crypt_reboot 0.2.0 → 0.3.0.beta.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +13 -0
- data/README.md +35 -13
- data/lib/basic_loader.rb +1 -0
- data/lib/crypt_reboot/crypt_tab/deserializer.rb +7 -1
- data/lib/crypt_reboot/crypt_tab/zfs_keystore_entries_generator.rb +34 -0
- data/lib/crypt_reboot/elastic_memory_locker.rb +7 -14
- data/lib/crypt_reboot/files_generator.rb +2 -5
- data/lib/crypt_reboot/initramfs/extractor.rb +5 -3
- data/lib/crypt_reboot/initramfs_patch_squeezer.rb +35 -8
- data/lib/crypt_reboot/version.rb +1 -1
- data/lib/crypt_reboot.rb +0 -1
- metadata +18 -3
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 01bc4b369ba12b4f4197e8935a0b89a2e6f4a95af950e3e1eb048a389ef7672e
|
4
|
+
data.tar.gz: 98e360717e15344ae14d41dd9557101c833efa75bcfcd01426096015a7faa2b4
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 19d4fe5d9a715a8cc8e6f55bea983f3a676b2af1f17fe4705cb68122e90b17ac378da756bb3f1dadcd02df75f578c89105c84b654d6dc5e6837a0eedc6efba9c
|
7
|
+
data.tar.gz: 9d9010da9c9177229345ce804491593aaa4336bdeda5e92becc268035b539f4387b6b89f0e2b13d769d4a8b6e932981fa9e2b4e1085da65b5c177166e15bf437
|
data/CHANGELOG.md
CHANGED
@@ -1,3 +1,16 @@
|
|
1
|
+
## [0.3.0.beta.1] - 2024-09-26
|
2
|
+
|
3
|
+
- Add preliminary support for LUKS-keystore-based ZFS encryption implemented by Ubuntu
|
4
|
+
|
5
|
+
## [0.2.1] - 2023-11-12
|
6
|
+
|
7
|
+
- Use new MemoryLocker without a need for FFI compilation step
|
8
|
+
|
9
|
+
## [0.2.0] - 2023-07-29
|
10
|
+
|
11
|
+
- Make memory locking optional with `--insecure-memory` command line option
|
12
|
+
- Remove FFI gem dependency
|
13
|
+
|
1
14
|
## [0.1.2] - 2023-07-22
|
2
15
|
|
3
16
|
- Lock memory to prevent secrets leaking to swap
|
data/README.md
CHANGED
@@ -7,7 +7,8 @@ Convenient reboot for Linux systems with encrypted root partition.
|
|
7
7
|
> Just type `cryptreboot` instead of `reboot`.
|
8
8
|
|
9
9
|
It asks for a passphrase and reboots the system afterward, automatically
|
10
|
-
unlocking the drive on startup using
|
10
|
+
unlocking the drive on startup using
|
11
|
+
[in-memory initramfs patching and kexec](https://blog.pawelpokrywka.com/p/rebooting-linux-with-encrypted-disk).
|
11
12
|
Without explicit consent, no secrets are stored on disk, even temporarily.
|
12
13
|
|
13
14
|
Useful when unlocking the drive at startup is difficult, such as on headless
|
@@ -36,12 +37,19 @@ Following distributions were tested by the author on the AMD64 machine:
|
|
36
37
|
- Ubuntu 22.04 LTS
|
37
38
|
- Ubuntu 20.04 LTS needs tiny adjustments to system settings,
|
38
39
|
specifically [changing compression](#lz4-initramfs-compression) and
|
39
|
-
[fixing systemd kexec support](#staged-kernel-not-being-executed-by-systemd)
|
40
|
+
[fixing systemd kexec support](#staged-kernel-not-being-executed-by-systemd), but still
|
41
|
+
[sometimes](#unable-to-kexec-on-reboot-using-old-systemd) reboot experience may be suboptimal
|
40
42
|
- ~~Ubuntu 18.04 LTS~~ is not supported (initramfs uses *pre-crypttab* format)
|
41
43
|
|
42
44
|
If you have successfully run cryptreboot on another distribution,
|
43
45
|
please contact me and I will update the list.
|
44
46
|
|
47
|
+
## Disk encryption method
|
48
|
+
|
49
|
+
Currently, only LUKS-based disk-encryption is supported.
