crypt_reboot 0.2.1 → 0.3.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +9 -1
- data/README.md +25 -10
- data/lib/basic_loader.rb +3 -0
- data/lib/crypt_reboot/crypt_tab/zfs_keystore_entries_generator.rb +42 -0
- data/lib/crypt_reboot/files_generator.rb +2 -5
- data/lib/crypt_reboot/initramfs/extractor.rb +5 -3
- data/lib/crypt_reboot/initramfs_patch_squeezer.rb +10 -11
- data/lib/crypt_reboot/luks_crypt_tab_patcher.rb +26 -0
- data/lib/crypt_reboot/version.rb +1 -1
- data/lib/crypt_reboot/zfs_keystore_patcher.rb +46 -0
- metadata +10 -7
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: c87fe69139eb41dd5bf41ec7e790cef1934e4c0c1d9bac7d46990d0a190a4f7f
|
4
|
+
data.tar.gz: d9aa729f6fabb43042a260b53a622a1ad33d1d011301719b7e2f1d141f46dcba
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 24ebddd15821359a61c6eaab3915b0a6bc70b5d3acae7cfd1dee2a0dcaafe749d52abf22d5e8ead46b10b43bcfeaba7ef78bfed325ef360f740b0c40c6a5e192
|
7
|
+
data.tar.gz: 4b4a0ddb6a508f3e590ac2c8df6e78730c244fd1860a14fd4035953d4b066b448d56312dfa908151a1a5ff85db0b984142ec3ad8d611020458264ac1358f2cad
|
data/CHANGELOG.md
CHANGED
@@ -1,6 +1,14 @@
|
|
1
|
+
## [0.3.0] - 2024-09-27
|
2
|
+
|
3
|
+
- Refactor ZFS keystore encryption support
|
4
|
+
|
5
|
+
## [0.3.0.beta.1] - 2024-09-26
|
6
|
+
|
7
|
+
- Add preliminary support for LUKS-keystore-based ZFS encryption implemented by Ubuntu
|
8
|
+
|
1
9
|
## [0.2.1] - 2023-11-12
|
2
10
|
|
3
|
-
-
|
11
|
+
- Use new MemoryLocker without a need for FFI compilation step
|
4
12
|
|
5
13
|
## [0.2.0] - 2023-07-29
|
6
14
|
|
data/README.md
CHANGED
@@ -20,6 +20,14 @@ and `/boot/initrd.img` as initramfs.
|
|
20
20
|
Will work properly when using standard passphrase-based disk unlocking.
|
21
21
|
Fancy methods such as using an external USB with a passphrase file will fail.
|
22
22
|
|
23
|
+
## Supported disk encryption methods
|
24
|
+
|
25
|
+
### LUKS crypttab
|
26
|
+
LUKS-based disk-encryption configured with `/etc/crypttab` file.
|
27
|
+
|
28
|
+
### ZFS keystore
|
29
|
+
Native ZFS encryption with LUKS-encrypted keystore volume.
|
30
|
+
|
23
31
|
## Compatible Linux distributions
|
24
32
|
|
25
33
|
Currently, cryptreboot depends on `initramfs-tools` package which is available in
|
@@ -30,16 +38,23 @@ On the other hand, do not expect it to work on other distributions now.
|
|
30
38
|
But support for them may come in upcoming versions.
