this post was submitted on 28 Sep 2023
62 points (91.9% liked)

Linux

47345 readers
1274 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 5 years ago
MODERATORS
 

Hi! I want to try out fedora workstation in the near future (once 39 is out) and was wondering if systemd-homed is ready for everyday use yet.

I'm a bit paranoid and really need my private data encrypted. However, I don't think that full disk encryption is practical for my daily use. Therefore I was really looking forward to the encryption possibilities of systemd-homed.

However, after reading up on it, I was a bit discouraged. AFAIK, there's no option to setup systemd-homed at installation (of fedora). I was an Arch then Manjaro, then Endeavour user for years but don't have the time/patience anymore to configure major parrts of my system anymore. Also, the documentation doesn't seem too noob-friendly to me, which also plays into the time/patience argument.

Is it ready? Can anyone seriously recommend it for a lazy ex-Arch user who doesn't want to break another linux installation?

Thank you in advance. :)

you are viewing a single comment's thread
view the rest of the comments
[–] wildbus8979@sh.itjust.works 28 points 11 months ago (12 children)

To go back to basics, why is FDE not suitable for your needs?

[–] vector_zero@lemmy.world 24 points 11 months ago (4 children)

I second this.

Full disk encryption is entirely practical for everyday use. If you don't already have a dedicated TPM, your motherboard/CPU may provide a software TPM (fTPM?). If so, you don't even have to interact with the machine during boot. It's just a bit slower to start up (by a few seconds), which really isn't a big issue for your average user.

[–] taaz@biglemmowski.win 16 points 11 months ago* (last edited 11 months ago) (2 children)

Pardon my ignorance here, but I don't get it how is the whole thing still safe with unlocking from TPM instead of me providing the password at boot time?

Considering now anyone can just boot the machine into the installed system then bruteforce/exploit something to get login/get read permissions and make a plain copy of the data?
Where, without tpm, as long as I do not type in the encryption password myself I have a pretty high guarantee that the data is safe, especially when I am not at the (powered down) computer.

[–] oshitwaddup@lemmy.antemeridiem.xyz 10 points 11 months ago (1 children)

This is what I don't understand either. It seems like with tpm it only protects the data from someone taking or copying the hard drive, but the bigger risk seems like what you describe

plus, using an encryption password and then automatically logging in the user prevents needing to enter two passwords while still keeping the data secure as long as the machine is off

[–] michaelrose@lemmy.ml 3 points 11 months ago

You have a competent grasp of the situation

[–] vector_zero@lemmy.world 5 points 11 months ago (1 children)

The idea behind it is that the files are stored encrypted at rest, which is really what you want, because once a system is booted, you have to play by the computer's rules (respect file permissions, policies, etc.).

The TPM provides a secure mechanism to provide a decryption key to the computer during boot, eliminating the need for direct interaction.

Could it be compromised? Probably, but it would take considerably more effort than a man-in-the-middle on your keyboard via a logic analyzer.

[–] michaelrose@lemmy.ml 2 points 11 months ago (1 children)

This is a common misunderstanding insofar as how encryption works. You can't flick a bit and TURN your storage unencrypted nor can you plausibly make your computer obey restrictions.

If your storage is encrypted it remains encrypted always including the file you have open right now. Your takes a plausibly length usable string and uses it to compute or retrieve the long binary number actually needed to decrypt your files. This number is stored in memory such that encrypted files can be decrypted when read into memory.

Once that key is loaded in memory anyone with 10 minutes and access to google could trivially unlock your computer in several different ways. It is virtually exactly like having no security whatsoever.

If you don't actually enter a passphrase to unlock you have no meaningful security against anything but the most casual unmotivated snooping.

Your little sister might not be motivated enough to read your diary but the dipstick that stole your laptop will definitely be spending your money.

[–] vector_zero@lemmy.world 7 points 11 months ago (1 children)

Once that key is loaded in memory anyone with 10 minutes and access to google could trivially unlock your computer in several different ways. It is virtually exactly like having no security whatsoever.

I highly doubt it.

If you have any tips for how I can personally bypass my computer's encryption in 10 minutes without being able to login, I'd love to try my hand at it.

