Originally posted by Anux
View Post
Announcement
Collapse
No announcement yet.
Ubuntu 23.10 Adding Experimental TPM-Backed Full Disk Encryption
Collapse
X
-
Originally posted by archkde View Post
TPM is mostly an availability risk, i.e. you won't be able to read your data if something goes wrong.
- Likes 7
Comment
-
Originally posted by Jakobson View Post
TPM does not compromise full-disk encryption. Instead, it serves as an additional layer that binds the master key of the disk to the TPM hardware, making offline decryption more challenging. Naturally, a passphrase must still be required.
But you could just not use TPM and have your classical "password in brain thingy" without loosing security. TPM saves the key on the very hardware it should protect, which means the key gets stolen with the hardware. In case you missed Shnatsels second link, that is compromisable. And it's a closed source black box, so you have to trust companys like Intel or AMD that are famous for horrible hardware vulnerabilitys.
If you want to protect yourself from normal thiefs and police, classic LUKS is more than enough. Else I would like to see the POC brutforce attack on LUKS with argon2id.
Edit: running half of Amazons AWS hardware for a few years at full throttle seems a pretty steep price burdon to meLast edited by Anux; 07 September 2023, 05:28 PM.
- Likes 2
Comment
-
-
Originally posted by Anux View PostI didn't know it works that way. So TPM just decrypts a LUKS header and than you decrypt the LUKS container with a password?
- Likes 1
Comment
-
Originally posted by Anux View PostI didn't know it works that way. So TPM just decrypts a LUKS header and than you decrypt the LUKS container with a password?
- Likes 1
Comment
-
Originally posted by petronio View Post
It's still a separate LUKS key (like adding another password), the TPM spec just allows requiring a pin in addition to the usual PCR validation. When setting it up you can do it either with or without pin. TPMs also have lockout periods to protect against brute forcing.
Originally posted by Jakobson View PostMany users tend to employ TPM as the primary factor, with a password as a secondary option in a separate LUKS slot for backup purposes.
I don't see how this adds any security, what keeps an attacker from just taking the disk and brutforcing the backup keyslot?
For heightened security, the best practice is to combine both the TPM and a password for authentication.
As long as the LUKS header is not encrypted there is no added security, even with 100 password promts.
- Likes 1
Comment
-
Originally posted by Anux View Post
First: If you don't have backups, your data was not important.
Second: See Shnatsels link, looks very much available to me.
Comment
-
Originally posted by Anux View Post
First: If you don't have backups, your data was not important.
Second: See Shnatsels link, looks very much available to me.
- Likes 1
Comment
-
Originally posted by partcyborg View PostIf you read to the bottom of the article and click on the hackernews link, the first comment explains that his approach only works on bitlocker because it doesn't setup an encrypted tpm session. The linux implementations all do
It is more a security by obscurity approach and I don't like that, although there might be scenarios where it adds security at least in the short term.
- Likes 2
Comment
Comment