|
31
39
|
|
32
40
|
Following distributions were tested by the author on the AMD64 machine:
|
33
|
-
|
34
|
-
-
|
35
|
-
-
|
36
|
-
-
|
37
|
-
-
|
38
|
-
- Ubuntu
|
39
|
-
|
40
|
-
|
41
|
-
|
42
|
-
|
41
|
+
|
42
|
+
- LUKS crypttab disk encryption method
|
43
|
+
- DappNode 0.2.75 is based on Debian 12, see below
|
44
|
+
- Debian 12 needs [symlinks for kernel and initramfs](#no-symlinks-to-most-recent-kernel-and-initramfs)
|
45
|
+
- Pop!_OS 22.04 LTS
|
46
|
+
- Ubuntu 24.04 LTS
|
47
|
+
- Ubuntu 23.04
|
48
|
+
- Ubuntu 22.04 LTS
|
49
|
+
- Ubuntu 20.04 LTS needs tiny adjustments to system settings,
|
50
|
+
specifically [changing compression](#lz4-initramfs-compression) and
|
51
|
+
[fixing systemd kexec support](#staged-kernel-not-being-executed-by-systemd), but still
|
52
|
+
[sometimes](#unable-to-kexec-on-reboot-using-old-systemd) reboot experience may be suboptimal
|
53
|
+
- ~~Ubuntu 18.04 LTS~~ is not supported (initramfs uses *pre-crypttab* format)
|
54
|
+
|
55
|
+
- ZFS keystore disk encryption method
|
56
|
+
- Ubuntu 24.04 LTS
|
57
|
+
- Ubuntu 22.04 LTS
|
43
58
|
|
44
59
|
If you have successfully run cryptreboot on another distribution,
|
45
60
|
please contact me and I will update the list.
|
data/lib/basic_loader.rb
CHANGED
@@ -15,11 +15,13 @@ require 'crypt_reboot/gziper'
|
|
15
15
|
require 'crypt_reboot/initramfs_patch_squeezer'
|
16
16
|
require 'crypt_reboot/kexec_patching_loader'
|
17
17
|
require 'crypt_reboot/lazy_config'
|
18
|
+
require 'crypt_reboot/luks_crypt_tab_patcher'
|
18
19
|
require 'crypt_reboot/passphrase_asker'
|
19
20
|
require 'crypt_reboot/patched_initramfs_generator'
|
20
21
|
require 'crypt_reboot/rebooter'
|
21
22
|
require 'crypt_reboot/runner'
|
22
23
|
require 'crypt_reboot/single_assign_restricted_map'
|
24
|
+
require 'crypt_reboot/zfs_keystore_patcher'
|
23
25
|
require 'crypt_reboot/cli/exiter'
|
24
26
|
require 'crypt_reboot/cli/happy_exiter'
|
25
27
|
require 'crypt_reboot/cli/params_parsing_executor'
|
@@ -31,6 +33,7 @@ require 'crypt_reboot/crypt_tab/entry_serializer'
|
|
31
33
|
require 'crypt_reboot/crypt_tab/keyfile_locator'
|
32
34
|
require 'crypt_reboot/crypt_tab/luks_to_plain_converter'
|
33
35
|
require 'crypt_reboot/crypt_tab/serializer'
|
36
|
+
require 'crypt_reboot/crypt_tab/zfs_keystore_entries_generator'
|
34
37
|
require 'crypt_reboot/initramfs/archiver'
|
35
38
|
require 'crypt_reboot/initramfs/decompressor'
|
36
39
|
require 'crypt_reboot/initramfs/extractor'
|
@@ -0,0 +1,42 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
module CryptReboot
|
4
|
+
module CryptTab
|
5
|
+
# Get a list of keystore zvols from a running system and return entries array
|
6
|
+
class ZfsKeystoreEntriesGenerator
|
7
|
+
def call
|
8
|
+
glob = File.join(zvol_dir, '**/*')
|
9
|
+
Dir.glob(glob)
|
10
|
+
.select { |path| path =~ %r{/keystore$} && exist?(path) }
|
11
|
+
.map { |path| generate_entry(path) }
|
12
|
+
end
|
13
|
+
|
14
|
+
private
|
15
|
