crypt_reboot 0.2.0 → 0.3.0.beta.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: ee0a1d8c466f902cc47c84b3310c899046ae2d2cacc952f184baa76463add807
4
- data.tar.gz: 6fc17834b241d0822848b84e36fa2277b47a998c77659740a82d0e49d83a16e6
3
+ metadata.gz: 01bc4b369ba12b4f4197e8935a0b89a2e6f4a95af950e3e1eb048a389ef7672e
4
+ data.tar.gz: 98e360717e15344ae14d41dd9557101c833efa75bcfcd01426096015a7faa2b4
5
5
  SHA512:
6
- metadata.gz: 030a74f06349d21c91b05a7ac297ffb927309faad863689a8cd632521587e47059c38995b377e199e5337819f447999796f65aa6dfa17345f7aaca0821458a23
7
- data.tar.gz: 2f16596ee0b871ecec49b9687da65d3086c66daa41b48e3090d43317452755752443996f5ef5887ac4a73f50f31bd4307ab08254b2869e3219970117ddfcbeee
6
+ metadata.gz: 19d4fe5d9a715a8cc8e6f55bea983f3a676b2af1f17fe4705cb68122e90b17ac378da756bb3f1dadcd02df75f578c89105c84b654d6dc5e6837a0eedc6efba9c
7
+ data.tar.gz: 9d9010da9c9177229345ce804491593aaa4336bdeda5e92becc268035b539f4387b6b89f0e2b13d769d4a8b6e932981fa9e2b4e1085da65b5c177166e15bf437
data/CHANGELOG.md CHANGED
@@ -1,3 +1,16 @@
1
+ ## [0.3.0.beta.1] - 2024-09-26
2
+
3
+ - Add preliminary support for LUKS-keystore-based ZFS encryption implemented by Ubuntu
4
+
5
+ ## [0.2.1] - 2023-11-12
6
+
7
+ - Use new MemoryLocker without a need for FFI compilation step
8
+
9
+ ## [0.2.0] - 2023-07-29
10
+
11
+ - Make memory locking optional with `--insecure-memory` command line option
12
+ - Remove FFI gem dependency
13
+
1
14
  ## [0.1.2] - 2023-07-22
2
15
 
3
16
  - Lock memory to prevent secrets leaking to swap
data/README.md CHANGED
@@ -7,7 +7,8 @@ Convenient reboot for Linux systems with encrypted root partition.
7
7
  > Just type `cryptreboot` instead of `reboot`.
8
8
 
9
9
  It asks for a passphrase and reboots the system afterward, automatically
10
- unlocking the drive on startup using in-memory initramfs patching and kexec.
10
+ unlocking the drive on startup using
11
+ [in-memory initramfs patching and kexec](https://blog.pawelpokrywka.com/p/rebooting-linux-with-encrypted-disk).
11
12
  Without explicit consent, no secrets are stored on disk, even temporarily.
12
13
 
13
14
  Useful when unlocking the drive at startup is difficult, such as on headless
@@ -36,12 +37,19 @@ Following distributions were tested by the author on the AMD64 machine:
36
37
  - Ubuntu 22.04 LTS
37
38
  - Ubuntu 20.04 LTS needs tiny adjustments to system settings,
38
39
  specifically [changing compression](#lz4-initramfs-compression) and
39
- [fixing systemd kexec support](#staged-kernel-not-being-executed-by-systemd)
40
+ [fixing systemd kexec support](#staged-kernel-not-being-executed-by-systemd), but still
41
+ [sometimes](#unable-to-kexec-on-reboot-using-old-systemd) reboot experience may be suboptimal
40
42
  - ~~Ubuntu 18.04 LTS~~ is not supported (initramfs uses *pre-crypttab* format)
41
43
 
42
44
  If you have successfully run cryptreboot on another distribution,
43
45
  please contact me and I will update the list.
44
46
 
