bolha.us is one of the many independent Mastodon servers you can use to participate in the fediverse.
We're a Brazilian IT Community. We love IT/DevOps/Cloud, but we also love to talk about life, the universe, and more. | Nós somos uma comunidade de TI Brasileira, gostamos de Dev/DevOps/Cloud e mais!

Server stats:

252
active users

#luks

0 posts0 participants0 posts today
Replied in thread

@jze

Cool! Erzähl mal, wie sieht das System aus? Welche Distro, was für Sicherheitsanpassungen, Software?

Gibt es #RemoteManagement, #Ansible etc?

Wie sehen nutzeraccounts aus? Separater adminuser?

Wie kommt da Software rauf, aus welchen Quellen? Wie abgesichert?

#Antivirus? Andere Sicherheitssoftware?

#LUKS? Was für Vorgaben?

Finde das Thema super interessant und beschäftige mich viel mit Wartung, und wie es besser und sicherer sein könnte.

TPM и Secure boot это полурак полухуй на десктопах

TPM более менее надёжно может защищать с PIN, но и тут есть проблемы, хер разбери у тебя на плате китайский камущек сделанный джунхуем за три копейки без защиты от tampering или что то реально рабочее, шифровуются ли линии - непонятно, куча нюансов, Проще тупо включить argon в luks и быть уверенным что так оно за себя постоит.

А Secure Boot, в каких случаях он хоть что то полезное делает вообще? Ядро повреждено вирусней и так вы в безопасности? Так тогда это уже пиздец и с компа уже все унесли.

Хрень это все вообщем, microsoft как обычно шизы
#linux #tpm #secure_boot #opsec #luks

It would be great if Cryptomator some day becomes Wayland native.

Currently it only supports Xorg and that hasn't got the security I need.

So for now I will continue to create LUKS vaults and upload them to the cloud.
One downside is that I have to decide the size of the vault beforehand.
Another downside is that I can only open the vault on Linux.

But I'm pretty confident in the security it provides.

#Cryptomator #LUKS #Linux #Security #Encryption #CloudStorage. #Vault #Wayland #Xorg

#dailyreport #gentoo #linux #administration #security
#encryption #privacy #luks #dracut
I began to install Gentoo GNU/Linux on my new Laptop.

I use USB stick with encrypted password and boot
partition that unlock main SSD partition and boot. I use
BTRFS filesystem with submodules on LUKS2 encrypted
partition with deattached header. Partition looks like
not formatted, totally hidden.

Here is the first steps that you should do before
configuring Linux kernel for custom build:
- install usbutils pciutils
- lspci -k > lspci_installcd
- lsusb > lsusb_installcd
- lsmod > lsmod_installcd
- dmesg > dmesg_installcd
- cp /proc/config.gz livecd-config.gz
- zgrep CONFIG_ livecd-config.gz
- lscpu

My principles:
- Don't connect machines to each other, first steps
should be most careful.
- Don't put hard disk with different OS at the same time
in a single machine.
- Main password should not be visible and located at
working machine.

I just installed Arch manually, but now it fails to boot. It only asks to unlock nvme1n1p1, but not the root, leading to a "failed to find root" error.

fstab seems correct. I suspect the issue is in crypttab.
Does anyone know a good blog post or guide to set it up correctly? I feel like I’m close to solving this.

#ArchLinux #Btrfs #LVM #LUKS #Linux

1/2

Mein Backup der wichtigsten Sachen habe ich immer dabei – auf einem USB-Stick am Schlüsselbund. Der ist natürlich verschlüsselt, damit im schlimmsten Fall die Daten nicht in falsche Hände geraten. Hier mal ein sehr einfacher Weg, einen Stick oder eine externe SSD/Festplatte unter #Linux zu verschlüsseln:

youtu.be/bsKOfxbVnjo

#linux #dm-crypt #luks

youtu.be- YouTubeEnjoy the videos and music you love, upload original content, and share it all with friends, family, and the world on YouTube.

Okay, this is hella weird…

For quite some time now my Plymouth boot splash has not been showing text prompts when asking for my LUKS passphrase ("Please enter passphrase for device …"). Just the box to type it into.

I've been looking into this again and turns out apparently Plymouth doesn't know which font to choose for the prompt so it just shows… nothing?

I checked and sure enough, the font the Plymouth theme requests is in the initramfs with a generic file name. Logs show me that it's looking for fc-match, which isn't in the initramfs.

Checking with the downstream Arch issue tracker and upstream, a bug was fixed that prevented display of messages because some assumptions about fc-match were false and the fallback should work again.

Except it doesn't for me and I can't figure out what the issue is.

So, checking Arch Wiki again, it says that I can tell Plymouth to use SimpleDRM and… now the prompt is back?! Even if I include fc-match in the initramfs it won't work.

And the boot splash is now 5x as large.

I'm so confused…

GitLabpassword prompt display is broken in 24.004.60 (#2) · Issues · Arch Linux / Packaging / Packages / plymouth · GitLab Description: Since version 24.004.60, the password prompt text (the message "Please enter passphrase for disk ...:" in the screenshots) is no...
#Linux#LUKS#Arch
Replied to Multi Purr Puss :verified:

@platymew An alternative is to use passphrase files or TPM key storage for LUKS autounlocking during boot, then give ZFS the mapped/opened LUKS devices as underlying pool storage. Depending on your use case, this may be perfectly sufficient. For example, it allows for easy rapid decommissioning of drives.

For the general question of whether ZFS can operate on top of LUKS, the simple answer IMO is an unqualified yes. The complexity shows up in secure unlocking.

@tomlawrence

In one of your recent stream VODs, @tomlawrence, someone asked, whether they could run #ZFS on #LUKS - i can answer that; YES*, with an *asterisk.

I did this for quite some time, until i've decided that it's rather inconvenient to type in my password on every reboot. Now, i'm running LUKS on ZVOLs, in #Ubuntu / #qemu / #libvirt.

It's a small home server, and i need a few "privacy insensitive" VMs to auto-start after power-fail.

All one needs is a block dev, zpool create, done! 😉 …technically

"What makes this attack particularly concerning is its practicality in real-world scenarios. Unlike previous attacks against full-disk encryption requiring precise file location knowledge, CrashXTS succeeds through controlled randomization of encrypted data."

Benutzt die #Verschlüsselung unter #Linux nicht auch #XTS?

#AES #LUKS
cyberkendra.com/2025/01/micros

Cyber KendraMicrosoft Patches Critical BitLocker Vulnerability Enabling Data Extraction

⚠️ #Astuce Solus + LUKS ⚠️

Sous Solus, si vous saisissez votre mot de passe LUKS en AZERTY lors de l'installation, au premier démarrage, le clavier sera en QWERTY pour le déverrouillage ! ⌨️Préparez-vous à une petite gymnastique des doigts pour taper votre mot de passe. Cela n'arrive qu'au premier démarrage ! 😅

#Solus#getsol#LUKS