I started to use encryption on my drives during installation (and also with external drives). As ironic as this sounds: I'm sick of entering my encryption pass-phrase every time I boot my laptop. Even though what I am about to do is *less* secure, I still think it makes my machine pretty damn secure yet.
I am preventing someone from stealing my laptop and pulling the drive to get my data. Yes, the machine boots - which means they either have to brute-force a login at the console, or hack a service once the machine is up. At that point, they almost deserve my "sensitive data"...
Anyhow - if you would like to use encryption on your OS drive, but do not want to enter a passphrase, do the following:
dd if=/dev/urandom of=/root/.keyfile bs=32 count=1
chmod 0600 /root/.keyfile
cryptsetup luksAddKey /dev/sda4 /root/.keyfile
sed -i -e 's/none/\/root\/.keyfile/g' /etc/crypttab
dracut --force --install /root/.keyfile /boot/initramfs-`uname -r`.img
# SPECIAL CASE(S)
If you can't use the "whole device" (i.e. sda4 in this example)
run
[root@neo ~]# lsblk
NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINT
sda 8:0 0 223.6G 0 disk
├─sda1 8:1 0 100M 0 part /boot/efi
├─sda2 8:2 0 128M 0 part
├─sda3 8:3 0 104.2G 0 part /windows/C
├─sda4 8:4 0 256M 0 part /boot
└─sda5 8:5 0 97.2G 0 part
├─fedora-01 253:0 0 93.1G 0 lvm
│ └─luks-9d8c2cdc-aa74-4710-abc8-81f045573401 253:3 0 93.1G 0 crypt /
└─fedora-00 253:1 0 4G 0 lvm
└─luks-5b9faf52-9831-4fe1-803b-750877c743e3 253:2 0 4G 0 crypt [SWAP]
mmcblk0 179:0 0 119.3G 0 disk
└─mmcblk0p1 179:1 0 119.3G 0 part /X1CARBON
cryptsetup luksAddKey /dev/mapper/fedora-00 /root/.keyfile
cryptsetup luksAddKey /dev/mapper/fedora-01 /root/.keyfile
# dracut --force --install /root/.keyfile /boot/initramfs-3.15.8-200.fc20.x86_64.img
I am preventing someone from stealing my laptop and pulling the drive to get my data. Yes, the machine boots - which means they either have to brute-force a login at the console, or hack a service once the machine is up. At that point, they almost deserve my "sensitive data"...
Anyhow - if you would like to use encryption on your OS drive, but do not want to enter a passphrase, do the following:
dd if=/dev/urandom of=/root/.keyfile bs=32 count=1
chmod 0600 /root/.keyfile
cryptsetup luksAddKey /dev/sda4 /root/.keyfile
sed -i -e 's/none/\/root\/.keyfile/g' /etc/crypttab
dracut --force --install /root/.keyfile /boot/initramfs-`uname -r`.img
# SPECIAL CASE(S)
If you can't use the "whole device" (i.e. sda4 in this example)
run
[root@neo ~]# lsblk
NAME MAJ:MIN RM SIZE RO TYPE MOUNTPOINT
sda 8:0 0 223.6G 0 disk
├─sda1 8:1 0 100M 0 part /boot/efi
├─sda2 8:2 0 128M 0 part
├─sda3 8:3 0 104.2G 0 part /windows/C
├─sda4 8:4 0 256M 0 part /boot
└─sda5 8:5 0 97.2G 0 part
├─fedora-01 253:0 0 93.1G 0 lvm
│ └─luks-9d8c2cdc-aa74-4710-abc8-81f045573401 253:3 0 93.1G 0 crypt /
└─fedora-00 253:1 0 4G 0 lvm
└─luks-5b9faf52-9831-4fe1-803b-750877c743e3 253:2 0 4G 0 crypt [SWAP]
mmcblk0 179:0 0 119.3G 0 disk
└─mmcblk0p1 179:1 0 119.3G 0 part /X1CARBON
cryptsetup luksAddKey /dev/mapper/fedora-00 /root/.keyfile
cryptsetup luksAddKey /dev/mapper/fedora-01 /root/.keyfile
# dracut --force --install /root/.keyfile /boot/initramfs-3.15.8-200.fc20.x86_64.img
Comments
Post a Comment