Ancestors

Written by Thorsten Leemhuis (acct. 1/4) on 2025-01-18 at 06:28

Bypassing disk encryption on systems with automatic TPM2 unlock – https://oddlama.org/blog/bypassing-disk-encryption-with-tpm2-unlock/

oddlama writes: '"Most TPM2 unlock setups fail to verify the LUKS identity of the decrypted partition. Since the initrd must reside in an unencrypted boot partition, an attacker can inspect it to learn how it decrypts the disk and also what type of filesystem it expects to find inside. By recreating the LUKS partition with a known key, we can confuse the initrd […]"' #tpm #linux #Encryption

=> View attached media

=> More informations about this toot | More toots from kernellogger@fosstodon.org

Toot

Written by Fluchtkapsel on 2025-01-18 at 10:15

@kernellogger Wow, great overview! Thanks for sharing, I learned a lot again.

On my previous installation, Fedora Silverblue 39, I experimented with automatic TPM2 unlock and had some heated discussions in my team. But that it's even worse I didn't anticipate.

At the moment I use FIDO2, and I guess a similar attack might be feasible if the attacker could get hold of my hardware token as LUKS only checks for presence. I believe my token does not support unlocking with PIN entry that I could at least use with TPM2.

=> More informations about this toot | More toots from fluchtkapsel@nerdculture.de

Descendants

Proxy Information
Original URL
gemini://mastogem.picasoft.net/thread/113848833826122302
Status Code
Success (20)
Meta
text/gemini
Capsule Response Time
417.910039 milliseconds
Gemini-to-HTML Time
0.880546 milliseconds

This content has been proxied by September (ba2dc).