Page 1 of 2 12 LastLast
Results 1 to 10 of 15

Thread: i want to boot an encrypted kernel

  1. #1
    Join Date
    Jan 2010
    Location
    Wheeling WV USA
    Beans
    2,023
    Distro
    Xubuntu 20.04 Focal Fossa

    i want to boot an encrypted kernel

    i want to boot a kernel that is stored on disk encrypted. such a process would need to get a key or pass-phrase to decrypt that kernel. can GRUB2 do this for me?
    Mask wearer, Social distancer, System Administrator, Programmer, Linux advocate, Command Line user, Ham radio operator (KA9WGN/8, tech), Photographer (hobby), occasional tweetXer

  2. #2
    Join Date
    Oct 2009
    Beans
    Hidden!
    Distro
    Ubuntu 22.04 Jammy Jellyfish

    Re: i want to boot an encrypted kernel

    Do you mean that you want to be prompted for your passphrase before the system completes booting?

    You are able to run full-disk encryption via LUKS on Ubuntu, but as far as I am aware, you still need to have /boot on an unencrypted disk (I use a thumb drive).

    See here:
    https://help.ubuntu.com/community/Fu...ion_Howto_2019
    Come to #ubuntuforums! We have cookies! | Basic Ubuntu Security Guide

    Tomorrow's an illusion and yesterday's a dream, today is a solution...

  3. #3
    Join Date
    Jan 2010
    Location
    Wheeling WV USA
    Beans
    2,023
    Distro
    Xubuntu 20.04 Focal Fossa

    Re: i want to boot an encrypted kernel

    yes. by whatever mechanism. i'm exploring kexec as a possibility.
    Mask wearer, Social distancer, System Administrator, Programmer, Linux advocate, Command Line user, Ham radio operator (KA9WGN/8, tech), Photographer (hobby), occasional tweetXer

  4. #4
    Join Date
    Apr 2017
    Beans
    54

    Re: i want to boot an encrypted kernel

    Quote Originally Posted by CharlesA View Post
    I did this, by following these instructions, which are the best I have ever seen for an Ubuntu tutorial. The question I have now, is why is this not in the default install, that is, Why is /boot , the kernel, and initram fs not encrypted in the default encryption option during install?

  5. #5
    Join Date
    Mar 2010
    Location
    Squidbilly-Land
    Beans
    Hidden!
    Distro
    Ubuntu

    Re: i want to boot an encrypted kernel

    Quote Originally Posted by lordgallen View Post
    I did this, by following these instructions, which are the best I have ever seen for an Ubuntu tutorial. The question I have now, is why is this not in the default install, that is, Why is /boot , the kernel, and initram fs not encrypted in the default encryption option during install?
    I'd bet it isn't the default due to future upgrade issues and the use isn't enough that Canonical thinks putting a paid developer on to solve those upgrade issues for every flavor and release and for dual boot would make financial sense. But I really don't know. Those are just guesses.

  6. #6
    Join Date
    Apr 2011
    Location
    Mystletainn Kick!
    Beans
    13,616
    Distro
    Ubuntu

    Re: i want to boot an encrypted kernel

    Quote Originally Posted by lordgallen View Post
    I did this, by following these instructions, which are the best I have ever seen for an Ubuntu tutorial. The question I have now, is why is this not in the default install, that is, Why is /boot , the kernel, and initram fs not encrypted in the default encryption option during install?
    Some discussion on it in this bug report.
    https://bugs.launchpad.net/ubuntu/+s...y/+bug/1773457
    Splat Double Splat Triple Splat
    Earn Your Keep
    Don't mind me, I'm only passing through.
    Once in a blue moon, I'm actually helpful
    .

  7. #7
    Join Date
    Apr 2017
    Beans
    54

    Re: i want to boot an encrypted kernel

    With the above instructions, does grub end up encrypted?
    Last edited by lordgallen; April 27th, 2021 at 03:50 PM.

  8. #8
    Join Date
    Jan 2010
    Location
    Wheeling WV USA
    Beans
    2,023
    Distro
    Xubuntu 20.04 Focal Fossa

    Re: i want to boot an encrypted kernel

    Quote Originally Posted by lordgallen View Post
    With the above instructions, does grub end up encrypted?
    No, as far as i can tell. so that means there are some sectors on disk that are not encrypted. so it would not be a full-disk encryption but, instead, would be a logical volume encryption (not sure how this could be expanded very easily while it is in an encrypted state). in my case, it is the 2nd and/or 3rd disk i want to encrypt. i prefer not to have LVM. i just want to allocate all the space and be done with it. unless LUKS depends on LVM, i see no reason to use LVM. so true full-disk encryption seems right for me. that would mean the partition table and/or LVM data would be encrypted.

    i'm thinking that the best encryption needs to be in hardware or immutable BIOS. that could get around a lot of software issues like the evil maid substituting an evil bootloader. OTOH, substituted hardware is the next issue. how far do we need to go? do we need to protect against the evil workers of an evil government's evil agency and their clever children?

    my latest thought is to hide the encryption and have it behave as a normal laptop ... at least one with Ubuntu on it. no pass phrase prompt.
    Mask wearer, Social distancer, System Administrator, Programmer, Linux advocate, Command Line user, Ham radio operator (KA9WGN/8, tech), Photographer (hobby), occasional tweetXer

  9. #9
    Join Date
    Mar 2010
    Location
    Squidbilly-Land
    Beans
    Hidden!
    Distro
    Ubuntu

    Re: i want to boot an encrypted kernel

    LVM isn't required for LUKS, but it is so much more convenient if any changes are needed .... plus snapshots are great for getting clean backups.

    If you want a tiny install of some Linux on the side of your encrypted Ubuntu ... check out the ChromiumOS versions. They are like chromebooks, have a guest account, so you can show border agents a working system and fit into 16G of storage last time I checked. Like ChromeOS, ChromiumOS is mounted read-only when in use. Updates go to ROOT-B or ROOT-A partitions, depending on which is not currently in use. At least that's how I think it works. Plus it is very fast for a quick web browser need.

    The solution to the evil maid attack will always be to boot from USB storage that never leaves your person when traveling.

    I believe there are hardware encrypted HDDs that are tied to the TPM or TPM2 chip inside your computer. This assumes anyone who cares about this level of security would go to the effort to ensure their hardware has a TPM2 chip. I found a number of blog articles with details, but not any known-reputable site (to me) with a how-to.

  10. #10
    Join Date
    Apr 2017
    Beans
    54

    Re: i want to boot an encrypted kernel

    Quote Originally Posted by Skaperen View Post
    No, as far as i can tell. so that means there are some sectors on disk that are not encrypted. so it would not be a full-disk encryption but, instead, would be a logical volume encryption (not sure how this could be expanded very easily while it is in an encrypted state). in my case, it is the 2nd and/or 3rd disk i want to encrypt. i prefer not to have LVM. i just want to allocate all the space and be done with it. unless LUKS depends on LVM, i see no reason to use LVM. so true full-disk encryption seems right for me. that would mean the partition table and/or LVM data would be encrypted.

    i'm thinking that the best encryption needs to be in hardware or immutable BIOS. that could get around a lot of software issues like the evil maid substituting an evil bootloader. OTOH, substituted hardware is the next issue. how far do we need to go? do we need to protect against the evil workers of an evil government's evil agency and their clever children?

    my latest thought is to hide the encryption and have it behave as a normal laptop ... at least one with Ubuntu on it. no pass phrase prompt.
    This encryption scheme is much better than the default provided by Ubuntu. I try to maintain physical security of my devices. It's the only way to assure an evil made attack does not occur.

Page 1 of 2 12 LastLast

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •