LinuxQuestions.org
Review your favorite Linux distribution.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 10-24-2014, 11:41 AM   #1
postcd
Member
 
Registered: Oct 2013
Posts: 527

Rep: Reputation: Disabled
Post linux GUI full disk encryption including /boot


Hello,

im using Windows OS and i wish to switch to Linux with GUI, i dont have any distribution in mind (i know Ubuntu has huge community, so maybe xubuntu). Before i do the Win/Linux switch, i want to ask for a link to tutorial or advice regarding HDD encryption.

Im looking for quick & secure way to encrypt whole filesystem (including /boot) so i have peace of mind that nobody will read any data. I also want easy of use, im linux noob in command line so i prefer GUI tool. Can you please give an advice on solution?
 
Old 10-24-2014, 12:40 PM   #2
pan64
LQ Addict
 
Registered: Mar 2012
Location: Hungary
Distribution: debian/ubuntu/suse ...
Posts: 21,982

Rep: Reputation: 7337Reputation: 7337Reputation: 7337Reputation: 7337Reputation: 7337Reputation: 7337Reputation: 7337Reputation: 7337Reputation: 7337Reputation: 7337Reputation: 7337
I would suggest you to boot some distros (without installing them) from a live CD - just to be familiar with them.
About the security: the boot cannot be really secured, because the system should be started somehow to be able to encrypt/decrypt drives. But the normal boot contains no interesting information, just the usual files. Therefore the way is to have a small boot partition and a protected one (or more).
http://www.howtogeek.com/howto/33255...ur-hard-drive/
 
Old 10-24-2014, 03:54 PM   #3
Ihatewindows522
Member
 
Registered: Oct 2014
Location: Fort Wayne
Distribution: Ubuntu 16.04 LTS
Posts: 616
Blog Entries: 2

Rep: Reputation: 166Reputation: 166
Quote:
Originally Posted by postcd View Post
Hello,

im using Windows OS and i wish to switch to Linux with GUI, i dont have any distribution in mind (i know Ubuntu has huge community, so maybe xubuntu). Before i do the Win/Linux switch, i want to ask for a link to tutorial or advice regarding HDD encryption.

Im looking for quick & secure way to encrypt whole filesystem (including /boot) so i have peace of mind that nobody will read any data. I also want easy of use, im linux noob in command line so i prefer GUI tool. Can you please give an advice on solution?
LUKS is a pretty common way in Linux. You should be given that option when you install.

Also something to consider if you want to use Ubuntu and keep your data unreadable to the general public...
https://www.google.com/search?q=ubun...hrome&ie=UTF-8
http://www.linuxquestions.org/questi...ck-4175522427/

I would highly recommend openSuSE to someone new to Linux. Easy to use, lots of GUI tools, rock solid, mature, decent repos, and above all...no spyware.
 
1 members found this post helpful.
Old 10-24-2014, 03:57 PM   #4
Ihatewindows522
Member
 
Registered: Oct 2014
Location: Fort Wayne
Distribution: Ubuntu 16.04 LTS
Posts: 616
Blog Entries: 2

Rep: Reputation: 166Reputation: 166
Quote:
Originally Posted by pan64 View Post
I would suggest you to boot some distros (without installing them) from a live CD - just to be familiar with them.
About the security: the boot cannot be really secured, because the system should be started somehow to be able to encrypt/decrypt drives. But the normal boot contains no interesting information, just the usual files. Therefore the way is to have a small boot partition and a protected one (or more).
http://www.howtogeek.com/howto/33255...ur-hard-drive/
IDK what happens when you encrypt the harddrive, but this is a common back door. Gives you instructions to patch that up, too.
 
Old 10-24-2014, 06:01 PM   #5
Habitual
LQ Veteran
 
Registered: Jan 2011
Location: Abingdon, VA
Distribution: Catalina
Posts: 9,374
Blog Entries: 37

Rep: Reputation: Disabled
Pwning Past Whole Disk Encryption

Rule Number One: There is no security without Physical Security.

Last edited by Habitual; 10-26-2014 at 07:01 PM.
 
1 members found this post helpful.
Old 10-25-2014, 06:51 AM   #6
postcd
Member
 
Registered: Oct 2013
Posts: 527

Original Poster
Rep: Reputation: Disabled
Quote:
Originally Posted by Habitual View Post
that article is very usefull, im amateur, but it tells that one should not keep /boot just unencrypted and part of computer storage media. It should be on flash disk or whole disk encryption, thats why im aksing full disk encrypt if its doable bypassing hack mentioned in above example.
 