|
50
|
+
If you use ZFS native encryption, cryptreboot will [downgrade](https://github.com/phantom-node/cryptreboot/issues/2)
|
51
|
+
to standard reboot (using kexec).
|
52
|
+
|
45
53
|
## Requirements
|
46
54
|
|
47
55
|
You need to ensure those are installed:
|
@@ -65,14 +73,6 @@ If you use Debian-based distribution, use this command to install required packa
|
|
65
73
|
When asked if kexec should handle reboots, answer `yes` (however the answer probably
|
66
74
|
doesn't matter for cryptreboot to work).
|
67
75
|
|
68
|
-
## Recommendations
|
69
|
-
|
70
|
-
To protects against saving sensitive data (passphrase, encryption keys) to swap space on a disk, it is recommended to use `memory_locker` ([Rubygems](https://rubygems.org/gems/memory_locker), [Github](https://github.com/phantom-node/memory_locker)).
|
71
|
-
|
72
|
-
$ sudo gem install memory_locker
|
73
|
-
|
74
|
-
If you don't want to install it, you will have to specify `--insecure-memory` flag when running cryptreboot.
|
75
|
-
|
76
76
|
## Installation
|
77
77
|
|
78
78
|
Make sure the required software is installed, then install the gem system-wide by executing:
|
@@ -180,12 +180,34 @@ If you get:
|
|
180
180
|
|
181
181
|
it means there was an error while locking memory to prevent a risk of sensitive data ending in a swap space.
|
182
182
|
|
183
|
-
|
184
|
-
If
|
185
|
-
If the problem persists, then please report a bug describing your setup.
|
183
|
+
Make sure you have permission to lock memory. Root users have.
|
184
|
+
If permissions are ok, then please report a bug describing your setup.
|
186
185
|
|
187
186
|
The solution of last resort is to use `--insecure-memory` flag, which disables memory locking completely.
|
188
187
|
|
188
|
+
### Unable to kexec on reboot using old systemd
|
189
|
+
|
190
|
+
Ubuntu 20.04 ships with `systemd` which may fall back to standard reboot instead of using `kexec`, because this utility
|
191
|
+
is located on a filesystem being unmounted during the shutdown sequence.
|
192
|
+
|
193
|
+
As a result, using cryptreboot would feel like using normal reboot.
|
194
|
+
|
195
|
+
To tell if your system is affected, you have to check messages printed to the console after you run cryptreboot.
|
196
|
+
This message happens just before reboot, so you will have just a few milliseconds to notice it on screen:
|
197
|
+
|
198
|
+
> shutdown[1]: (sd-kexec) failed with exit status 1
|
199
|
+
|
200
|
+
[There is a fix](https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1969365) waiting to be included in
|
201
|
+
a stable release update to `systemd` since 2023-07-21.
|
202
|
+
|
203
|
+
In the meantime, as a workaround, you can use `kexec` directly. **Warning: it will skip the standard shutdown procedure. Filesystems won't be unmounted, services won't be stopped, etc. It is like hitting `reset` button**.
|
204
|
+
However, when you use a decent filesystem with journalling the risk of things going bad should not be high.
|
205
|
+
|
206
|
+
Given the above warning, to reboot skipping the shutdown procedure, run:
|
207
|
+
|
208
|
+
$ sudo cryptreboot -p
|
209
|
+
$ sudo kexec -e # will skip proper shutdown sequence
|
210
|
+
|
189
211
|
## Development
|
190
212
|
|
191
213
|
After checking out the repo, run `bundle install` to install
|
data/lib/basic_loader.rb
CHANGED
@@ -31,6 +31,7 @@ require 'crypt_reboot/crypt_tab/entry_serializer'
|
|
31
31
|
require 'crypt_reboot/crypt_tab/keyfile_locator'
|
32
32
|
require 'crypt_reboot/crypt_tab/luks_to_plain_converter'
|
33
33
|
require 'crypt_reboot/crypt_tab/serializer'
|
34
|
+
require 'crypt_reboot/crypt_tab/zfs_keystore_entries_generator'
|
34
35
|
require 'crypt_reboot/initramfs/archiver'
|
35
36
|
require 'crypt_reboot/initramfs/decompressor'
|
36
37
|
require 'crypt_reboot/initramfs/extractor'
|
@@ -4,7 +4,7 @@ module CryptReboot
|
|
4
4
|
module CryptTab
|
5
5
|
# Load crypttab file and return array with deserialized entries
|
6
6
|
class Deserializer
|
7
|
-
def call(filename = nil, content:
|
7
|
+
def call(filename = nil, content: read_tolerate_missing(filename))
|
8
8
|
split_to_important_lines(content).map do |line|
|
9
9
|
entry_deserializer.call line
|
10
10
|
end
|
@@ -12,6 +12,12 @@ module CryptReboot
|
|
12
12
|
|
13
13
|
private
|
14
14
|
|
15
|
+
def read_tolerate_missing(filename)
|
16
|
+
File.read(filename)
|
17
|
+
rescue Errno::ENOENT
|
18
|
+
''
|
19
|
+
end
|
20
|
+
|
15
21
|
def split_to_important_lines(content)
|
16
22
|
content.split(/\n+|\r+/)
|
17
23
|
.reject(&:empty?)
