypt without LUKS23:02
_Xenial_Xerus_LUKS uses dm-crypt doesn't it?23:03
_Xenial_Xerus_It wraps the partition in an encrypted LVM.23:03
_Xenial_Xerus_Here we go turning support into an argument.23:04
_Xenial_Xerus_What is the command for pulling the current source?23:05
_Xenial_Xerus_sudo apt-get source linux?23:05
_Xenial_Xerus_or is it, sudo apt-get --download-source linux?23:05
_Xenial_Xerus_Or is it trapped with dependency injections?23:07
_Xenial_Xerus_JanC leaving the kernal as it is for now then, do you want to work on moving the /boot to an ISO with isolinux23:16
JanCsee: https://skrilnetz.net/bullet-proof-data-encryption-with-luks-and-a-detached-header/23:22
_Xenial_Xerus_Did you writup my specs and predate it?23:40
xnox_Xenial_Xerus_, please use some other irc nickname, this one is tasteless23:41
_Xenial_Xerus_xnox: what is tasteful?23:42
_Xenial_Xerus_better?23:45
=== _Xenial_Xerus_ is now known as ubuntu
ubuntubetter?23:45
=== ubuntu is now known as Guest17872
xnoxnow, yes =)23:46
=== Guest17872 is now known as Xenial
=== Xenial is now known as Guest89430
=== Guest89430 is now known as _Xenial

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!