All of lore.kernel.org
 help / color / mirror / Atom feed
From: "Arbiel (gmx)" <arbiel.perlacremaz@gmx.fr>
To: Sven Eschenberg <sven@whgl.uni-frankfurt.de>, dm-crypt@saout.de
Subject: Re: [dm-crypt] Automatically mount LUKS LVM on boot?
Date: Thu, 21 Jan 2016 13:50:25 +0100	[thread overview]
Message-ID: <56A0D411.7050409@gmx.fr> (raw)
In-Reply-To: <569BDDBD.6030909@whgl.uni-frankfurt.de>

[-- Attachment #1: Type: text/plain, Size: 7823 bytes --]

Hi

Not sure what I've done can help you, but let me tell you.

I'm using LUKS on some logical volumes of a LVM. That is, I do not
encrypt my whole LVM, but only parts of it. For several reasons out of
scope of your concern, I boot my PC only using a removable USB key. I
let my hard disk MBR as provided by the manufacturer.

I encrypted both my root and my home, each with its own LUKS key. I
agree I did it more for the sake of getting experience then for a real
need of data protection. Taking advantage of the need of a removable
device to boot, I decided to store my LUKS keys on it. I included the
two following lines in my /etc/crypttab :
 
victor-root UUID=78576555-f0c2-4c80-af4f-d763cc7ae71d
/dev/disk/by-uuid/4146dfad-26f0-4aec-99c3-8ab00c3e4297:/.victor-root:1
luks,keyscript=/lib/cryptsetup/scripts/passdev
victor-home UUID=37447a61-f946-4d38-a398-5a886c4e3f22
/dev/disk/by-uuid/4146dfad-26f0-4aec-99c3-8ab00c3e4297:/.victor-home:1
luks,keyscript=/lib/cryptsetup/scripts/passdev

The two keys are 512-byte random binary files stored at the root of the
partition, named ".victor-root" and ".victor-home".

As a USB key is rather fragile (loss, getting out of use), I stored my
LUKS keys on several USB keys. I gave the same uuid to the partitions
holding my LUKS files, so as the preceding lines would work for any one
of my USB keys.

My /etc/fstab files holds the following lines

/dev/mapper/victor-root /               ext4    errors=remount-ro 0       1
/dev/mapper/victor-home /home ext4 defaults 0 2

I suppressed the need of a password at login.

After boot, I disconnect my USB key.