47
+ ## Disk encryption method
48
+
49
+ Currently, only LUKS-based disk-encryption is supported.
50
+ If you use ZFS native encryption, cryptreboot will [downgrade](https://github.com/phantom-node/cryptreboot/issues/2)
51
+ to standard reboot (using kexec).
52
+
45
53
  ## Requirements
46
54
 
47
55
  You need to ensure those are installed:
@@ -65,14 +73,6 @@ If you use Debian-based distribution, use this command to install required packa
65
73
  When asked if kexec should handle reboots, answer `yes` (however the answer probably
66
74
  doesn't matter for cryptreboot to work).
67
75
 
68
- ## Recommendations
69
-
70
- To protects against saving sensitive data (passphrase, encryption keys) to swap space on a disk, it is recommended to use `memory_locker` ([Rubygems](https://rubygems.org/gems/memory_locker), [Github](https://github.com/phantom-node/memory_locker)).
71
-
72
- $ sudo gem install memory_locker
73
-
74
- If you don't want to install it, you will have to specify `--insecure-memory` flag when running cryptreboot.
75
-
76
76
  ## Installation
77
77
 
78
78
  Make sure the required software is installed, then install the gem system-wide by executing:
@@ -180,12 +180,34 @@ If you get:
180
180
 
181
181
  it means there was an error while locking memory to prevent a risk of sensitive data ending in a swap space.
182
182
 
183
- The best solution is to install `memory_locker` (see [requirements](#requirements) section).
184
- If it still doesn't help, make sure you have permission to lock memory. Root users do.
185
- If the problem persists, then please report a bug describing your setup.
183
+ Make sure you have permission to lock memory. Root users have.
184
+ If permissions are ok, then please report a bug describing your setup.
186
185
 
187
186
  The solution of last resort is to use `--insecure-memory` flag, which disables memory locking completely.
188
187
 
188
+ ### Unable to kexec on reboot using old systemd
189
+
190
+ Ubuntu 20.04 ships with `systemd` which may fall back to standard reboot instead of using `kexec`, because this utility
191
+ is located on a filesystem being unmounted during the shutdown sequence.
192
+
193
+ As a result, using cryptreboot would feel like using normal reboot.
194
+
195
+ To tell if your system is affected, you have to check messages printed to the console after you run cryptreboot.
196
+ This message happens just before reboot, so you will have just a few milliseconds to notice it on screen:
197
+
198
+ > shutdown[1]: (sd-kexec) failed with exit status 1
199
+
200
+ [There is a fix](https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1969365) waiting to be included in
201
+ a stable release update to `systemd` since 2023-07-21.
202
+
203
+ In the meantime, as a workaround, you can use `kexec` directly. **Warning: it will skip the standard shutdown procedure. Filesystems won't be unmounted, services won't be stopped, etc. It is like hitting `reset` button**.
204
+ However, when you use a decent filesystem with journalling the risk of things going bad should not be high.
205
+
206
+ Given the above warning, to reboot skipping the shutdown procedure, run:
207
+
208
+ $ sudo cryptreboot -p
209
+ $ sudo kexec -e # will skip proper shutdown sequence
210
+
189
211
  ## Development
190
212
 
191
213
  After checking out the repo, run `bundle install` to install
data/lib/basic_loader.rb CHANGED
@@ -31,6 +31,7 @@ require 'crypt_reboot/crypt_tab/entry_serializer'
31
31
  require 'crypt_reboot/crypt_tab/keyfile_locator'
32
32
  require 'crypt_reboot/crypt_tab/luks_to_plain_converter'
33
33
  require 'crypt_reboot/crypt_tab/serializer'
34
+ require 'crypt_reboot/crypt_tab/zfs_keystore_entries_generator'
34
35
  require 'crypt_reboot/initramfs/archiver'
35
36
  require 'crypt_reboot/initramfs/decompressor'
36
37
  require 'crypt_reboot/initramfs/extractor'
@@ -4,7 +4,7 @@ module CryptReboot
4
4
  module CryptTab
5
5
  # Load crypttab file and return array with deserialized entries
6
6
  class Deserializer
7
- def call(filename = nil, content: File.read(filename))
7
+ def call(filename = nil, content: read_tolerate_missing(filename))
8
8
  split_to_important_lines(content).map do |line|
9
9
  entry_deserializer.call line
10
10
  end
@@ -12,6 +12,12 @@ module CryptReboot
12
12
 