+
|
16
|
+
def exist?(path)
|
17
|
+
File.exist? File.realpath(path)
|
18
|
+
end
|
19
|
+
|
20
|
+
def generate_entry(path)
|
21
|
+
pool = File.basename File.dirname(path)
|
22
|
+
# Target name is the same as produced by /scripts/zfs script within initramfs
|
23
|
+
entry_builder.call target: "keystore-#{pool}", source: path
|
24
|
+
end
|
25
|
+
|
26
|
+
attr_reader :zvol_dir, :entry_builder
|
27
|
+
|
28
|
+
def initialize(zvol_dir: '/dev/zvol',
|
29
|
+
entry_builder: lambda { |target:, source:|
|
30
|
+
# Flags and options are the same as produced by /scripts/zfs script within initramfs
|
31
|
+
Entry.new target: target,
|
32
|
+
source: source,
|
33
|
+
key_file: 'none',
|
34
|
+
options: {},
|
35
|
+
flags: %i[luks discard]
|
36
|
+
})
|
37
|
+
@zvol_dir = zvol_dir
|
38
|
+
@entry_builder = entry_builder
|
39
|
+
end
|
40
|
+
end
|
41
|
+
end
|
42
|
+
end
|
@@ -3,7 +3,7 @@
|
|
3
3
|
module CryptReboot
|
4
4
|
# Generate a hash with file names as keys and file contents as values
|
5
5
|
class FilesGenerator
|
6
|
-
def call(entries, base_dir)
|
6
|
+
def call(entries, base_dir:, crypttab_path:)
|
7
7
|
files = {}
|
8
8
|
modified_entries = entries.map do |entry|
|
9
9
|
next entry unless luks?(entry, base_dir)
|
@@ -13,14 +13,11 @@ module CryptReboot
|
|
13
13
|
files[keyfile] = data.key
|
14
14
|
entry_converter.call(entry, data, keyfile)
|
15
15
|
end
|
16
|
-
files.merge(
|
16
|
+
files.merge(crypttab_path => serializer.call(modified_entries))
|
17
17
|
end
|
18
18
|
|
19
19
|
private
|
20
20
|
|
21
|
-
CRYPTAB_PATH = '/cryptroot/crypttab'
|
22
|
-
private_constant :CRYPTAB_PATH
|
23
|
-
|
24
21
|
def luks?(entry, base_dir)
|
25
22
|
headevice = entry.headevice(header_prefix: base_dir)
|
26
23
|
luks_checker.call(headevice)
|
@@ -10,7 +10,7 @@ module CryptReboot
|
|
10
10
|
tmp_maker.call do |dir|
|
11
11
|
logger.call message
|
12
12
|
decompressor.call(filename, dir)
|
13
|
-
yield dir
|
13
|
+
yield File.join(dir, subdir)
|
14
14
|
end
|
15
15
|
end
|
16
16
|
|
@@ -20,16 +20,18 @@ module CryptReboot
|
|
20
20
|
decompressor_factory.call
|
21
21
|
end
|
22
22
|
|
23
|
-
attr_reader :tmp_maker, :decompressor_factory, :message, :logger
|
23
|
+
attr_reader :tmp_maker, :decompressor_factory, :message, :logger, :subdir
|
24
24
|
|
25
25
|
def initialize(tmp_maker: Dir.method(:mktmpdir),
|
26
26
|
decompressor_factory: Decompressor.new,
|
27
27
|
message: 'Extracting initramfs... To speed things up, future versions will employ cache.',
|
28
|
-
logger: ->(msg) { warn msg }
|
28
|
+
logger: ->(msg) { warn msg },
|
29
|
+
subdir: 'main')
|
29
30
|
@tmp_maker = tmp_maker
|
30
31
|
@decompressor_factory = decompressor_factory
|
31
32
|
@message = message
|
32
33
|
@logger = logger
|
34
|
+
@subdir = subdir
|
33
35
|
end
|
34
36
|
end
|
35
37
|
end
|
@@ -5,24 +5,23 @@ module CryptReboot
|
|
5
5
|
class InitramfsPatchSqueezer
|
6
6
|
def call(initramfs_path)
|
7
7
|
extractor.call(initramfs_path) do |tmp_dir|