[–] michaelrose@lemmy.ml 5 points 11 months ago (21 children)

You aren't actually asking to how to bypass encryption because the key is already in memory. You are asking about the much simpler task of compromising a computer with physical access to same. Depending on configuration this can be as ridiculous as killing the lockscreen process or as hard as physically opening the case chilling the contents of ram enough that data survives transfer to different physical hardware. See also the massive attack surface of the USB stack.

load more comments (21 replies)
[–] dsemy@lemm.ee 10 points 11 months ago (1 children)

TPM is only kinda related to FDE, in that it can be used to unlock a LUKS encrypted volume. FDE doesn’t require a TPM.

I also wouldn’t recommend automatically unlocking your root partition on boot using the TPM as this allows access to your data if the device is stolen, which, for an average user, defeats the main purpose of FDE.

[–] vector_zero@lemmy.world 2 points 11 months ago (1 children)

How so? The data is still encrypted on the drive after boot, so unless your machine also automatically logs you in, there shouldn't be anything to worry about.

[–] dsemy@lemm.ee 8 points 11 months ago (5 children)

At that point you relying on the fact that nothing running in your machine at boot can be compromised - after all, everything running on your machine has access to your unencrypted data.

If you don’t automatically unlock using the TPM, an attacker only has access to encrypted data.

load more comments (5 replies)
[–] Prunebutt@feddit.de 2 points 11 months ago

As others explained: If the FDE key is in RAM, I'm vulnerable. My thread model includes a stolen Laptop with the attackers able to freeze my RAM and reading out the keys.

Thank you for mentioning TPM though. Didn't know of that before. :)

[–] PseudoSpock@lemmy.dbzer0.com 1 points 11 months ago (2 children)

There are plenty of reasons to not want FDE or not want just FDE alone. Shared computer, your data isn't safe if you share the FDE password with another user who needs to share the system. He said he's paranoid, so he is wanting his data encrypted above all. Home directory encryption, especially on top of FDE, while a performance hit, would do well for that. But most importantly, he said FDE isn't practical for him, end of FDE story.

load more comments (2 replies)
[–] Prunebutt@feddit.de 4 points 11 months ago* (last edited 11 months ago) (3 children)

Simple convenience. I usually don't have the time to wait one or two minutes until my full disk is decrypted (I am often late and the only person in a group meeting who brought a laptop for taking minutes).

I also use a weird keyboard layout (Neo 2) and I never got grub to load with that layout. Typing a 40+ passphrase in QWRETZ is just cumbersome to me.

Also: I hate to admit it, but I am a bit vain and simply would like a nice gui for entering my password.

Edit: I forgot to add that I'm playing with the idea of getting a surface tablet and installing linux on it. Then I couldn't count on awlays having a usb keyboard with me.

[–] loutr@sh.itjust.works 8 points 11 months ago (1 children)

I have a LUKS-encrypted laptop (1GB SSD), it takes about 10 seconds between typing in the password and the start of the boot process.

load more comments (1 replies)
[–] Zikeji@programming.dev 8 points 11 months ago (7 children)

You can setup FDE that utilizes TPM like Windows does with bitlocker, in such a way that your backup phrase is only necessary if something about your hardware changes.

Last I set it up however, there wasn't any easy/automatic way. Searching "luks TPM" should get you started.

[–] Dremor@lemmy.world 1 points 11 months ago (1 children)

Would a FDE with FIDO2 hardware key meet your needs?

[–] Prunebutt@feddit.de 1 points 11 months ago (1 children)

I don't think so. There's a high likelihood of both laptop and key ending in the same hands if the laptop is stolen.

[–] Dremor@lemmy.world 3 points 11 months ago* (last edited 11 months ago) (5 children)

The concept of hardware key is precisely to be removed as soon as you are not in front of the device.

In my case, I'm using one this way. It is tethered to myself with a metal chain, so as soon as I'm not in front of my computer, they are separated and my sensitive data protected. Of course it won't prevent someone from threatening to harm me in order to get access to said key, but he might as well do the same to get access to any kind of password.

load more comments (5 replies)
load more comments (10 replies)