|
@@ -0,0 +1,34 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
module CryptReboot
|
4
|
+
module CryptTab
|
5
|
+
# Get a list of keystore zvols from a running system and return entries array
|
6
|
+
class ZfsKeystoreEntriesGenerator
|
7
|
+
def call
|
8
|
+
glob = File.join(zvol_dir, '**/*')
|
9
|
+
Dir.glob(glob)
|
10
|
+
.select { |path| path =~ %r{/keystore$} && exist?(path) }
|
11
|
+
.map { |path| generate_entry(path) }
|
12
|
+
end
|
13
|
+
|
14
|
+
private
|
15
|
+
|
16
|
+
def exist?(path)
|
17
|
+
File.exist? File.realpath(path)
|
18
|
+
end
|
19
|
+
|
20
|
+
def generate_entry(path)
|
21
|
+
pool = File.basename File.dirname(path)
|
22
|
+
target = "keystore-#{pool}"
|
23
|
+
entry_class.new target: target, source: path, key_file: 'none', options: {}, flags: %i[luks discard]
|
24
|
+
end
|
25
|
+
|
26
|
+
attr_reader :zvol_dir, :entry_class
|
27
|
+
|
28
|
+
def initialize(zvol_dir: '/dev/zvol', entry_class: Entry)
|
29
|
+
@zvol_dir = zvol_dir
|
30
|
+
@entry_class = entry_class
|
31
|
+
end
|
32
|
+
end
|
33
|
+
end
|
34
|
+
end
|
@@ -1,5 +1,7 @@
|
|
1
1
|
# frozen_string_literal: true
|
2
2
|
|
3
|
+
require 'memory_locker' unless defined? MemoryLocker # MemoryLocker is mocked in tests
|
4
|
+
|
3
5
|
module CryptReboot
|
4
6
|
# Try to lock memory if configuration allows it
|
5
7
|
class ElasticMemoryLocker
|
@@ -8,10 +10,9 @@ module CryptReboot
|
|
8
10
|
def call
|
9
11
|
return if skip_locking?
|
10
12
|
|
11
|
-
loader.call
|
12
13
|
locker.call
|
13
14
|
nil
|
14
|
-
rescue
|
15
|
+
rescue locking_error => e
|
15
16
|
raise LockingError, 'Failed to lock memory', cause: e
|
16
17
|
end
|
17
18
|
|
@@ -21,22 +22,14 @@ module CryptReboot
|
|
21
22
|
insecure_memory_checker.call
|
22
23
|
end
|
23
24
|
|
24
|
-
|
25
|
-
lazy_locking_error.call
|
26
|
-
end
|
27
|
-
|
28
|
-
attr_reader :insecure_memory_checker, :loader, :load_error, :locker, :lazy_locking_error
|
25
|
+
attr_reader :insecure_memory_checker, :locker, :locking_error
|
29
26
|
|
30
27
|
def initialize(insecure_memory_checker: LazyConfig.insecure_memory,
|
31
|
-
|
32
|
-
|
33
|
-
locker: -> { MemoryLocker.call },
|
34
|
-
lazy_locking_error: -> { MemoryLocker::Error })
|
28
|
+
locker: MemoryLocker,
|
29
|
+
locking_error: MemoryLocker::Error)
|
35
30
|
@insecure_memory_checker = insecure_memory_checker
|
36
|
-
@loader = loader
|
37
|
-
@load_error = load_error
|
38
31
|
@locker = locker
|
39
|
-
@
|
32
|
+
@locking_error = locking_error
|
40
33
|
end
|
41
34
|
end
|
42
35
|
end
|
@@ -3,7 +3,7 @@
|
|
3
3
|
module CryptReboot
|
4
4
|
# Generate a hash with file names as keys and file contents as values
|
5
5
