-
Notifications
You must be signed in to change notification settings - Fork 247
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support for encrypted luks volumes #577
Comments
Comment by @crawford We just whiteboarded this out and have an idea for a first pass. The Ignition config specifies the URL to a secret-serving endpoint which will create and provide the secret used for decryption (unique on machine-id and device path). Ignition will then save this URL to somewhere stateful and create the LUKS device. On all boots, a service in the initramfs will check for the existence of this URL and, if present, start networking, fetch the secret, and decrypt the volume. Other ideas included:
|
Comment by @brianredbeard In addition one should also be able to specify that swap should generate a |
Comment by @crawford We probably also want to support the simple case of a user specifying a key in the Ignition config. |
Comment by @mjg59 Ok I think I have a decent amount of this implemented, so let's figure out what the format should look like. What I have right now is:
Should the TLS stuff be pushed into a substructure? Should Key be Secret? |
Comment by @coresolve Bumping this issue. |
Comment by @coresolve I think it would serve us well to have a documented way to support luks encryption. This would help the pci compliance story and push our overall security story a bit further. |
Comment by @lals1 Guys any idea when LUKS support will be added to coreOS? Or is there any workaround to enable the support? |
Comment by @crawford @lals1 This isn't a priority for us right now. We are hoping to make some progress in the next few months. It would be helpful to know how your existing environment gets secrets to the machines for decryption (e.g. a network key server, a peripheral, an intern with a crash cart). |
Comment by @lals1 Sorry for delayed response. Currently, we are getting the secret either from TPM at initramfs boot stage or from USB to decrypt the drive. CoreOS container Linux version 1465.6.0 seems to contain cryptsetup binary. Do you think is it possible to encrypt the root partition with manual passphrase input for decryption after coreOS is installed? Any help will be appreciated. |
Comment by @lals1 @crawford TPM setup is similar to below project where we have TPM SRK setup with default values (all 0's) and then randomly generated key added to LUKS and also sealed in TPM. |
Also asked for this in https://discussion.fedoraproject.org/t/full-disk-encryption-fde-for-coreos/994/. |
Would be good to integrate Tang/Clevis network bound disk encryption as part of ignition options |
Changed issue name to be more precise. @sghosh151 do you have specific use cases you want to enable? cc @lucab since he did some related work with LUKS Also worth looking at #515 |
On premise baremetal deployments. Moving servers or disks to a different network or tang server will disable automated decryption. |
BTW see also the issue that linked to this one here: coreos/fedora-coreos-tracker#287 |
May I ask what the status of this issue is? |
Any update on luks? |
The initial implementation has been merged in #960 I've gone ahead and created a new label component/luks for tracking issues, enhancements, etc. For FCOS users we still have a bit of work left before it starts making it's way into the images (coreos/fedora-coreos-config#503 & a new Ignition release). Going to close this issue out. |
coreos/fedora-coreos-config#503 has been merged, too now. |
Ah okay, checking the releases (v2.6.0 is latest) it mentions LUKS a few times already. So only LUKS support for the root file system (see coreos/fedora-coreos-config#503) was missing? |
Yes, all the pieces are in and should make it into the next set of releases. But note that it's still experimental. |
Issue by @crawford
Issue Report
Feature Request
Environment
All
Desired Feature
Ignition should be able to create LUKS devices which can then be used to back filesystems. This is needed for anyone who wants to encrypt their root filesystem.
I'm not sure where the decryption secrets come from just yet. (/cc @brianredbeard @mjg59)
I think the config structure would look something like this:
We still have to figure out how to make the initramfs automatically open the LUKS devices before attempting to mount ROOT.
The text was updated successfully, but these errors were encountered: