/srv/irclogs.ubuntu.com/2018/12/24/#ubuntu-server.txt

tomreynthe "green bar" requires EV (class 2), which LE doesn't provide00:49
tomreynalso, chrome plans to remove all indications of "secure" anyways, since their take is that (properly done) HTTPS must be the default, anything else is insecure.00:50
tomreynand in te past mozilla has usually followed up on their lead with some delay. often IE, too, but that's no longer relevant since they'll use chromium anyways.00:51
tomreynhttps://blog.chromium.org/2018/05/evolving-chromes-security-indicators.html00:51
tomreynCheckmate, mybalzitch: ^01:07
bindiis it possible to create encrypted raid1 for system disk with the installer?10:21
tomreynbindi: yes, but you need to use the alternative server installer or mini.iso.11:26
bindiyeah i got that far11:27
bindinow i'm not sure how I should continue, testing out in a VM atm11:27
tomreynbindi: dpends a bit on whether you're UEFI or BIOS booting. also the order of crypt layer and raid (and maybe lvm) is something to consider11:28
bindibios11:28
bindiwell my test failed :P11:28
tomreynin the end it all boils down to how many crypto containers you want to end up with (and how many passwords / keys you'll want to have to provide)11:29
bindihttps://i.imgur.com/GNOZ0pK.png11:29
tomreynfor a desktop like computer you probably want just one, maximum 2 crypto containers.11:29
bindiideally 1 key for all of it11:29
tomreynthen you want raid, then crypto on top, then lvm on top.11:29
tomreynyou may want to have another, smaller raid, just for boot11:30
bindix_x11:31
tomreynhow large are you storages?11:31
bindi2x 120GB11:31
tomreynon the final system, too?11:31
bindihmm? 2x 20GB i'm testing with in the VM, the final system has two 120GB SSDs I want the system to be installed on11:31
tomreyni assume lack of separate /boot is what caused your failure here, but i can only guess since i dont know how you partitioned11:32
bindiyeah probably11:32
tomreynin case you have more than just those two disks on this computer (i.e. separate storages for data), now is the time to think about whether you want 1 crypto container for everything, or one for the Os, and maybe another later for data (or unencrypted there)11:34
bindiI have 8x 2TB but I'm gonna use zfs for those11:34
bindiand I don't feel like zfs on root :P11:34
tomreynokay, then its just the OS now.11:34
tomreyntake a screen shot of how you partitioned on the next go.11:35
bindiyou want me to try and fail again? :D11:35
TJ-bindi: you've got access to the shell haven't you?11:36
bindisure11:36
tomreynin the end it's my more and more my impression that you are actually faster if you boot from a live system, do the parititoning with gparted, create and mount all block storage layers (raid and crypto and lvm), then debootstrap, chroot into it, install the kernel.11:37
TJ-bindi: so you can fix-up manually. What layout are you using?11:37
bindii don't understand the question, i don't know how I should mix lvm+mdadm+whatever to make this work :P11:38
bindipreviously I just used the guided FDE with LVM, but now I'd raid1 as well so it can survive a disk failure11:39
TJ-Why not use LVM's own RAID support rather than adding it on top of MD RAID?11:41
bindiI read that that's just mdadm in disguise, but sure11:41
bindianything that works and anything that *I* can get to work :D11:41
bindiif you could point me to a guide or perhaps do some handholding and guide me through this :P11:42
TJ-You want LUKS to protect the OS root file-system?11:43
bindiyes11:43
TJ-Do you also want LUKS to protect GRUB's /boot/ file-system (prevents someone tampering with the kernel and initrd.img)11:43
bindinah11:43
TJ-So that leave it vulnerable to a man-in-the-middle attack, you realise?11:44
bindiif its not too complex, could use it11:44
bindii'm just mostly interested protecting my data against physical attacks11:44
TJ-right, but if you're needing encryption you need to be clear about the attack scenarios you're protecting against. If someone could get physical access to the system, even when powered off, without /boot/ being encrypted they could trivially install a MITM that could log the LUKS passphrase/key-file11:47
bindisure, encrypted /boot/ it is then, if it doesn't get too complex (in terms of stability and surviving updates :D)11:48
TJ-There's a single setting added to /etc/default/grub "GRUB_ENABLE_CRYPTODISK=y"11:49
TJ-Because of your mirrors I'm trying to figure out the simplest way to arrange things. Are you going to have some LVs/file-systems that won't be encrypted?11:50
bindino, full disk encryption11:50
TJ-e.g. I have an LV for SourceCode (F/OSS projects I clone/pull in) so I don't bother encrypting that11:50
TJ-bindi: considering easiest first, it'd be LVM first, encryption second so there is only one set of logical volumes to unlock. If it were encryption first, you'd need to arrange for each disk to be unlocked before gaining access to the LVM11:53
TJ-bindi: but that exposes the LVM metadata so is not strictly FDE11:53
TJ-bindi: but if you're only after protecting data (in LVs) then it doesn't sound like you need FDE in its fullest sense11:54
TJ-I'd describe it as needing F.BD.E (Full Block-Device Encryption)11:54
bindihow does the metadata look like?11:55
bindii probably don't care if anyone sees that :P11:55
TJ-it's the stuff needed by GRUB/OS to discover the LVM PVs VGs and LVs11:56
bindiwell as long as it doesnt expose directory structures, i guess its ok11:57
