Current-Users archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: Full Disk Encryption with cgd (well, almost)



On Fri, Mar 22, 2013 at 12:11:35AM +0100, Rhialto wrote:
> On Thu 21 Mar 2013 at 03:01:55 +0100, Pierre Pronchery wrote:
> > The approach I am taking is as follows:
> > - /dev/wd0a is a small bootable partition with:
> >   * boot,
> >   * boot.cfg,
> >   * a GENERIC kernel,
> >   * a ramdisk with a kernel module,
> >   * cgd.conf and the relevant encryption key
> >     (cgd0 /dev/wd0e)
> > - /dev/wd0e is the cgd partition
> > - the ramdisk (ramdisk-cgdroot.fs) was generated with the patch
> >   attached, a lot like for sysinst but with cgdconfig instead
> > - the kernel module is generated from this ramdisk
> > - boot.cgd boots the GENERIC kernel with the ramdisk enabled
> >   (menu=Boot:load /cgdroot.kmod;boot /netbsd.gz)
> > - a minimal /etc/rc within the ramdisk
> >   * mounts wd0a on /etc/cgd,
> >   * asks for the passphrase (with "cgdconfig -C"),
> >   * mounts the encrypted volume read-only (on "/altroot"),
> >   * and tells init (via "sysctl -w init.root=/altroot") to chroot
> >     before going on
> 
> Is there any particular reason why cgdconfig and /etc/rc are in a
> ramdisk, rather than in the unencrypted /dev/wd0a? A ramdisk makes it so
> much more complicated to update stuff, but it offers no security anyway
> since it is unencrypted itself.

It would certainly make it easier to achieve a trusted boot using the
TPM -- you can stop worrying what the TPM says as soon as the signature
on the kernel and ramdisk check out.



Home | Main Index | Thread Index | Old Index