Difference between revisions of "Talk:Dm-crypt/Encrypting an entire system"

From ArchWiki
Jump to navigation Jump to search
m (→‎LVM On LUKS Over Multiple Disks: remove closed discussion)
m (→‎LUKS on Software RAID: remove closed discussion)
Line 28: Line 28:
— [[User:Kynikos|Kynikos]] ([[User talk:Kynikos|talk]]) 14:11, 29 November 2015 (UTC)
— [[User:Kynikos|Kynikos]] ([[User talk:Kynikos|talk]]) 14:11, 29 November 2015 (UTC)
== <s>LUKS on Software RAID</s> ==
In my experience, I set up /etc/crypttab to map the RAID partition: /dev/md0, but after a reboot, the RAID partition changed to /dev/md127; so I had to change /etc/crypttab to contain the UUID of /dev/md127. This was not a system partion; it was just my data mounted at my user's directory in /home. –[[User:Kete|Kete]] ([[User talk:Kete|talk]]) 13:48, 27 March 2016 (UTC)
:That usually happens, when the {{ic|/etc/mdadm.conf}} has an error or is not present. I assume you might have followed something like the short script I posted to your user page for creating the raid. In that I forgot to include the [[RAID#Update configuration file]] steps, sorry! You can repeat the steps later though, the UUID that mdadm generates for /dev/md devices should be the one you (correctly) picked. If they are not, don't reboot/reactivate the raid until you have clarified. If you run them while the /dev/md126.. devices are active, those will be in the config but you can rename them (if wanted) before the reboot. Since we don't have instructions for raid yet in this article, I close this. Reopen if anything is unclear or a missing/wrong mdadm.conf was not the issue, thanks. --[[User:Indigo|Indigo]] ([[User talk:Indigo|talk]]) 18:03, 27 March 2016 (UTC)
::Ok, weird stuff. I didn't leave out the config, but raid has gone back to md0. https://ptpb.pw/nSQi –[[User:Kete|Kete]] ([[User talk:Kete|talk]]) 19:02, 27 March 2016 (UTC)
:::Interesting. Do you have one of the mdadm hooks in your mkinitcpio.conf? --[[User:Indigo|Indigo]] ([[User talk:Indigo|talk]]) 08:44, 28 March 2016 (UTC)
::::Yes – {{ic|1=HOOKS="base udev autodetect modconf block mdadm_udev filesystems keyboard fsck"}}. Maybe this section needs more trials. –[[User:Kete|Kete]] ([[User talk:Kete|talk]]) 11:33, 28 March 2016 (UTC)
:::::Well, there is no section content yet ;), but your input helps. Just a thought for the section: Maybe one way to add instructions for raid is to add a section that handles the stacking of LUKS onto a mdadm raid, in a general way.
:::::Other than that, I think I know what the issue was in your case: You had the mdadm_udev hook in your initramfs, but maybe did not regenerate the initramfs after adding the raid? This might explain why it failed at first after raid creation; another kernel update regenerating the initramfs, which then included the mdadm.conf file. Possible? --[[User:Indigo|Indigo]] ([[User talk:Indigo|talk]]) 12:03, 28 March 2016 (UTC)
:::::I've made a few tries and believe the mdadm_udev hook can only be the reason for your experience. It boots fine here whether mdadm.conf is present or not. I've added a tip for it with [https://wiki.archlinux.org/index.php?title=Dm-crypt%2FSystem_configuration&type=revision&diff=431941&oldid=431940] and close this. Re-open if my assumption was wrong. --[[User:Indigo|Indigo]] ([[User talk:Indigo|talk]]) 10:19, 20 April 2016 (UTC)
I expanded this section based on a setup I just completed on a new laptop, but did not yet remove the "Needs Expansion" note. The process has been tested, and I hope I formatted it nicely enough to be useable. If anyone wishes to make changes, please feel free to edit or leave a comment here if you see anything that needs to be fixed! --[[User:Sparky|Sparky]] ([[User talk:Sparky|talk]]) 14:25, 3 January 2017 (UTC)
:Hi, great you added that! I've removed the expansion template now, apart from being dated the references in it lead off-track now that we have a full example.[https://wiki.archlinux.org/index.php?title=Dm-crypt%2FEncrypting_an_entire_system&type=revision&diff=467081&oldid=466969] I close this item. If someone else sees points to be fixed, please apply to content or, if unsure, add a new item. --[[User:Indigo|Indigo]] ([[User talk:Indigo|talk]]) 18:45, 29 January 2017 (UTC)
== Full disk encryption with LUKS (encrypted LVM with swap and root) ==
== Full disk encryption with LUKS (encrypted LVM with swap and root) ==