13
13
  private
14
14
 
15
+ def read_tolerate_missing(filename)
16
+ File.read(filename)
17
+ rescue Errno::ENOENT
18
+ ''
19
+ end
20
+
15
21
  def split_to_important_lines(content)
16
22
  content.split(/\n+|\r+/)
17
23
  .reject(&:empty?)
@@ -0,0 +1,34 @@
1
+ # frozen_string_literal: true
2
+
3
+ module CryptReboot
4
+ module CryptTab
5
+ # Get a list of keystore zvols from a running system and return entries array
6
+ class ZfsKeystoreEntriesGenerator
7
+ def call
8
+ glob = File.join(zvol_dir, '**/*')
9
+ Dir.glob(glob)
10
+ .select { |path| path =~ %r{/keystore$} && exist?(path) }
11
+ .map { |path| generate_entry(path) }
12
+ end
13
+
14
+ private
15
+
16
+ def exist?(path)
17
+ File.exist? File.realpath(path)
18
+ end
19
+
20
+ def generate_entry(path)
21
+ pool = File.basename File.dirname(path)
22
+ target = "keystore-#{pool}"
23
+ entry_class.new target: target, source: path, key_file: 'none', options: {}, flags: %i[luks discard]
24
+ end
25
+
26
+ attr_reader :zvol_dir, :entry_class
27
+
28
+ def initialize(zvol_dir: '/dev/zvol', entry_class: Entry)
29
+ @zvol_dir = zvol_dir
30
+ @entry_class = entry_class
31
+ end
32
+ end
33
+ end
34
+ end
@@ -1,5 +1,7 @@
1
1
  # frozen_string_literal: true
2
2
 
3
+ require 'memory_locker' unless defined? MemoryLocker # MemoryLocker is mocked in tests
4
+
3
5
  module CryptReboot
4
6
  # Try to lock memory if configuration allows it
5
7
  class ElasticMemoryLocker
@@ -8,10 +10,9 @@ module CryptReboot
8
10
  def call
9
11
  return if skip_locking?
10
12
 
11
- loader.call
12
13
  locker.call
13
14
  nil
14
- rescue load_error, locking_error => e
15
+ rescue locking_error => e
15
16
  raise LockingError, 'Failed to lock memory', cause: e
16
17
  end
17
18
 
@@ -21,22 +22,14 @@ module CryptReboot
21
22
  insecure_memory_checker.call
22
23
  end
23
24
 
24
- def locking_error
25
- lazy_locking_error.call
26
- end
27
-
28
- attr_reader :insecure_memory_checker, :loader, :load_error, :locker, :lazy_locking_error
25
+ attr_reader :insecure_memory_checker, :locker, :locking_error
29
26
 
30
27
  def initialize(insecure_memory_checker: LazyConfig.insecure_memory,
31
- loader: -> { require 'memory_locker' },
32
- load_error: LoadError,
33
- locker: -> { MemoryLocker.call },
34
- lazy_locking_error: -> { MemoryLocker::Error })
28
+ locker: MemoryLocker,
29
+ locking_error: MemoryLocker::Error)
35
30
  @insecure_memory_checker = insecure_memory_checker
36
- @loader = loader
37
- @load_error = load_error
38
31
  @locker = locker
39
- @lazy_locking_error = lazy_locking_error
32
+ @locking_error = locking_error
40
33
  end
41
34
  end
42
35
  end
@@ -3,7 +3,7 @@
3
3
  module CryptReboot
4
4
  # Generate a hash with file names as keys and file contents as values
5
5
  class FilesGenerator
6
- def call(entries, base_dir)
6
+ def call(entries, base_dir:, crypttab_path:)
7
7
  files = {}
8
8
  modified_entries = entries.map do |entry|
9
9
  next entry unless luks?(entry, base_dir)
@@ -13,14 +13,11 @@ module CryptReboot
13
13
  files[keyfile] = data.key
14
14
  entry_converter.call(entry, data, keyfile)
15
15
  end
16
- files.merge(CRYPTAB_PATH => serializer.call(modified_entries))
16
+ files.merge(crypttab_path => serializer.call(modified_entries))
17
17
  end
18
18
 