|
class FilesGenerator
|
6
|
-
def call(entries, base_dir)
|
6
|
+
def call(entries, base_dir:, crypttab_path:)
|
7
7
|
files = {}
|
8
8
|
modified_entries = entries.map do |entry|
|
9
9
|
next entry unless luks?(entry, base_dir)
|
@@ -13,14 +13,11 @@ module CryptReboot
|
|
13
13
|
files[keyfile] = data.key
|
14
14
|
entry_converter.call(entry, data, keyfile)
|
15
15
|
end
|
16
|
-
files.merge(
|
16
|
+
files.merge(crypttab_path => serializer.call(modified_entries))
|
17
17
|
end
|
18
18
|
|
19
19
|
private
|
20
20
|
|
21
|
-
CRYPTAB_PATH = '/cryptroot/crypttab'
|
22
|
-
private_constant :CRYPTAB_PATH
|
23
|
-
|
24
21
|
def luks?(entry, base_dir)
|
25
22
|
headevice = entry.headevice(header_prefix: base_dir)
|
26
23
|
luks_checker.call(headevice)
|
@@ -10,7 +10,7 @@ module CryptReboot
|
|
10
10
|
tmp_maker.call do |dir|
|
11
11
|
logger.call message
|
12
12
|
decompressor.call(filename, dir)
|
13
|
-
yield dir
|
13
|
+
yield File.join(dir, subdir)
|
14
14
|
end
|
15
15
|
end
|
16
16
|
|
@@ -20,16 +20,18 @@ module CryptReboot
|
|
20
20
|
decompressor_factory.call
|
21
21
|
end
|
22
22
|
|
23
|
-
attr_reader :tmp_maker, :decompressor_factory, :message, :logger
|
23
|
+
attr_reader :tmp_maker, :decompressor_factory, :message, :logger, :subdir
|
24
24
|
|
25
25
|
def initialize(tmp_maker: Dir.method(:mktmpdir),
|
26
26
|
decompressor_factory: Decompressor.new,
|
27
27
|
message: 'Extracting initramfs... To speed things up, future versions will employ cache.',
|
28
|
-
logger: ->(msg) { warn msg }
|
28
|
+
logger: ->(msg) { warn msg },
|
29
|
+
subdir: 'main')
|
29
30
|
@tmp_maker = tmp_maker
|
30
31
|
@decompressor_factory = decompressor_factory
|
31
32
|
@message = message
|
32
33
|
@logger = logger
|
34
|
+
@subdir = subdir
|
33
35
|
end
|
34
36
|
end
|
35
37
|
end
|
@@ -5,24 +5,51 @@ module CryptReboot
|
|
5
5
|
class InitramfsPatchSqueezer
|
6
6
|
def call(initramfs_path)
|
7
7
|
extractor.call(initramfs_path) do |tmp_dir|
|
8
|
-
|
9
|
-
crypttab_entries = deserializer.call(crypttab_path)
|
10
|
-
files_generator.call(crypttab_entries, tmp_dir)
|
8
|
+
main_files(tmp_dir).merge zfs_files(tmp_dir)
|
11
9
|
end
|
12
10
|
end
|
13
11
|
|
14
12
|
private
|
15
13
|
|
16
|
-
|
14
|
+
def main_files(tmp_dir)
|
15
|
+
full_crypttab_path = File.join(tmp_dir, crypttab_path)
|
16
|
+
crypttab_entries = crypttab_deserializer.call(full_crypttab_path)
|
17
|
+
files_generator.call(crypttab_entries, base_dir: tmp_dir, crypttab_path: crypttab_path)
|
18
|
+
end
|
19
|
+
|
20
|
+
def zfs_files(tmp_dir)
|
21
|
+
crypttab_entries = zfs_keystore_entries_generator.call
|
22
|
+
return {} if crypttab_entries.empty?
