Both OS detected but not Mint in LUKS partition not able to re-add to grub #boot #dualboot #grub2 #encryption #luks
Ubuntu 24.04 can't update-initramfs: Generating /boot/initrd.img-6.11.0-19-generic after sudo apt update #luks #initramfs #dmcrypt
Install Ubuntu with custom encrypted root and swap partitions #partitioning #systeminstallation #luks
Cool! Erzähl mal, wie sieht das System aus? Welche Distro, was für Sicherheitsanpassungen, Software?
Gibt es #RemoteManagement, #Ansible etc?
Wie sehen nutzeraccounts aus? Separater adminuser?
Wie kommt da Software rauf, aus welchen Quellen? Wie abgesichert?
#Antivirus? Andere Sicherheitssoftware?
#LUKS? Was für Vorgaben?
Finde das Thema super interessant und beschäftige mich viel mit Wartung, und wie es besser und sicherer sein könnte.
I managed to create an #encrypted #Linux #Filesystem on a #USBStick. The reason I wanted this is that I want to back up some directories, which contain secure information and also #NTFS, the one that comes on most drives, doesn’t know how to handle #SymbolicLinks properly. I don’t need or want to share the stick with any non-Linux machines.
TPM и Secure boot это полурак полухуй на десктопах
TPM более менее надёжно может защищать с PIN, но и тут есть проблемы, хер разбери у тебя на плате китайский камущек сделанный джунхуем за три копейки без защиты от tampering или что то реально рабочее, шифровуются ли линии - непонятно, куча нюансов, Проще тупо включить argon в luks и быть уверенным что так оно за себя постоит.
А Secure Boot, в каких случаях он хоть что то полезное делает вообще? Ядро повреждено вирусней и так вы в безопасности? Так тогда это уже пиздец и с компа уже все унесли.
Хрень это все вообщем, microsoft как обычно шизы
#linux #tpm #secure_boot #opsec #luks
#dailyreport #gentoo #linux #administration #security
#encryption #privacy #luks #dracut
I began to install Gentoo GNU/Linux on my new Laptop.
I use USB stick with encrypted password and boot
partition that unlock main SSD partition and boot. I use
BTRFS filesystem with submodules on LUKS2 encrypted
partition with deattached header. Partition looks like
not formatted, totally hidden.
Here is the first steps that you should do before
configuring Linux kernel for custom build:
- install usbutils pciutils
- lspci -k > lspci_installcd
- lsusb > lsusb_installcd
- lsmod > lsmod_installcd
- dmesg > dmesg_installcd
- cp /proc/config.gz livecd-config.gz
- zgrep CONFIG_ livecd-config.gz
- lscpu
My principles:
- Don't connect machines to each other, first steps
should be most careful.
- Don't put hard disk with different OS at the same time
in a single machine.
- Main password should not be visible and located at
working machine.
#Cifrar archivos, como última opción: consejos para no perder #información valiosa
I just installed Arch manually, but now it fails to boot. It only asks to unlock nvme1n1p1, but not the root, leading to a "failed to find root" error.
fstab seems correct. I suspect the issue is in crypttab.
Does anyone know a good blog post or guide to set it up correctly? I feel like I’m close to solving this.
#ArchLinux #Btrfs #LVM #LUKS #Linux
1/2
@agu 1,2kg is a pretty steep target, but feasible unless you want a 15" 4k monster with dedicaded GPU.
I'd recommend to use either #LUKS-encrypted #btrfs or #VeraCrypt-encrypted #ext4 for portable storage...
Mein Backup der wichtigsten Sachen habe ich immer dabei – auf einem USB-Stick am Schlüsselbund. Der ist natürlich verschlüsselt, damit im schlimmsten Fall die Daten nicht in falsche Hände geraten. Hier mal ein sehr einfacher Weg, einen Stick oder eine externe SSD/Festplatte unter #Linux zu verschlüsseln:
Nach vielen Stunden habe ich endlich eine #debian Installation mit #btrfs und #luks hinbekommen, nun ist das wlan deaktiviert und ich bekomme es nicht an. Was für eine shit show!
Eigentlich hatte ich auf eine #hyprland Installation gehofft, wo das plugin system funktioniert - im Gegensatz zu #opensuse ..
Okay, this is hella weird…
For quite some time now my Plymouth boot splash has not been showing text prompts when asking for my LUKS passphrase ("Please enter passphrase for device …"). Just the box to type it into.
I've been looking into this again and turns out apparently Plymouth doesn't know which font to choose for the prompt so it just shows… nothing?
I checked and sure enough, the font the Plymouth theme requests is in the initramfs with a generic file name. Logs show me that it's looking for fc-match
, which isn't in the initramfs.
Checking with the downstream Arch issue tracker and upstream, a bug was fixed that prevented display of messages because some assumptions about fc-match
were false and the fallback should work again.
Except it doesn't for me and I can't figure out what the issue is.
So, checking Arch Wiki again, it says that I can tell Plymouth to use SimpleDRM and… now the prompt is back?! Even if I include fc-match
in the initramfs it won't work.
And the boot splash is now 5x as large.
I'm so confused…
@platymew An alternative is to use passphrase files or TPM key storage for LUKS autounlocking during boot, then give ZFS the mapped/opened LUKS devices as underlying pool storage. Depending on your use case, this may be perfectly sufficient. For example, it allows for easy rapid decommissioning of drives.
For the general question of whether ZFS can operate on top of LUKS, the simple answer IMO is an unqualified yes. The complexity shows up in secure unlocking.
In one of your recent stream VODs, @tomlawrence, someone asked, whether they could run #ZFS on #LUKS - i can answer that; YES*, with an *asterisk.
I did this for quite some time, until i've decided that it's rather inconvenient to type in my password on every reboot. Now, i'm running LUKS on ZVOLs, in #Ubuntu / #qemu / #libvirt.
It's a small home server, and i need a few "privacy insensitive" VMs to auto-start after power-fail.
All one needs is a block dev, zpool create, done! …technically
"What makes this attack particularly concerning is its practicality in real-world scenarios. Unlike previous attacks against full-disk encryption requiring precise file location knowledge, CrashXTS succeeds through controlled randomization of encrypted data."
Benutzt die #Verschlüsselung unter #Linux nicht auch #XTS?
#AES #LUKS
https://www.cyberkendra.com/2025/01/microsoft-patches-critical-bitlocker.html
#Astuce Solus + LUKS
Sous Solus, si vous saisissez votre mot de passe LUKS en AZERTY lors de l'installation, au premier démarrage, le clavier sera en QWERTY pour le déverrouillage ! Préparez-vous à une petite gymnastique des doigts pour taper votre mot de passe. Cela n'arrive qu'au premier démarrage !