19
19
  private
20
20
 
21
- CRYPTAB_PATH = '/cryptroot/crypttab'
22
- private_constant :CRYPTAB_PATH
23
-
24
21
  def luks?(entry, base_dir)
25
22
  headevice = entry.headevice(header_prefix: base_dir)
26
23
  luks_checker.call(headevice)
@@ -10,7 +10,7 @@ module CryptReboot
10
10
  tmp_maker.call do |dir|
11
11
  logger.call message
12
12
  decompressor.call(filename, dir)
13
- yield dir
13
+ yield File.join(dir, subdir)
14
14
  end
15
15
  end
16
16
 
@@ -20,16 +20,18 @@ module CryptReboot
20
20
  decompressor_factory.call
21
21
  end
22
22
 
23
- attr_reader :tmp_maker, :decompressor_factory, :message, :logger
23
+ attr_reader :tmp_maker, :decompressor_factory, :message, :logger, :subdir
24
24
 
25
25
  def initialize(tmp_maker: Dir.method(:mktmpdir),
26
26
  decompressor_factory: Decompressor.new,
27
27
  message: 'Extracting initramfs... To speed things up, future versions will employ cache.',
28
- logger: ->(msg) { warn msg })
28
+ logger: ->(msg) { warn msg },
29
+ subdir: 'main')
29
30
  @tmp_maker = tmp_maker
30
31
  @decompressor_factory = decompressor_factory
31
32
  @message = message
32
33
  @logger = logger
34
+ @subdir = subdir
33
35
  end
34
36
  end
35
37
  end
@@ -5,24 +5,51 @@ module CryptReboot
5
5
  class InitramfsPatchSqueezer
6
6
  def call(initramfs_path)
7
7
  extractor.call(initramfs_path) do |tmp_dir|
8
- crypttab_path = File.join(tmp_dir, crypttab_relative_path)
9
- crypttab_entries = deserializer.call(crypttab_path)
10
- files_generator.call(crypttab_entries, tmp_dir)
8
+ main_files(tmp_dir).merge zfs_files(tmp_dir)
11
9
  end
12
10
  end
13
11
 
14
12
  private
15
13
 
16
- attr_reader :crypttab_relative_path, :extractor, :deserializer, :files_generator
14
+ def main_files(tmp_dir)
15
+ full_crypttab_path = File.join(tmp_dir, crypttab_path)
16
+ crypttab_entries = crypttab_deserializer.call(full_crypttab_path)
17
+ files_generator.call(crypttab_entries, base_dir: tmp_dir, crypttab_path: crypttab_path)
18
+ end
19
+
20
+ def zfs_files(tmp_dir)
21
+ crypttab_entries = zfs_keystore_entries_generator.call
22
+ return {} if crypttab_entries.empty?
23
+ files = files_generator.call(crypttab_entries, base_dir: tmp_dir, crypttab_path: zfs_crypttab_path)
24
+ script_path = File.join(tmp_dir, zfs_script_path)
25
+ script = File.read(script_path)
26
+ files.merge(zfs_script_path => patch_zfs_script(script))
27
+ end
28
+
29
+ def patch_zfs_script(script)
30
+ patch = "cp #{zfs_crypttab_path} #{crypttab_path}; ${CRYPTROOT}"
31
+ script.sub(/^\s*\${CRYPTROOT}\s*$/, patch)
32
+ end
33
+
34
+ attr_reader :crypttab_path, :zfs_crypttab_path, :zfs_script_path, :extractor,
35
+ :crypttab_deserializer, :zfs_keystore_entries_generator, :files_generator
17
36
 
