Comment by dangero

Comment by dangero a day ago

8 replies

Depends on the use case. If boot requires a password, the computer can never lose power or be rebooted without human presence. That’s not always practical.

teddyh 19 hours ago

You can reboot your full-disk-encryption server while you sleep. Obligatory plug: <https://www.recompile.se/mandos>

Disclosure: I am a co-author of Mandos.

  • prennert 18 hours ago

    Has this solution been audited? In particular, is it safe to replay attacks by actors listening in to the network traffic?

    Also from the diagram it looks like the secret key is stored unencrypted on the server, or do I read it wrong?

    • teddyh 17 hours ago

      > Has this solution been audited?

      Only insofar as everybody that I’ve asked over the years has failed to find anything wrong with it. But no formal verification has been done.

      > In particular, is it safe to replay attacks by actors listening in to the network traffic?

      Yes, it is safe, since we make sure to only use TLS with PFS.

      > Also from the diagram it looks like the secret key is stored unencrypted on the server, or do I read it wrong?

      No, the secret is stored encrypted on the server, encrypted with a key which only the client ever has.

      For more information, see the introduction and FAQ: <https://www.recompile.se/mandos/man/intro.8mandos>

      • [removed] 16 hours ago
        [deleted]
  • gerdesj 15 hours ago

    Thank you for this. I will almost certainly be deploying that.

prmoustache a day ago

That is what remote kvm are for and if you do that on commodity hardware you can start a tiny ssh server starting up from an initrd. Having said that an attacker with local access could change the initrd without your knowledge so that it logs the password you enter so it is not necessarily the most secure solution.

  • deno 20 hours ago

    You’ve answered it yourself. Without TPM you have no idea if you can provide the secret to the system or if it’s compromised. Whether that secret comes from TPM or network is secondary.