added 'Useful resources'; minor updates

- signed-off-by: trimstray <trimstray@gmail.com>
This commit is contained in:
trimstray
2019-02-19 10:30:35 +01:00
parent cbe783518b
commit d32d6273b9

View File

@@ -8,7 +8,7 @@ Disk encryption is focused on securing physical access, while relying on other p
Most of the Linux distributions will allow you to encrypt your disks before installation. Most of the Linux distributions will allow you to encrypt your disks before installation.
If you use an alternative installation method (e.g. from `debootstrap`) you can create an [encrypted disk manually](#disk-partitions). If you use an alternative installation method (e.g. from `debootstrap`) you can create an [encrypted disk manually](lib/post_install_tasks/disk_partitions.md#disk-partitions).
Before this you should to answer the following questions: Before this you should to answer the following questions:
@@ -26,12 +26,14 @@ Before this you should to answer the following questions:
* during boot process * during boot process
* mixed above or manually * mixed above or manually
[Source](https://uchicago.service-now.com/it?id=kb_article&kb=KB06000398)
#### :eight_pointed_black_star: Encrypt root filesystem #### :eight_pointed_black_star: Encrypt root filesystem
Unlocked during boot, using passphrases or USB stick with keyfiles. Unlocked during boot, using passphrases or USB stick with keyfiles.
###### Useful resources
- [dm-crypt/Encrypting an entire system](https://wiki.archlinux.org/index.php/Dm-crypt/Encrypting_an_entire_system)
#### :eight_pointed_black_star: Encrypt /boot partition #### :eight_pointed_black_star: Encrypt /boot partition
- encrypting the whole disk without `/boot` partition but keeping it on a flash drive you carry at all times - encrypting the whole disk without `/boot` partition but keeping it on a flash drive you carry at all times
@@ -53,9 +55,7 @@ Before this you should to answer the following questions:
The following recipe should be made after installing the system (however, these steps are included in this section to avoid mixing issues). The following recipe should be made after installing the system (however, these steps are included in this section to avoid mixing issues).
[Source](https://security.stackexchange.com/questions/166075/encrypting-the-boot-partition-in-a-linux-system-can-protect-from-an-evil-maid-a) ##### Create copy of your /boot
###### Create copy of your /boot
```bash ```bash
mkdir /mnt/boot mkdir /mnt/boot
@@ -64,14 +64,14 @@ rsync -aAXv /boot/ /mnt/boot/
umount /mnt/boot umount /mnt/boot
``` ```
###### Removed old /boot partition ##### Removed old /boot partition
```bash ```bash
umount /boot umount /boot
sed -i -e '/\/boot/d' /etc/fstab sed -i -e '/\/boot/d' /etc/fstab
``` ```
###### Regenerate grub configuration ##### Regenerate grub configuration
```bash ```bash
# Debian like distributions # Debian like distributions
@@ -81,13 +81,13 @@ grub-mkconfig > /boot/grub/grub.cfg
grub2-mkconfig > /boot/grub2/grub.cfg grub2-mkconfig > /boot/grub2/grub.cfg
``` ```
###### Enable `GRUB_ENABLE_CRYPTODISK` param ##### Enable `GRUB_ENABLE_CRYPTODISK` param
```bash ```bash
echo GRUB_ENABLE_CRYPTODISK=y >> /etc/default/grub echo GRUB_ENABLE_CRYPTODISK=y >> /etc/default/grub
``` ```
###### Reinstall grub ##### Reinstall grub
```bash ```bash
# Debian like distributions # Debian like distributions
@@ -97,14 +97,24 @@ grub-install /dev/sda
grub2-install /dev/sda grub2-install /dev/sda
``` ```
> More details can be found here (Bootloader configuration (grub) section): > More details can be found here [Bootloader configuration (grub) section](lib/post_install_tasks/bootloader_configuration.md#bootloader-configuration-grub)
> - [Lock the boot directory](#eight_pointed_black_star-lock-the-boot-directory)
###### Useful resources
- [Encrypting More: /boot Joins The Party](https://dustymabe.com/2015/07/06/encrypting-more-boot-joins-the-party/)
- [Encrypting the /boot partition in a Linux system can protect from an Evil Maid Attack?](https://security.stackexchange.com/questions/166075/encrypting-the-boot-partition-in-a-linux-system-can-protect-from-an-evil-maid-a)
#### :eight_pointed_black_star: Swap partition #### :eight_pointed_black_star: Swap partition
- swap area is not required to survive a reboot, therefore a new random encryption key can be chosen each time the swap area is activated - swap area is not required to survive a reboot, therefore a new random encryption key can be chosen each time the swap area is activated
- get the key from `/dev/urandom` because `/dev/random` maybe stalling your boot sequence - get the key from `/dev/urandom` because `/dev/random` maybe stalling your boot sequence
> More details can be found here [Swap partition](lib/post_install_tasks/disk_partitions.md#eight_pointed_black_star-swap-partition)
###### Useful resources
- [An introduction to swap space on Linux systems](https://opensource.com/article/18/9/swap-space-linux-systems)
#### :ballot_box_with_check: Summary checklist #### :ballot_box_with_check: Summary checklist
| <b>Item</b> | <b>True</b> | <b>False</b> | | <b>Item</b> | <b>True</b> | <b>False</b> |