
My server is partially encrypted. The regular root is unencrypted so it can boot unattended. Nothing useful runs there, other stuff runs in containers which use encrypted lv's for storage.eccerr0r wrote: What do people do for servers in this case, assuming the main reason for encryption is for ensuring used drives do not contain recoverable data? Or do they just bite the bullet and password or keep a USB key with the encryption key on it (and eat the USB key if it fails... which isn't too bad as a 8MB USB key will be plenty big)?

One more security based argument in favor of separate file systems. I find it sad that decision makers have used the original need of disk space to side-step the security advantage of separate file systems.Hu wrote:One compromise approach for servers would be that the server has Full Disk Encryption for all the regular Linux data filesystems, and each drive has one unencrypted partition containing the keys for drives other than itself. Then any one drive in isolation cannot be used to recover data, but given an encrypted drive and its key-holding partner, the encrypted drive can be unlocked unattended. This guards against the warranty replacement / failed drive scenario decently well, assuming you only ever have one drive fail at a time. It provides no protection if the server is stolen in full.
Unrelated to disk security, I have seen web servers that required a password / passphrase to continue booting.eccerr0r wrote:What do people do for servers in this case, assuming the main reason for encryption is for ensuring used drives do not contain recoverable data?

I do recall this issue when I first tried setting up an SSL server. I recall SSL keys should be password protected...hence leading to require a password to start webservers. Of course subsequently this really isn't always necessary, but then FDE might be helpful...pjp wrote:Unrelated to disk security, I have seen web servers that required a password / passphrase to continue booting.
Somehow this brought XXTEA, Rumba and Salsa to my mind. Maybe chacha...a low cost block cipher that still could provide some challenge to a passerby but does not need to be "military grade"

You might be better off planning to not use encryption, but to physically destroy the drive when you are ready to dispose of it. If it leaves your house in small enough pieces, it's unlikely anyone will salvage even unencrypted data from it. This obviously voids any hope at a warranty return, but if you are keeping hardware long enough that you still have AES-free machines, you are probably beyond the warranty period anyway.eccerr0r wrote:... which then leads me to wonder, yes I really should encrypt all my disks regardless of portability, not for physical theft but rather for what happens to the disk when I dispose of them due to their demise... Alas this will require me to upgrade my computing infrastructure first to AES capable machines, so I don't see this happening anytime soon.

The fork at https://github.com/Heavenser/bliss-initramfs fixed the original's inability to resume from hibernation onto encrypted swap. It apparently wasn't even a major undertaking; it only needed to not be overlooked.pa4wdh wrote:For those that do any kind of ecncryption: Be aware that sleep functions of laptops make it useless. The encryption keys are in memory and are either kept there or are even written to disk in case of suspend-to-disk. Both of them defeat the purpose of FDE.

Thanks for the pointer. bliss-initramfs looks lighter than genkernel.dbtx wrote:The fork at https://github.com/Heavenser/bliss-initramfs fixed the original's inability to resume from hibernation onto encrypted swap. It apparently wasn't even a major undertaking; it only needed to not be overlooked.pa4wdh wrote:For those that do any kind of ecncryption: Be aware that sleep functions of laptops make it useless. The encryption keys are in memory and are either kept there or are even written to disk in case of suspend-to-disk. Both of them defeat the purpose of FDE.
I think that was why I was looking at genkernel some years ago, but I found that fork and was able to keep using bliss. IIRC the dealbreaker was that genkernel apparently didn't and doesn't support using a detached LUKS header embedded in the initrd. Now that I think of it again, it probably wouldn't be insanely difficult to add.sublogic wrote:(For the record, genkernel handles resuming from encrypted swap as well. It scans logical volumes, opens the crypt_root, and scans LVs again. If you gave a "resume=" option pointing to a swap on an encrypted LV it just works.)
That's correct. I don't see any support for detached headers.dbtx wrote:[ ... ] IIRC the dealbreaker was that genkernel apparently didn't and doesn't support using a detached LUKS header embedded in the initrd. Now that I think of it again, it probably wouldn't be insanely difficult to add.



Code: Select all
PC∕Laptop──────────────────────────┐
└── ∕dev∕sda └── ∕dev∕sdb
├── 1. EFI System Partition ├── 1. EFI System Partition
├── 2. MDADM RAID 1 ├── 2. MDADM RAID 1
│ └── LUKS │ └── LUKS
│ └── Btrfs │ └── Btrfs
│ └── rescue │ └── rescue
├── 3. LUKS ├── 3. LUKS
│ └── MDADM RAID 1 │ └── MDADM RAID 1
│ └── SWAP │ └── SWAP
└── 4. LUKS ("system" partition) └── 4. LUKS ("system" partition)
└── Btrfs raid1 └── Btrfs raid1
└── subvolume └── subvolume
├── @binpkgs ├── @binpkgs
├── @distfiles ├── @distfiles
├── @home ├── @home
├── @ebuilds ├── @ebuilds
├── @root ├── @root
└── @var_tmp └── @var_tmp