On 2014/03/05 17:48, Giancarlo Razzolini wrote:
> Em 05-03-2014 17:30, Ted Unangst escreveu:
> > On Wed, Mar 05, 2014 at 16:15, Giancarlo Razzolini wrote:
> >> Hi,
> >>
> >>     I have one linux server that has full disk encryption, and I use
> >> it's initramfs with dropbear to be able to remote unlock the encrypted
> >> root partition.
> >>
> >>     From what I read from the OpenBSD documentation, this is not
> >> possible now. I want some guidance for what areas of code I would need
> >> to modify, to accomplish the same. I know it would involve lots of
> >> hacking with boot(8), with the kernel itself, and perhaps more. Also, I
> >> want to know how hard you guys think it would be.
> > I'm aware of some issues in this area.
> >
> > You probably need to modify boot to default to serial console. The
> > normal approach, taken by the installer, is to use boot.conf, but of
> > course that's not readable before the disk is decrypted. This is
> > assuming you will use serial console to provide the password instead
> > of regular keyboard.
> >
> > If you want to provide the password over the network, I think that's
> > going to be way more work. pxeboot may be a place to start, but I
> > don't think you'll like where that leads and it won't be very secure
> > either.
> >
> > Or get a server that supports some sort of kvm/console over IP.
> Ted,
> 
>     Thank you for your reply. I am tending for the generic solution for
> unlocking it via network. Not using console nor any hardware assist. On
> linux, using initramfs + busybox + dropbear + some other hacks, it works
> quite well and secure, since you unlock it through ssh.
>     I took a look at pxeboot, but I don't think it will work. I know it
> is a chicken-egg problem, but I want to take a shot at it. Just would
> like some guidance, where to start. I know that maybe it would need some
> approach in the lines of initramfs, but I would avoid it as much as I
> can, if possible. I think a unencrypted partition/disklabel with
> boot.conf and the kernel, plus some hack with boot itself to initialize
> the network device, and configure it's ip address would be more
> interesting. Or even just boot.conf on the partition. This would require
> that boot(8) would do most of the work, even a small sshd
> implementation. Any ideas?
> 
> Cheers,
> 
> -- 
> Giancarlo Razzolini
> GPG: 4096R/77B981BC
> 

What are you trying to protect against?

If somebody has physical access, they can presumably replace the 
kernel/initramfs
with a trojanned version ...


Reply via email to