Gentoo Archives: gentoo-hardened

From: Boyd Waters <bwaters+moz@××××.edu>
To: "mike@××××.org" <mike@××××.org>
Cc: gentoo-hardened@g.o
Subject: Re: [gentoo-hardened] Hardened laptops
Date: Mon, 18 Aug 2003 03:55:53
Message-Id: 3F404E60.2040509@nrao.edu
In Reply to: [gentoo-hardened] Hardened laptops by "mike@flyn.org"
1 -----BEGIN PGP SIGNED MESSAGE-----
2 Hash: SHA1
3
4 mike@××××.org wrote:
5 | 1. Encrypted root filesystem. The 2.6 Linux kernel and util-linux 2.12
6 | will provide this using an encrypted loopback interface. A speedier
7 | compromise is to use encrypted home directories only. I maintain a PAM
8 | module, pam_mount, that mounts encrypted home directories
9 transparently. [ If
10 | you don't mind a shameless plug, there is an article about pam_mount
11 in the
12 | August Linux Journal. ]
13 |
14 | 2. Encrypted swap partition (or no swap at all). This is necessary
15 because
16 | otherwise programs could swap secrets to a plaintext disk. The 2.6 Linux
17 | kernel's encrypted loopback interface can do this.
18 |
19 | 3. An inproved authentication system. Encryption algorithms are useless
20 | if a weak key is used. Therefore it may be desireable to authenticate
21 | when booting and mounting an encrypted root filesystem (or mounting an
22 | encrypted home directory) using a physical token or other strong means.
23
24 Mike:
25
26 Thanks for this post... yeah, we've thought about it. A lot :-)
27
28 Until five months ago, I had been running a Gentoo laptop with an
29 encrypted filesystem for about a year.
30
31 I had considered things quite carefully, and decided that the only way
32 to sort-of-trust the computer was to encrypt the whole shebang:
33 encrypted root and encrypted swap. This worked just fine, very stable
34 with a 2.4.19 kernel.
35
36 Then I wanted to move the setup to 2.5/2.6 kernels; the init command for
37 doing so has stumped me. pivot_root simply does not work; there are
38 other ways of doing something with mount -o bind...
39
40 I have been able to set up, at init time, a GPG-based authentication
41 which mounts the GPG keyring from a USB storage device, a memory stick.
42 (You could also use a boot-CD.) The encryption key for the hard disk is
43 actually a random string, which is signed and kept on the external
44 device; you decrypt this key with your GPG password (which might be a
45 "bas password", given user proclivities...). This extra step provides a
46 means for key escrow, or for multiply-signed keys, so that more than one
47 person can decrypt the key (and thus the hard disk data). This is a good
48 thing, I think, if managed carefully; I don't have more than one
49 signature on my keys so far...
50
51 Encrypted swap is very easy, relative to the difficulties I've
52 encountered at init time, trying to bring up an encrypted root disk on 2.6.
53
54 Very much enjoyed the pam_mount article. But I think that for laptops,
55 you need to assume the whole disk will be read by someone, at their
56 leisure, and I really think you need whole-disk encryption to be effective.
57
58 As soon as I get some manner of linux 2.6 with encrypted root, I will
59 have something to write up. There is a bug in -test3 that b0rks
60 encrypted loopback; I expect there will be more distractions before this
61 is done...
62
63 - - boyd
64
65 Boyd Waters
66 watersb on gentoo forums
67 http://www.aoc.nrao.edu/~bwaters
68
69
70 -----BEGIN PGP SIGNATURE-----
71 Version: GnuPG v1.2.2 (GNU/Linux)
72 Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
73
74 iD8DBQE/QE5g0is8k1r0QeURAiIhAJ43h11QfVptn+0PmntyJW+l3BmkkACeORew
75 fFsjLEAA9JYlKfQzKLqDl8M=
76 =YJfU
77 -----END PGP SIGNATURE-----
78
79
80 --
81 gentoo-hardened@g.o mailing list