18
- def initialize(crypttab_relative_path = 'main/cryptroot/crypttab',
37
+ # rubocop:disable Metrics/ParameterLists
38
+ def initialize(crypttab_path = '/cryptroot/crypttab',
39
+ zfs_crypttab_path = '/cryptreboot/zfs_crypttab',
40
+ zfs_script_path = '/scripts/zfs',
19
41
  extractor: Initramfs::Extractor.new,
20
- deserializer: CryptTab::Deserializer.new,
42
+ crypttab_deserializer: CryptTab::Deserializer.new,
43
+ zfs_keystore_entries_generator: CryptTab::ZfsKeystoreEntriesGenerator.new,
21
44
  files_generator: FilesGenerator.new)
22
- @crypttab_relative_path = crypttab_relative_path
45
+ @crypttab_path = crypttab_path
46
+ @zfs_crypttab_path = zfs_crypttab_path
47
+ @zfs_script_path = zfs_script_path
23
48
  @extractor = extractor
24
- @deserializer = deserializer
49
+ @crypttab_deserializer = crypttab_deserializer
50
+ @zfs_keystore_entries_generator = zfs_keystore_entries_generator
25
51
  @files_generator = files_generator
26
52
  end
53
+ # rubocop:enable Metrics/ParameterLists
27
54
  end
28
55
  end
@@ -1,5 +1,5 @@
1
1
  # frozen_string_literal: true
2
2
 
3
3
  module CryptReboot
4
- VERSION = '0.2.0'
4
+ VERSION = '0.3.0.beta.1'
5
5
  end
data/lib/crypt_reboot.rb CHANGED
@@ -7,7 +7,6 @@ rescue LoadError => e
7
7
 
8
8
  require 'zeitwerk'
9
9
  loader = Zeitwerk::Loader.for_gem
10
- loader.ignore("#{__dir__}/memory_locker.rb") # stub has to be loaded manually
11
10
  loader.setup
12
11
  end
13
12
 
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: crypt_reboot
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.2.0
4
+ version: 0.3.0.beta.1
5
5
  platform: ruby
6
6
  authors:
7
7
  - Paweł Pokrywka
8
8
  autorequire:
9
9
  bindir: exe
10
10
  cert_chain: []
11
- date: 2023-07-29 00:00:00.000000000 Z
11
+ date: 2024-09-26 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: tty-command
@@ -38,6 +38,20 @@ dependencies:
38
38
  - - "~>"
39
39
  - !ruby/object:Gem::Version
40
40
  version: '0.3'
41
+ - !ruby/object:Gem::Dependency
42
+ name: memory_locker
43
+ requirement: !ruby/object:Gem::Requirement
44
+ requirements:
45
+ - - "~>"
46
+ - !ruby/object:Gem::Version
47
+ version: 1.0.3
48
+ type: :runtime
49
+ prerelease: false
50
+ version_requirements: !ruby/object:Gem::Requirement
51
+ requirements:
52
+ - - "~>"
53
+ - !ruby/object:Gem::Version
54
+ version: 1.0.3
41
55
  description:
42
56
  email:
43
57
  - pepawel@users.noreply.github.com
@@ -71,6 +85,7 @@ files:
71
85
  - lib/crypt_reboot/crypt_tab/keyfile_locator.rb
72
86
  - lib/crypt_reboot/crypt_tab/luks_to_plain_converter.rb
73
87
  - lib/crypt_reboot/crypt_tab/serializer.rb
88
+ - lib/crypt_reboot/crypt_tab/zfs_keystore_entries_generator.rb
74
89
  - lib/crypt_reboot/elastic_memory_locker.rb
75
90
  - lib/crypt_reboot/files_generator.rb
76
91
  - lib/crypt_reboot/files_writer.rb
@@ -132,7 +147,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
132
147
  - !ruby/object:Gem::Version
133
148
  version: '0'
134
149
  requirements: []
135
- rubygems_version: 3.1.6
150
+ rubygems_version: 3.5.4
136
151
  signing_key:
137
152
  specification_version: 4
138
153
  summary: Linux utility for automatic and secure unlocking of encrypted disks on reboot