|
23
|
+
files = files_generator.call(crypttab_entries, base_dir: tmp_dir, crypttab_path: zfs_crypttab_path)
|
24
|
+
script_path = File.join(tmp_dir, zfs_script_path)
|
25
|
+
script = File.read(script_path)
|
26
|
+
files.merge(zfs_script_path => patch_zfs_script(script))
|
27
|
+
end
|
28
|
+
|
29
|
+
def patch_zfs_script(script)
|
30
|
+
patch = "cp #{zfs_crypttab_path} #{crypttab_path}; ${CRYPTROOT}"
|
31
|
+
script.sub(/^\s*\${CRYPTROOT}\s*$/, patch)
|
32
|
+
end
|
33
|
+
|
34
|
+
attr_reader :crypttab_path, :zfs_crypttab_path, :zfs_script_path, :extractor,
|
35
|
+
:crypttab_deserializer, :zfs_keystore_entries_generator, :files_generator
|
17
36
|
|
18
|
-
|
37
|
+
# rubocop:disable Metrics/ParameterLists
|
38
|
+
def initialize(crypttab_path = '/cryptroot/crypttab',
|
39
|
+
zfs_crypttab_path = '/cryptreboot/zfs_crypttab',
|
40
|
+
zfs_script_path = '/scripts/zfs',
|
19
41
|
extractor: Initramfs::Extractor.new,
|
20
|
-
|
42
|
+
crypttab_deserializer: CryptTab::Deserializer.new,
|
43
|
+
zfs_keystore_entries_generator: CryptTab::ZfsKeystoreEntriesGenerator.new,
|
21
44
|
files_generator: FilesGenerator.new)
|
22
|
-
@
|
45
|
+
@crypttab_path = crypttab_path
|
46
|
+
@zfs_crypttab_path = zfs_crypttab_path
|
47
|
+
@zfs_script_path = zfs_script_path
|
23
48
|
@extractor = extractor
|
24
|
-
@
|
49
|
+
@crypttab_deserializer = crypttab_deserializer
|
50
|
+
@zfs_keystore_entries_generator = zfs_keystore_entries_generator
|
25
51
|
@files_generator = files_generator
|
26
52
|
end
|
53
|
+
# rubocop:enable Metrics/ParameterLists
|
27
54
|
end
|
28
55
|
end
|
data/lib/crypt_reboot/version.rb
CHANGED
data/lib/crypt_reboot.rb
CHANGED
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: crypt_reboot
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.
|
4
|
+
version: 0.3.0.beta.1
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Paweł Pokrywka
|
8
8
|
autorequire:
|
9
9
|
bindir: exe
|
10
10
|
cert_chain: []
|
11
|
-
date:
|
11
|
+
date: 2024-09-26 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: tty-command
|
@@ -38,6 +38,20 @@ dependencies:
|
|
38
38
|
- - "~>"
|
39
39
|
- !ruby/object:Gem::Version
|
40
40
|
version: '0.3'
|
41
|
+
- !ruby/object:Gem::Dependency
|
42
|
+
name: memory_locker
|
43
|
+
requirement: !ruby/object:Gem::Requirement
|
44
|
+
requirements:
|
45
|
+
- - "~>"
|
46
|
+
- !ruby/object:Gem::Version
|
47
|
+
version: 1.0.3
|
48
|
+
type: :runtime
|
49
|
+
prerelease: false
|
50
|
+
version_requirements: !ruby/object:Gem::Requirement
|
51
|
+
requirements:
|
52
|
+
- - "~>"
|
53
|
+
- !ruby/object:Gem::Version
|
54
|
+
version: 1.0.3
|
41
55
|
description:
|
42
56
|
email:
|
43
57
|
- pepawel@users.noreply.github.com
|
@@ -71,6 +85,7 @@ files:
|
|
71
85
|
- lib/crypt_reboot/crypt_tab/keyfile_locator.rb
|
72
86
|
- lib/crypt_reboot/crypt_tab/luks_to_plain_converter.rb
|
73
87
|
- lib/crypt_reboot/crypt_tab/serializer.rb
|
88
|
+
- lib/crypt_reboot/crypt_tab/zfs_keystore_entries_generator.rb
|
74
89
|
- lib/crypt_reboot/elastic_memory_locker.rb
|
75
90
|
- lib/crypt_reboot/files_generator.rb
|
76
91
|
- lib/crypt_reboot/files_writer.rb
|
@@ -132,7 +147,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
|
|
132
147
|
- !ruby/object:Gem::Version
|
133
148
|
version: '0'
|
134
149
|
requirements: []
|
135
|
-
rubygems_version: 3.
|
150
|
+
rubygems_version: 3.5.4
|
136
151
|
signing_key:
|
137
152
|
specification_version: 4
|
138
153
|
summary: Linux utility for automatic and secure unlocking of encrypted disks on reboot
|