bindiother than maybe /home and / and so on11:57
bindiif you're not 100% sure about how to do this I have a VM I can test everything in before11:58
TJ-so, thinking about OS only (not data)  you could do minimal partitioning ( 3 partitions = BIOS Boot, /boot/ file-system, and LVM PV)11:58
TJ-bindi: I've been doing this stuff for 10 years :) It's just a case of thinking of the simplest way to do it including the RAID-111:59
bindibtw I don't even necessarily need LVM. I just want raid-1 and FDE :p I never used the features that LVM gives you12:00
bindiif it makes things simpler :D12:00
bindinot 100% sure if its possible without LVM12:00
TJ-I've got a diagram for an arragement like this I wrote 10 years ago, for RAID-5, but it's on a domain I no longer operate; Trying to see if I can jury-rig it so you can see it12:01
TJ-Too much trouble to get that accessible.12:18
bindi:p12:18
TJ-There are pros and cons to using mdadm or pure LVM for the mirror facility. In terms of ease of management if something goes wrong I /think/ mdadm is probably the way to go12:20
bindiso what's next12:34
TJ-I think what you need is something like disks > GPT > partitions (3 of:  1=BIOS Boot, 2=/boot/ for GRUB, 3=LVM) > 3 x RAID-1 (md0=sda1+sdb1, md1=sda2+sdb2, md2=sda3+sdb3), then LUKS encrypt: md1=LUKS_BOOT, md2=LUKS_LVM, then create the LVM with 'pvcreate /dev/mapper/LUKS_LVM' and 'vgcreate VG_OS /dev/mapper/LUKS_LVM' then e.g. 'lvcreate -L 12G -n rootfs VG_OS'12:53
bindiGPT? isn't that related to EFI12:56
TJ-once those are configured and ready the installer partitioner can be used to select the /dev/mapper/LUKS_BOOT for /boot/ FS and /dev/mapper/VG_OS-rootfs for /  and at the boot-loader stage dpkg configure step should pop up a dialog asking which devices to install GRUB to, and you choose the two native disk partitions (/dev/sda1, /dev/sdb1)12:56
TJ-GPT makes sense since for your larger disks you'll likely need it anyhow12:56
TJ-so may as well use it across all disks12:56
bindi120GB? :P12:56
TJ-So?12:56
TJ-I thought you had a bunch of other disks?12:57
bindithey're handled by ZFS12:57
TJ-OK, well still, no reason not to use GPT12:58
bindibut can my BIOS system use that to boot?12:59
TJ-I've not met any that don't in the last decade but you can obviously easily test that with a quick GPT partitioning and grub-install to a USB storage device, for example - doesn't need any OS, just prove BIOS loads GRUB13:00
TJ-benefit of GPT is the secondary back-up table, and you can also create a hybrid MBR if necessary13:01
bindiok well I don't know how to translate everything you said into actual commands :P13:02
TJ-I have to go out now, if you're still wondering when I get back I can drop a script into a pastebin to help13:05
bindiok then13:24
bindiTJ-: got my VM to install without errors15:23
TJ-bindi: oh, great, you don't need me then :)15:25
bindiim not just sure if i did it "right". one thing that caused confusion was that "bios boot" partition, as it seems to be a GPT only thing15:25
bindimy VM was Gen1 (BIOS) so there's no such option15:26
bindiI checked an Gen2 VMs have that15:26
bindibut I won't see that in the ubuntu installer then anyway on my bios pc15:26
bindihttps://imgur.com/a/7c8DmuC15:26
TJ-Yes, it is where GRUB writes its core image, instead of in the possibly-spare sectors before partition #1 for msdos/MBR partitioning15:26
bindinot sure how I should have named the LV and VG :D15:27
bindii'm gonna see if this survives a disk failure15:27
TJ-bindi: any way you prefer :)15:27
bindihm15:28
TJ-bindi: I use LVM extensively so typically I have at least 2 VGs, VG_OS and VG_DATA. VG_OS will have LVs for rootfs, /var/ and /usr/local/, VG_DATA will have an LV for /home/ + several others (I have a generalised mount-point at /home/all/ for things like SourceCode, Projects, Hacking all in their own LVs and with their own /home/all/XXXX mountppoint15:29
bindilooks like it doesnt survive a reboot15:29
bindierr15:29
bindidisk failure15:29
bindihttps://i.imgur.com/AewxMlE.png15:29
bindiso my process was flawed :p15:29
TJ-you many not have configured mdadm for boot-degraded, assuming you've got LVM inside MD RAID15:30
bindicheck my first imgur link album, 2nd picture 'lsblk'15:31
bindiwell I reattached the disk but its not happy15:32
bindi:-D15:32
bindinot sure what went wrong15:34
bindiyeah i think my process is wrong, i dunno how but just removing the disk = no go15:50
bindii added boot_degraded=true if it even is supported anymore15:53
bindiin /etc/initramfs-tools/conf.d/mdadm15:53
bindihttps://ubuntuforums.org/showthread.php?t=240161515:53
TJ-Thinking hard about that, I seem to recall it was supposedly made the default, although reading /usr/share/initramfs-tools/scripts/local-block/mdadm the initial assemble command there uses --no-degraded15:55
bindii just tried to remove --no-degraded from there and update-initramfs, no go16:03
bindisigh :P16:03
bindiguess i'm not gonna use raid1 then16:03
TJ-bindi: I have servers with mdadm RAID-1 by default and they boot degraded fine, so it's not a general problem.16:22
bindiits the encrypted part16:23
TJ-Yes, LUKS encrypted16:24
bindiwell if you can tell me how to get this working it would be neat16:25
bindiif not, im gonna start configuring the server with single disk install16:25
TJ-bindi: well, I have a script that is building a test/demo but just started getting cryptic I/O errors for a non-existent device :s19:28
=== phunyguy is now known as phunysanta

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!