Ancestors

Written by Thorsten Leemhuis (acct. 1/4) on 2025-01-18 at 06:28

Bypassing disk encryption on systems with automatic TPM2 unlock – https://oddlama.org/blog/bypassing-disk-encryption-with-tpm2-unlock/

oddlama writes: '"Most TPM2 unlock setups fail to verify the LUKS identity of the decrypted partition. Since the initrd must reside in an unencrypted boot partition, an attacker can inspect it to learn how it decrypts the disk and also what type of filesystem it expects to find inside. By recreating the LUKS partition with a known key, we can confuse the initrd […]"' #tpm #linux #Encryption

=> View attached media

=> More informations about this toot | More toots from kernellogger@fosstodon.org

Toot

Written by elfy on 2025-01-18 at 14:00

@kernellogger Thanks for the great article and documentation! Ironically I started fiddling with TPM-based LUKS decryption during bootup recently and I asked myself those questions (as most guides online will only suggest measuring PCR 1 and 7, e.g. when using Clevis. Which might be sufficient if the threat model is considering it secure enough).

I fear securing bootup on Linux will take years, even if the tools like systemd's features are already in place.

=> More informations about this toot | More toots from elfy@chaos.social

Descendants

Proxy Information
Original URL
gemini://mastogem.picasoft.net/thread/113849718678190214
Status Code
Success (20)
Meta
text/gemini
Capsule Response Time
251.39135 milliseconds
Gemini-to-HTML Time
0.550479 milliseconds

This content has been proxied by September (ba2dc).