Old 10-26-2014, 10:38 AM   #7
replica9000
Senior Member
 
Registered: Jul 2006
Distribution: Debian Unstable
Posts: 1,131
Blog Entries: 2

Rep: Reputation: 260Reputation: 260Reputation: 260
I suppose one could write a script to detect if any files under /boot were tampered with and alert you before you enter your passphrase.
 
Old 10-27-2014, 05:03 PM   #8
displace
Member
 
Registered: Jan 2013
Location: EU
Distribution: Debian
Posts: 268

Rep: Reputation: 25
I know truecrypt is now deceased, but did it not have an ability to also encrypt /boot? Does GRUB have any similar functionality?
 
Old 10-27-2014, 05:05 PM   #9
notKlaatu
Senior Member
 
Registered: Sep 2010
Location: Lawrence, New Zealand
Distribution: Slackware
Posts: 1,077

Rep: Reputation: 732Reputation: 732Reputation: 732Reputation: 732Reputation: 732Reputation: 732Reputation: 732
LUKS is what you are looking for.
 
Old 10-28-2014, 10:24 AM   #10
postcd
Member
 
Registered: Oct 2013
Posts: 527

Original Poster
Rep: Reputation: Disabled
Quote:
Originally Posted by notKlaatu View Post
LUKS is what you are looking for.
Can you please explain why?
 
Old 10-31-2014, 01:10 AM   #11
notKlaatu
Senior Member
 
Registered: Sep 2010
Location: Lawrence, New Zealand
Distribution: Slackware
Posts: 1,077

Rep: Reputation: 732Reputation: 732Reputation: 732Reputation: 732Reputation: 732Reputation: 732Reputation: 732
You want native full disk encryption of your hard drive? LUKS does that. It is a native technology in Linux, so it's fully integrated with the GUI; as you boot, it will graphically prompt you to enter a password to unlock the partition needing to be accessed. If you use LUKs on an external drive, most Linux desktops have a GUI interface to allow you to enter a password.

LUKs is simply what it is that you are asking for. I know off hand that both Mint and Fedora make it easy to utilize as you install; again, all graphical and point-and-click.

Also, for what it's worth, the command line is not actually as an advanced technology as you think. Well, it is, but it's not as difficult as you think. Don't be afraid of it :-)

Good luck.
 
1 members found this post helpful.
Old 11-03-2014, 03:32 PM   #12
ron7000
Member
 
Registered: Nov 2007
Location: CT
Posts: 248

Rep: Reputation: 26
so the cpu cannot execute encrypted instructions therefore some amount of disk must remain unencrypted to have the initial boot code,
which in this case is the entire boot partition which contains boot code along with dmcrypt, which are open source.
so the method of attack is via physical access modify the unencrypted boot partition to poison it with boot code that steals the encryption passphrase when entered by the user and write it to a plaintext hidden file somewhere on boot partition. User then uses their computer and enters passphrase, then you get physical access later on and read that plaintext file your poisoned boot code created.

given all that, is a similar attack feasible on computers using different encryption software and on Microsoft Windows that uses TPM?
my guess is no because T = trusted in TPM and you can't get that passphrase along with that software not being open source?
microsoft windows bitlocker whole drive encryption isn't susceptible to this kind of attack is it, where one section of data on the disk is unencrypted that with physical access you can modify?
 
Old 11-04-2014, 12:05 AM   #13
pan64
LQ Addict
 
Registered: Mar 2012
Location: Hungary
Distribution: debian/ubuntu/suse ...
Posts: 21,982

Rep: Reputation: 7337Reputation: 7337Reputation: 7337Reputation: 7337Reputation: 7337Reputation: 7337Reputation: 7337Reputation: 7337Reputation: 7337Reputation: 7337Reputation: 7337
that kind of boot partition can/should be set to read only and after the boot it can be checked also (if content has been changed)
 
  


Reply

Tags
encryption



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
LXer: Manual full disk encryption setup guide for Ubuntu 13.10 & Linux Mint 16 LXer Syndicated Linux News 0 01-29-2014 04:30 AM
LXer: Dual-boot Fedora 18 and Windows 7, with full disk encryption configured on both OSs LXer Syndicated Linux News 0 02-25-2013 04:00 PM
disk full, encryption dawee Ubuntu 2 07-03-2012 02:46 AM
Full disk encryption on boot partition paul_mat Linux - Security 13 03-12-2008 02:11 AM
Full disk encryption ourskool Linux - Security 1 01-23-2008 11:52 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 03:31 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration