crypt_reboot 0.2.1 → 0.3.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 6ec1b79f3b99fddc49e170693df471d0eebc44af064787cb29b2694985a91418
4
- data.tar.gz: e3fa5ac025fc7ea7544a6e4c6d9db1f5894a0da44b6c39d07689a7594c0fc714
3
+ metadata.gz: c87fe69139eb41dd5bf41ec7e790cef1934e4c0c1d9bac7d46990d0a190a4f7f
4
+ data.tar.gz: d9aa729f6fabb43042a260b53a622a1ad33d1d011301719b7e2f1d141f46dcba
5
5
  SHA512:
6
- metadata.gz: 8aebba8307469fc4cba898f0c3427b4c6242e7f90dea985b33a72e89e13ee7e0854b232870b1afaea518c92eee03dca8c32d4c1f956a6da2e6cd55adae67f07e
7
- data.tar.gz: 56d86831971b547b4d1856b426dafac2a77bffa23fd8ced861908902ce969186be52710e92dd50ec01242c77133d77439a088a651626dd9e8ce2977ce136483a
6
+ metadata.gz: 24ebddd15821359a61c6eaab3915b0a6bc70b5d3acae7cfd1dee2a0dcaafe749d52abf22d5e8ead46b10b43bcfeaba7ef78bfed325ef360f740b0c40c6a5e192
7
+ data.tar.gz: 4b4a0ddb6a508f3e590ac2c8df6e78730c244fd1860a14fd4035953d4b066b448d56312dfa908151a1a5ff85db0b984142ec3ad8d611020458264ac1358f2cad
data/CHANGELOG.md CHANGED
@@ -1,6 +1,14 @@
1
+ ## [0.3.0] - 2024-09-27
2
+
3
+ - Refactor ZFS keystore encryption support
4
+
5
+ ## [0.3.0.beta.1] - 2024-09-26
6
+
7
+ - Add preliminary support for LUKS-keystore-based ZFS encryption implemented by Ubuntu
8
+
1
9
  ## [0.2.1] - 2023-11-12
2
10
 
3
- - use new MemoryLocker without a need for FFI compilation step
11
+ - Use new MemoryLocker without a need for FFI compilation step
4
12
 
5
13
  ## [0.2.0] - 2023-07-29
6
14
 
data/README.md CHANGED
@@ -20,6 +20,14 @@ and `/boot/initrd.img` as initramfs.
20
20
  Will work properly when using standard passphrase-based disk unlocking.
21
21
  Fancy methods such as using an external USB with a passphrase file will fail.
22
22
 
23
+ ## Supported disk encryption methods
24
+
25
+ ### LUKS crypttab
26
+ LUKS-based disk-encryption configured with `/etc/crypttab` file.
27
+
28
+ ### ZFS keystore
29
+ Native ZFS encryption with LUKS-encrypted keystore volume.
30
+
23
31
  ## Compatible Linux distributions
24
32
 
25
33
  Currently, cryptreboot depends on `initramfs-tools` package which is available in
@@ -30,16 +38,23 @@ On the other hand, do not expect it to work on other distributions now.
30
38
  But support for them may come in upcoming versions.
31
39
 
32
40
  Following distributions were tested by the author on the AMD64 machine:
33
- - DappNode 0.2.75 is based on Debian 12, see below
34
- - Debian 12 needs [symlinks for kernel and initramfs](#no-symlinks-to-most-recent-kernel-and-initramfs)
35
- - Pop!_OS 22.04 LTS
36
- - Ubuntu 23.04
37
- - Ubuntu 22.04 LTS
38
- - Ubuntu 20.04 LTS needs tiny adjustments to system settings,
39
- specifically [changing compression](#lz4-initramfs-compression) and
40
- [fixing systemd kexec support](#staged-kernel-not-being-executed-by-systemd), but still
41
- [sometimes](#unable-to-kexec-on-reboot-using-old-systemd) reboot experience may be suboptimal
42
- - ~~Ubuntu 18.04 LTS~~ is not supported (initramfs uses *pre-crypttab* format)
41
+
42
+ - LUKS crypttab disk encryption method
43
+ - DappNode 0.2.75 is based on Debian 12, see below
44
+ - Debian 12 needs [symlinks for kernel and initramfs](#no-symlinks-to-most-recent-kernel-and-initramfs)
45
+ - Pop!_OS 22.04 LTS
46
+ - Ubuntu 24.04 LTS
47
+ - Ubuntu 23.04
48
+ - Ubuntu 22.04 LTS
49
+ - Ubuntu 20.04 LTS needs tiny adjustments to system settings,
50
+ specifically [changing compression](#lz4-initramfs-compression) and
51
+ [fixing systemd kexec support](#staged-kernel-not-being-executed-by-systemd), but still
52
+ [sometimes](#unable-to-kexec-on-reboot-using-old-systemd) reboot experience may be suboptimal
53
+ - ~~Ubuntu 18.04 LTS~~ is not supported (initramfs uses *pre-crypttab* format)
54
+
55
+ - ZFS keystore disk encryption method
56
+ - Ubuntu 24.04 LTS
57
+ - Ubuntu 22.04 LTS
43
58
 
44
59
  If you have successfully run cryptreboot on another distribution,
45
60
  please contact me and I will update the list.
data/lib/basic_loader.rb CHANGED
@@ -15,11 +15,13 @@ require 'crypt_reboot/gziper'
15
15
  require 'crypt_reboot/initramfs_patch_squeezer'
16
16
  require 'crypt_reboot/kexec_patching_loader'
17
17
  require 'crypt_reboot/lazy_config'
18
+ require 'crypt_reboot/luks_crypt_tab_patcher'
18
19
  require 'crypt_reboot/passphrase_asker'
19
20
  require 'crypt_reboot/patched_initramfs_generator'
20
21
  require 'crypt_reboot/rebooter'
21
22
  require 'crypt_reboot/runner'
22
23
  require 'crypt_reboot/single_assign_restricted_map'
24
+ require 'crypt_reboot/zfs_keystore_patcher'
23
25
  require 'crypt_reboot/cli/exiter'
24
26
  require 'crypt_reboot/cli/happy_exiter'
25
27
  require 'crypt_reboot/cli/params_parsing_executor'
@@ -31,6 +33,7 @@ require 'crypt_reboot/crypt_tab/entry_serializer'
31
33
  require 'crypt_reboot/crypt_tab/keyfile_locator'
32
34
  require 'crypt_reboot/crypt_tab/luks_to_plain_converter'
33
35
  require 'crypt_reboot/crypt_tab/serializer'
36
+ require 'crypt_reboot/crypt_tab/zfs_keystore_entries_generator'
34
37
  require 'crypt_reboot/initramfs/archiver'
35
38
  require 'crypt_reboot/initramfs/decompressor'
36
39
  require 'crypt_reboot/initramfs/extractor'
@@ -0,0 +1,42 @@
1
+ # frozen_string_literal: true
2
+
3
+ module CryptReboot
4
+ module CryptTab
5
+ # Get a list of keystore zvols from a running system and return entries array
6
+ class ZfsKeystoreEntriesGenerator
7
+ def call
8
+ glob = File.join(zvol_dir, '**/*')
9
+ Dir.glob(glob)
10
+ .select { |path| path =~ %r{/keystore$} && exist?(path) }
11
+ .map { |path| generate_entry(path) }
12
+ end
13
+
14
+ private
15
+
16
+ def exist?(path)
17
+ File.exist? File.realpath(path)
18
+ end
19
+
20
+ def generate_entry(path)
21
+ pool = File.basename File.dirname(path)
22
+ # Target name is the same as produced by /scripts/zfs script within initramfs
23
+ entry_builder.call target: "keystore-#{pool}", source: path
24
+ end
25
+
26
+ attr_reader :zvol_dir, :entry_builder
27
+
28
+ def initialize(zvol_dir: '/dev/zvol',
29
+ entry_builder: lambda { |target:, source:|
30
+ # Flags and options are the same as produced by /scripts/zfs script within initramfs
31
+ Entry.new target: target,
32
+ source: source,
33
+ key_file: 'none',
34
+ options: {},
35
+ flags: %i[luks discard]
36
+ })
37
+ @zvol_dir = zvol_dir
38
+ @entry_builder = entry_builder
39
+ end
40
+ end
41
+ end
42
+ end
@@ -3,7 +3,7 @@
3
3
  module CryptReboot
4
4
  # Generate a hash with file names as keys and file contents as values
5
5
  class FilesGenerator
6
- def call(entries, base_dir)
6
+ def call(entries, base_dir:, crypttab_path:)
7
7
  files = {}
8
8
  modified_entries = entries.map do |entry|
9
9
  next entry unless luks?(entry, base_dir)
@@ -13,14 +13,11 @@ module CryptReboot
13
13
  files[keyfile] = data.key
14
14
  entry_converter.call(entry, data, keyfile)
15
15
  end
16
- files.merge(CRYPTAB_PATH => serializer.call(modified_entries))
16
+ files.merge(crypttab_path => serializer.call(modified_entries))
17
17
  end
18
18
 
19
19
  private
20
20
 
21
- CRYPTAB_PATH = '/cryptroot/crypttab'
22
- private_constant :CRYPTAB_PATH
23
-
24
21
  def luks?(entry, base_dir)
25
22
  headevice = entry.headevice(header_prefix: base_dir)
26
23
  luks_checker.call(headevice)
@@ -10,7 +10,7 @@ module CryptReboot
10
10
  tmp_maker.call do |dir|
11
11
  logger.call message
12
12
  decompressor.call(filename, dir)
13
- yield dir
13
+ yield File.join(dir, subdir)
14
14
  end
15
15
  end
16
16
 
@@ -20,16 +20,18 @@ module CryptReboot
20
20
  decompressor_factory.call
21
21
  end
22
22
 
23
- attr_reader :tmp_maker, :decompressor_factory, :message, :logger
23
+ attr_reader :tmp_maker, :decompressor_factory, :message, :logger, :subdir
24
24
 
25
25
  def initialize(tmp_maker: Dir.method(:mktmpdir),
26
26
  decompressor_factory: Decompressor.new,
27
27
  message: 'Extracting initramfs... To speed things up, future versions will employ cache.',
28
- logger: ->(msg) { warn msg })
28
+ logger: ->(msg) { warn msg },
29
+ subdir: 'main')
29
30
  @tmp_maker = tmp_maker
30
31
  @decompressor_factory = decompressor_factory
31
32
  @message = message
32
33
  @logger = logger
34
+ @subdir = subdir
33
35
  end
34
36
  end
35
37
  end
@@ -5,24 +5,23 @@ module CryptReboot
5
5
  class InitramfsPatchSqueezer
6
6
  def call(initramfs_path)
7
7
  extractor.call(initramfs_path) do |tmp_dir|
8
- crypttab_path = File.join(tmp_dir, crypttab_relative_path)
9
- crypttab_entries = deserializer.call(crypttab_path)
10
- files_generator.call(crypttab_entries, tmp_dir)
8
+ patchers.inject({}) do |files, patcher|
9
+ files.merge patcher.call(tmp_dir)
10
+ end
11
11
  end
12
12
  end
13
13
 
14
14
  private
15
15
 
16
- attr_reader :crypttab_relative_path, :extractor, :deserializer, :files_generator
16
+ attr_reader :extractor, :patchers
17
17
 
18
- def initialize(crypttab_relative_path = 'main/cryptroot/crypttab',
19
- extractor: Initramfs::Extractor.new,
20
- deserializer: CryptTab::Deserializer.new,
21
- files_generator: FilesGenerator.new)
22
- @crypttab_relative_path = crypttab_relative_path
18
+ def initialize(extractor: Initramfs::Extractor.new,
19
+ patchers: [
20
+ LuksCryptTabPatcher.new,
21
+ ZfsKeystorePatcher.new
22
+ ])
23
23
  @extractor = extractor
24
- @deserializer = deserializer
25
- @files_generator = files_generator
24
+ @patchers = patchers
26
25
  end
27
26
  end
28
27
  end
@@ -0,0 +1,26 @@
1
+ # frozen_string_literal: true
2
+
3
+ module CryptReboot
4
+ # Generate patch (files hash) from files in a directory containing uncompressed initramfs
5
+ class LuksCryptTabPatcher
6
+ def call(dir)
7
+ full_crypttab_path = File.join(dir, crypttab_path)
8
+ return {} unless File.exist?(full_crypttab_path)
9
+
10
+ crypttab_entries = crypttab_deserializer.call(full_crypttab_path)
11
+ files_generator.call(crypttab_entries, base_dir: dir, crypttab_path: crypttab_path)
12
+ end
13
+
14
+ private
15
+
16
+ attr_reader :crypttab_path, :crypttab_deserializer, :files_generator
17
+
18
+ def initialize(crypttab_path: '/cryptroot/crypttab',
19
+ crypttab_deserializer: CryptTab::Deserializer.new,
20
+ files_generator: FilesGenerator.new)
21
+ @crypttab_path = crypttab_path
22
+ @crypttab_deserializer = crypttab_deserializer
23
+ @files_generator = files_generator
24
+ end
25
+ end
26
+ end
@@ -1,5 +1,5 @@
1
1
  # frozen_string_literal: true
2
2
 
3
3
  module CryptReboot
4
- VERSION = '0.2.1'
4
+ VERSION = '0.3.0'
5
5
  end
@@ -0,0 +1,46 @@
1
+ # frozen_string_literal: true
2
+
3
+ module CryptReboot
4
+ # Generate patch (files hash) from files in a directory containing uncompressed initramfs
5
+ class ZfsKeystorePatcher
6
+ def call(dir)
7
+ crypttab_entries = entries_generator.call
8
+ return {} if crypttab_entries.empty?
9
+
10
+ files_generator
11
+ .call(crypttab_entries, base_dir: dir, crypttab_path: tmp_crypttab_path)
12
+ .merge(script_patch_files(dir))
13
+ end
14
+
15
+ private
16
+
17
+ def script_patch_files(dir)
18
+ path = File.join(dir, script_path)
19
+ content = File.read(path)
20
+ { script_path => patch_script(content) }
21
+ rescue Errno::ENOENT
22
+ {}
23
+ end
24
+
25
+ def patch_script(script)
26
+ comment = '# Following line has been added by cryptreboot'
27
+ patch = "cp #{tmp_crypttab_path} #{crypttab_path}"
28
+ script.sub(/^(\s*)(\${CRYPTROOT})\s*$/, "\n\\1#{comment}\n\\1#{patch}\n\n\\1\\2")
29
+ end
30
+
31
+ attr_reader :crypttab_path, :tmp_crypttab_path, :script_path,
32
+ :entries_generator, :files_generator
33
+
34
+ def initialize(crypttab_path: '/cryptroot/crypttab',
35
+ tmp_crypttab_path: '/cryptreboot/zfs_crypttab',
36
+ script_path: '/scripts/zfs',
37
+ entries_generator: CryptTab::ZfsKeystoreEntriesGenerator.new,
38
+ files_generator: FilesGenerator.new)
39
+ @crypttab_path = crypttab_path
40
+ @tmp_crypttab_path = tmp_crypttab_path
41
+ @script_path = script_path
42
+ @entries_generator = entries_generator
43
+ @files_generator = files_generator
44
+ end
45
+ end
46
+ end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: crypt_reboot
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.2.1
4
+ version: 0.3.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Paweł Pokrywka
8
- autorequire:
8
+ autorequire:
9
9
  bindir: exe
10
10
  cert_chain: []
11
- date: 2023-11-12 00:00:00.000000000 Z
11
+ date: 2024-09-28 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: tty-command
@@ -52,7 +52,7 @@ dependencies:
52
52
  - - "~>"
53
53
  - !ruby/object:Gem::Version
54
54
  version: 1.0.3
55
- description:
55
+ description:
56
56
  email:
57
57
  - pepawel@users.noreply.github.com
58
58
  executables:
@@ -85,6 +85,7 @@ files:
85
85
  - lib/crypt_reboot/crypt_tab/keyfile_locator.rb
86
86
  - lib/crypt_reboot/crypt_tab/luks_to_plain_converter.rb
87
87
  - lib/crypt_reboot/crypt_tab/serializer.rb
88
+ - lib/crypt_reboot/crypt_tab/zfs_keystore_entries_generator.rb
88
89
  - lib/crypt_reboot/elastic_memory_locker.rb
89
90
  - lib/crypt_reboot/files_generator.rb
90
91
  - lib/crypt_reboot/files_writer.rb
@@ -108,6 +109,7 @@ files:
108
109
  - lib/crypt_reboot/luks/dumper/luks_v2_parser.rb
109
110
  - lib/crypt_reboot/luks/key_fetcher.rb
110
111
  - lib/crypt_reboot/luks/version_detector.rb
112
+ - lib/crypt_reboot/luks_crypt_tab_patcher.rb
111
113
  - lib/crypt_reboot/passphrase_asker.rb
112
114
  - lib/crypt_reboot/patched_initramfs_generator.rb
113
115
  - lib/crypt_reboot/rebooter.rb
@@ -123,6 +125,7 @@ files:
123
125
  - lib/crypt_reboot/safe_temp/mounter.rb
124
126
  - lib/crypt_reboot/single_assign_restricted_map.rb
125
127
  - lib/crypt_reboot/version.rb
128
+ - lib/crypt_reboot/zfs_keystore_patcher.rb
126
129
  homepage: https://phantomno.de/cryptreboot
127
130
  licenses:
128
131
  - MIT
@@ -131,7 +134,7 @@ metadata:
131
134
  source_code_uri: https://github.com/phantom-node/cryptreboot
132
135
  changelog_uri: https://github.com/phantom-node/cryptreboot/blob/master/CHANGELOG.md
133
136
  rubygems_mfa_required: 'true'
134
- post_install_message:
137
+ post_install_message:
135
138
  rdoc_options: []
136
139
  require_paths:
137
140
  - lib
@@ -146,8 +149,8 @@ required_rubygems_version: !ruby/object:Gem::Requirement
146
149
  - !ruby/object:Gem::Version
147
150
  version: '0'
148
151
  requirements: []
149
- rubygems_version: 3.2.22
150
- signing_key:
152
+ rubygems_version: 3.5.4
153
+ signing_key:
151
154
  specification_version: 4
152
155
  summary: Linux utility for automatic and secure unlocking of encrypted disks on reboot
153
156
  test_files: []