-
Notifications
You must be signed in to change notification settings - Fork 40
DDI: Add recomendation for LUKS encrypted partitions #164
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
specs/discoverable_disk_image.md
Outdated
The [DPS](discoverable_partitions_specification.md) defines the GUIDs to use and the format of the | ||
`dm-verity` signature partition's JSON content. | ||
`dm-verity` signature partition's JSON content. The [DPS](discoverable_partitions_specification.md) | ||
allows optional `LUKS` encryption for additional confidentiality. Note that `LUKS` encryption alone does not |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LUKS is written as plain LUKS not LUKS
in the other specs, so that should be done here as well for consistency.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
thanks for your review, done!
8664728
to
70893f1
Compare
`dm-verity` signature partition's JSON content. The [DPS](discoverable_partitions_specification.md) | ||
allows optional LUKS encryption for additional confidentiality. Note that LUKS encryption alone does not | ||
provide authentication or integrity protection. A LUKS encrypted partition shall be protected by signed | ||
`dm-verity`. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is there anything actually implementing building such images? And how do they get around the problem of the LUKS header being updated and invalidating the verity hashes?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is there anything actually implementing building such images?
Not a one-stop shop. I currently create them by a script that makes use of veritysetup + cryptsetup.
I guess the right place to implement that would be systemd-repart
. repart
currently only supports creating DDIs with verity protection.
And how do they get around the problem of the LUKS header being updated and invalidating the verity hashes?
In this case, LUKS operates on the read-only target provided by dm-verity. Consequently, there is no way for LUKS to update any headers.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Not a one-stop shop. I currently create them by a script that makes use of veritysetup + cryptsetup.
Before being added to a specification there should be at least one common implementation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
What would be the right thing to do? Reopen or put it on draft until the repart implementation is done?
specs/discoverable_disk_image.md
Outdated
allows optional LUKS encryption for additional confidentiality. Note that LUKS encryption alone does not | ||
provide authentication or integrity protection. A LUKS encrypted partition shall be protected by signed |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is this true though? AEAD is supported in LUKS2 (though experimental) and that does provide integrity and authentication?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
A LUKS encrypted partition shall be protected by signed
fwiw, do we care about RFC2119? "shall" denotes an absolute requirement and that seems like a strong word?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
yes
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I added a reference to LUKS2 AE as a footnote, as it's still experimental.
70893f1
to
b94091e
Compare
Add note clarifying LUKS encryption vs dm-verity protection to inform users not to confuse confidentiality with integrity and authenticity. Addresses systemd/systemd#38854 (comment)
b94091e
to
7373883
Compare
so thing about the combination of dm-crypt + dm-verity is that right now the most prominent implementations of DDIs, i.e. systemd's, doesn't support it. I am always reluctant to merge specs without code somewhere that implements it. After all, I am not entirely sure which of the two should be on top of the other, and my guess is thta we'd learn once we actually implement this. (my guess is dm-verity should envelope dm-crypt, not vice versa) |
Add note clarifying LUKS encryption vs dm-verity protection to inform users not to confuse confidentiality with integrity and authenticity.
Addresses systemd/systemd#38854 (comment)