Questions tagged [luks]
LUKS (Linux Unified Key Setup) is a disk-encryption specification.
157 questions
5 votes
1 answer
795 views
Can you bypass PIN requirement of FIDO token protected LUKS device with hex editor?
I noticed that with Linux pam-u2f module whether you are required to input your PIN can be changed by simply editing ~/.config/Yubico/u2f_keys file and either adding +pin to your configuration line or ...
0 votes
0 answers
113 views
luks2john not working with my sha256 LUKS settings
I'm trying to attack LUKS header for an assignment. I have to use john and I need to crack the sha256 hash. I made a virtual partition using dd to simulate a storage device on Kali. I encrypted it ...
12 votes
3 answers
4k views
Why shred before LUKS disk encryption?
I read the following article and it says to "Stuff random data to the device" (using shred) before encrypting with LUKS. How to enable LUKS disk encryption with keyfile on Linux Why would ...
1 vote
1 answer
203 views
FIDO2 Yubikey, systemd-cryptenroll Options - Differences of --fido2-with-client-pin --fido2-with-user-presence --fido2-with-user-verification
I added a FIDO2 token to my encrypted root parition with systemd-cryptenroll <DISK> --fido2-with-client-pin=true \ --fido2-with-user-presence \ --fido2-device=auto The tool has three ...
2 votes
3 answers
1k views
Clarifying BitLocker Full Disk Encryption and the role of TPM
Question 1: Can you confirm that in a full disk encryption setup like BitLocker, when we normally boot the system, use the password, and log in, the key to decrypt the disk is loaded into RAM? If so, ...
3 votes
1 answer
810 views
Any information on the encrypted Knoppix user data file system (knoppix-data.aes)?
I remember about 90% of my password used for encrypting the persistent user data file system (stored as knoppix-data.aes) while setting up Knoppix a few years ago and would now like to explore the ...
2 votes
1 answer
791 views
Recovering LUKS Encrypted Data
Its a tale as old as full-disk encryption. Another victim of complicated passwords succumbs to LUKS on the Linux system. I recently changed my LUKS encrypted drive password on a laptop, but my laptop ...
5 votes
0 answers
150 views
Is it possible to know when my TPM was last used to decrypt my disk?
I use Linux on my laptop and I do Full Disk Encryption with the LUKS keys enrolled into TPM2 against proper PCRs to make sure firmware, UEFI and Secure Boot setup are in a known-good state. ...
0 votes
1 answer
307 views
luks increase delays between password attempts
From what I understand, argon provides a delay between password attempts. Does luks allow increasing or reducing the delay?
3 votes
2 answers
3k views
LUKS: How many iterations are enough?
The luksFormat command accepts iteration time as a parameter, not iterations. That obviously leads to quite different number of iterations depending on the hardware doing the encryption. However if ...
1 vote
1 answer
441 views
Using TPM to unlock LUKS/dm-crypt volume
I am trying to understand the risks of configuring passwordless decryption via TPM of a LUKS/dm-crypt system with something like: systemd-cryptenroll --tpm2-device=auto --tpm2-pcrs=0+1+2+3+4+5+7+8 /...
0 votes
1 answer
151 views
Is deploying a web application to a customer's encrypted drive a secure solution against code theft?
I have developed a web service for customer. The web service is written in Python and running in Docker containers. It is managed by docker compose. The customer wants my web service to run on their ...
1 vote
1 answer
1k views
How does a TPM module protect keys LUKS keys on Linux
I'm looking into hardening an embedded device using TPM2 with an encrypted root (/) Linux partition. I've found various articles explaining how to embed LUKS keys into the TPM (eg this one). Unless ...
0 votes
1 answer
1k views
LUKS brute force risk?
If a person finds an old hard drive that was partially overwritten and let's say 1GB of that wasn't and was formerly used for part of a LUKS encrypted partition, what is the risk that such data, which ...
1 vote
1 answer
345 views
Remote Laptop disk encryption, break glass
I am stuck with an issue of needing a break glass account on remote laptops. It's a bit a strange situation. The laptops are built and rebuilt remotely using a small PXE setup that goes with the ...