Revision as of 15:08, 11 April 2017

LUKS on LVM /tmp example

I don't think the example config for /tmp is correct. It uses tmpfs, which completely bypasses the physical disks (other than swap), making the whole endeavor pointless. The proper solution seems to be to use the 'tmp' option in /etc/crypttab--I just set this up, and it seems to be working. It automatically creates a new ext2 filesystem with a random key on each boot. I'd update the article, but the crypttab syntax it uses doesn't even match mine, and I don't know how to translate to the new syntax. TravisE (talk) 10:27, 11 March 2014 (UTC)

You probably use in crypttab "tmp=ext2" as option? I'd say you are right anyway (and the example still works but wastes the reserved lv diskspace). Feel free to edit right away if you clarified or post the settings you use here and we adapt them. --Indigo (talk) 20:06, 11 March 2014 (UTC)
I updated syntax: [1]
I still left the lv for it. Question to answer before removing it would be where /tmp swaps to, if required. Do you know that?
--Indigo (talk) 22:45, 25 March 2014 (UTC)

Encrypted boot (GRUB): no need for separate partition?

Exploiting GRUB#LVM, I've just tried the following scenario on VirtualBox, modified from Encrypted boot partition (GRUB):

|ESP partition: |Volume 1:       |Volume 2:       |Volume 3:       |Volume 4:       |
|               |                |                |                |                |
|/boot/efi      |boot            |root            |swap            |home            |
|               |                |                |                |                |
|               |/dev/store/boot |/dev/store/root |/dev/store/swap |/dev/store/home |
|/dev/sdaX      |----------------+----------------+----------------+----------------+
|unencrypted    |/dev/sdaY encrypted using LVM on LUKS                              |

It works perfectly fine, including the Dm-crypt/Device_encryption#With_a_keyfile_embedded_in_the_initramfs trick. The result is clearly a lot simpler and neater, and allows avoiding Dm-crypt/Encrypting_an_entire_system#Configuring_fstab_and_crypttab_2 altogether, again being able to unlock everything by entering the password only once.

Can anybody think of any disadvantages, or worse, security holes? Otherwise I'd like to update the current scenario with this method.

The only problem I can think of is that Dm-crypt/Specialties#mkinitcpio-chkcryptoboot needs the partition to be separate, but we can merge Dm-crypt/Encrypting_an_entire_system#Configuring_fstab_and_crypttab_2 there and leave a link from Dm-crypt/Encrypting an entire system#Encrypted boot partition (GRUB) as a Tip.

Kynikos (talk) 14:11, 29 November 2015 (UTC)

Full disk encryption with LUKS (encrypted LVM with swap and root)

I wasnt able to find what I need on the wiki, but this guide got me there. I hope the arch wiki could summarize step by step as this guide does. https://www.loganmarchione.com/2014/11/arch-linux-encrypted-lvm-hardware-2/

Voukait (talk) 04:13, 6 May 2016 (UTC)

Wow, that's a thorough guide indeed. Nice to see someone reused the ASCII partition layout diagram (I think Kynikos sketched this LVM one:). It also links to our instructions in a number of places, which makes me wonder if the author keeps it updated in case links change. Anyhow, very thorough, yes. --Indigo (talk) 09:59, 6 May 2016 (UTC)
I don't remember who originally sketched that particular diagram, but everything's published under GFDL :)
To give an answer to Voukait, we don't keep step-by-step guides like that in this wiki, as they are too difficult to maintain because too many pages would duplicate content and should be continuously kept in sync.
I think a good way of getting a first grasp on some topic is indeed to go and read "aggregated" information for a specific use case on some external sites/blogs, and then come to the ArchWiki to read more up-to-date information that can be more easily adapted to other scenarios.
Anyway we should really find a place in this article where to list external links like that.
— Kynikos (talk) 05:03, 7 May 2016 (UTC)
Yes, why not use a regular Dm-crypt/Encrypting an entire system#See also section and use the description. For example
Other possibilities? --Indigo (talk) 09:50, 7 May 2016 (UTC)
Actually another possibility would be to simply use dm-crypt#See also. For example
If it gets many links, they could be grouped. --Indigo (talk) 13:16, 7 May 2016 (UTC)
I agree we can use dm-crypt#See also for the moment, I'll let you implement your idea, or Voukait who pointed out the link :) — Kynikos (talk) 04:06, 8 May 2016 (UTC)