From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail01.freesources.org (mx01.freesources.org [80.237.252.132]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by mail.server123.net (Postfix) with ESMTPS for ; Tue, 14 Oct 2014 23:46:32 +0200 (CEST) Received: from dslb-094-219-061-036.094.219.pools.vodafone-ip.de ([94.219.61.36] helo=[192.168.2.118]) by mail01.freesources.org with esmtpsa (TLS1.0:DHE_RSA_AES_128_CBC_SHA1:16) (Exim 4.72) (envelope-from ) id 1Xe9SD-0004MA-Ez for dm-crypt@saout.de; Tue, 14 Oct 2014 21:16:28 +0000 Message-ID: <543D92A8.50701@freesources.org> Date: Tue, 14 Oct 2014 23:16:24 +0200 From: Jonas Meurer MIME-Version: 1.0 References: In-Reply-To: Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: 7bit Subject: Re: [dm-crypt] LUKS disk encryption with remote boot authentication List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: dm-crypt@saout.de Hi Cpp, Am 14.10.2014 um 13:42 schrieb Cpp: > I'm interested in a solution for devices with LUKS disk encryption > that use a remote server to securely obtain a decryption key upon > boot. Let me elaborate: Suppose I have an embedded device i.e. > Raspberry Pi with an external USB HDD or maybe a Cubieboard with a > SATA-attached disk. The rootfs is located on an encrypted partition on > the disk that has to be decrypted before the OS can boot. The boot > partition is located on an unencrypted NAND/SD partition. > > Normally a modern linux distro will ask the user to type in the > password via a keyboard upon boot, if disk encryption is being used. I > am however interested in setups where this decryption key is obtained > securely (TLS?) from a remote (secure) server via LAN. > > Are there any known setups like this that I can take a look at? Debian and Ubuntu cryptsetup packages (at least, I don't know about other distributions) support remote unlocking in initramfs. It works the following way: the dropbear ssh server ist started in initramfs, you ssh into the initramfs and unlock the root partition, afterwards the boot process is continued. See section 8. of README.Debian in the distribution packages[1] for further information. Cheers, jonas [1] or: here http://sources.debian.net/src/cryptsetup/2:1.6.6-2/debian/README.Debian/#L202