Arbiel

Le 17/01/2016 19:30, Sven Eschenberg a écrit :
> Hi Dáire,
>
> While this is not really dm-crypt/cryptsetup related, but rather a
> question of the used distro and desktopenvironment (etc.), I'll try to
> give you some hints on this:
>
> As long as the volume is listed in crypttab and the key is provided
> the crypto-mapping will be setup during boot. If you don't want that,
> you'd have to revert those changes. (Automatic setup of crypto mapping
> with a locally stored key is somewhat pointless, as you can imagine).
>
> It is not that easy by just looking at the commands you ran, to judge
> what is going on right now. You'll certainly have to provide
> additional info, but I am sure the Ubuntu community would be a greater
> help, as it knows the intrinsics of the distro.
>
> One thing I want to add though is this:
> You will NOT be able to do a single password entry for both decryption
> and login. You could possibly disable passwords for login (if that
> makes sense to you). You could skip the password for decryption, if
> the 'passphrase/key' is stored on an external drive (usb thumg drive)
> and you physically secure it and instead use a sign on password. And
> if you really insist on a signle sign on, you'd have to have a some
> sort of password cache daemon that provides the password at a later
> stage, but then again this makes password based logins pointless.
>
> So, first choose your modus operandi, then try setting it up.
>
> Regards
>
> -Sven
>
> Am 16.01.2016 um 23:33 schrieb Dáire Fagan:
>> I have tried following different guides on this but none seem to do
>> exactly what I am trying so I had to work with different parts from
>> different guides.
>>
>> Using the following I made it so Ubuntu would not boot, although I was
>> able to remedy this by booting into Ubutnu recovery, dropping to a root
>> shell, and putting fstab back as it was: HOWTO: Automatically unlock
>> LUKS encrypted drives with a keyfile
>> <http://ubuntuforums.org/showthread.php?t=837416>
>>
>> When I started I had just set up LUKS with LVM. I was able to mount the
>> main volume hdd1 by clicking on it from the launcher in Ubuntu and
>> entering my password, but I need to set it up to mount on boot.
>>
>> Even after the change I made in fstab - undoing what the guide
>> recommended - now when I boot a volume is mounted of 973GB although I
>> cannot write to it. Apart from that I am not sure if it is otherwise
>> working as it should, or if say for instance it is left decrypted all of
>> the time.
>>
>> Can you please look through the commands from my bash history and tell
>> me anything I need to undo, the correct commands to do this, and any
>> extra commands I need to enter to achieve what I am after, physical
>> volume sda1 decrypted on boot, and the logical volumes swap and hdd1
>> automatically mounted, one password input on boot preferred, so I do not
>> have to enter one to login and another to decrypt. This is all on a
>> completely separate drive to my / and /home partitions.
>>
>> If relevant one of the commands used during LUKS and LVM setup was:
>>
>> pvcreate /dev/mapper enc-pv
>>
>> I mention that now as it is referenced in another command.
>>
>> The logical volumes:
>>
>> [CODE]dusf@roadrunner:~$ sudo lvdisplay
>>    --- Logical volume ---
>>    LV Path                /dev/vg/swap
>>    LV Name                swap
>>    VG Name                vg
>>    LV UUID                HBEt92-E8MQ-aCAu-DBDz-7VeJ-KLom-JeJ9k8
>>    LV Write Access        read/write
>>    LV Creation host, time roadrunner, 2016-01-16 20:36:42 +0000
>>    LV Status              available
>>    # open                 0
>>    LV Size                10.00 GiB
>>    Current LE             2560
>>    Segments               1
>>    Allocation             inherit
>>    Read ahead sectors     auto
>>    - currently set to     256
>>    Block device           252:1
>>
>>    --- Logical volume ---
>>    LV Path                /dev/vg/kali
>>    LV Name                kali
>>    VG Name                vg
>>    LV UUID                BeWqMO-DQAf-zcAp-RJAf-vmaY-OZbt-GLQIWx
>>    LV Write Access        read/write
>>    LV Creation host, time roadrunner, 2016-01-16 20:40:39 +0000
>>    LV Status              available
>>    # open                 0
>>    LV Size                15.00 GiB
>>    Current LE             3840
>>    Segments               1
>>    Allocation             inherit
>>    Read ahead sectors     auto
>>    - currently set to     256
>>    Block device           252:2
>>
>>    --- Logical volume ---
>>    LV Path                /dev/vg/HDD1
>>    LV Name                HDD1
>>    VG Name                vg
>>    LV UUID                xFw2Yu-li8I-Ooav-Yjk2-P38q-CZeG-dmdhSl
>>    LV Write Access        read/write
>>    LV Creation host, time roadrunner, 2016-01-16 20:51:00 +0000
>>    LV Status              available
>>    # open                 1
>>    LV Size                906.51 GiB
>>    Current LE             232066
>>    Segments               1
>>    Allocation             inherit
>>    Read ahead sectors     auto
>>    - currently set to     256
>>    Block device           252:3
>>
>> Commands I entered to try and automount:
>>
>> 156  sudo dd if=/dev/urandom of=/root/keyfile bs=1024 count=4
>>    157  sudo chmod 0400 /root/keyfile
>>    160  sudo cryptsetup luksAddKey /dev/sda1 /root/keyfile
>>    161  sudo vi /etc/crypttab
>>
>> I added the line: enc-pv      /dev/sda1  /root/keyfile  luks
>>
>>    162  sudo vi /etc/fstab
>> I added the line: /dev/mapper/enc-pv  /media/sda1     ext4    defaults
>>       0       2
>>
>>   163  sudo mount -a
>>    164  mkdir /media/sda1
>>    165  sudo mkdir /media/sda1
>>    166  sudo mount -a
>>
>>
>> _______________________________________________
>> dm-crypt mailing list
>> dm-crypt@saout.de
>> http://www.saout.de/mailman/listinfo/dm-crypt
>>
> _______________________________________________
> dm-crypt mailing list
> dm-crypt@saout.de
> http://www.saout.de/mailman/listinfo/dm-crypt
>



[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 230 bytes --]

      reply	other threads:[~2016-01-21 12:50 UTC|newest]

Thread overview: 3+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2016-01-16 22:33 [dm-crypt] Automatically mount LUKS LVM on boot? Dáire Fagan
2016-01-17 18:30 ` Sven Eschenberg
2016-01-21 12:50   ` Arbiel (gmx) [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=56A0D411.7050409@gmx.fr \
    --to=arbiel.perlacremaz@gmx.fr \
    --cc=dm-crypt@saout.de \
    --cc=sven@whgl.uni-frankfurt.de \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.