|
8
|
-
|
9
|
-
|
10
|
-
|
8
|
+
patchers.inject({}) do |files, patcher|
|
9
|
+
files.merge patcher.call(tmp_dir)
|
10
|
+
end
|
11
11
|
end
|
12
12
|
end
|
13
13
|
|
14
14
|
private
|
15
15
|
|
16
|
-
attr_reader :
|
16
|
+
attr_reader :extractor, :patchers
|
17
17
|
|
18
|
-
def initialize(
|
19
|
-
|
20
|
-
|
21
|
-
|
22
|
-
|
18
|
+
def initialize(extractor: Initramfs::Extractor.new,
|
19
|
+
patchers: [
|
20
|
+
LuksCryptTabPatcher.new,
|
21
|
+
ZfsKeystorePatcher.new
|
22
|
+
])
|
23
23
|
@extractor = extractor
|
24
|
-
@
|
25
|
-
@files_generator = files_generator
|
24
|
+
@patchers = patchers
|
26
25
|
end
|
27
26
|
end
|
28
27
|
end
|
@@ -0,0 +1,26 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
module CryptReboot
|
4
|
+
# Generate patch (files hash) from files in a directory containing uncompressed initramfs
|
5
|
+
class LuksCryptTabPatcher
|
6
|
+
def call(dir)
|
7
|
+
full_crypttab_path = File.join(dir, crypttab_path)
|
8
|
+
return {} unless File.exist?(full_crypttab_path)
|
9
|
+
|
10
|
+
crypttab_entries = crypttab_deserializer.call(full_crypttab_path)
|
11
|
+
files_generator.call(crypttab_entries, base_dir: dir, crypttab_path: crypttab_path)
|
12
|
+
end
|
13
|
+
|
14
|
+
private
|
15
|
+
|
16
|
+
attr_reader :crypttab_path, :crypttab_deserializer, :files_generator
|
17
|
+
|
18
|
+
def initialize(crypttab_path: '/cryptroot/crypttab',
|
19
|
+
crypttab_deserializer: CryptTab::Deserializer.new,
|
20
|
+
files_generator: FilesGenerator.new)
|
21
|
+
@crypttab_path = crypttab_path
|
22
|
+
@crypttab_deserializer = crypttab_deserializer
|
23
|
+
@files_generator = files_generator
|
24
|
+
end
|
25
|
+
end
|
26
|
+
end
|
data/lib/crypt_reboot/version.rb
CHANGED
@@ -0,0 +1,46 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
module CryptReboot
|
4
|
+
# Generate patch (files hash) from files in a directory containing uncompressed initramfs
|
5
|
+
class ZfsKeystorePatcher
|
6
|
+
def call(dir)
|
7
|
+
crypttab_entries = entries_generator.call
|
8
|
+
return {} if crypttab_entries.empty?
|
9
|
+
|
10
|
+
files_generator
|
11
|
+
.call(crypttab_entries, base_dir: dir, crypttab_path: tmp_crypttab_path)
|
12
|
+
.merge(script_patch_files(dir))
|
13
|
+
end
|
14
|
+
|
15
|
+
private
|
16
|
+
|
17
|
+
def script_patch_files(dir)
|
18
|
+
path = File.join(dir, script_path)
|
19
|
+
content = File.read(path)
|
20
|
+
{ script_path => patch_script(content) }
|
21
|
+
rescue Errno::ENOENT
|
22
|
+
{}
|
23
|
+
end
|
24
|
+
|
25
|
+
def patch_script(script)
|
26
|
+
comment = '# Following line has been added by cryptreboot'
|
27
|
+
patch = "cp #{tmp_crypttab_path} #{crypttab_path}"
|
28
|
+
script.sub(/^(\s*)(\${CRYPTROOT})\s*$/, "\n\\1#{comment}\n\\1#{patch}\n\n\\1\\2")
|
29
|
+
end
|
30
|
+
|
31
|
+
attr_reader :crypttab_path, :tmp_crypttab_path, :script_path,
|
32
|
+
:entries_generator, :files_generator
|
33
|
+
|
34
|
+
def initialize(crypttab_path: '/cryptroot/crypttab',
|
35
|
+
tmp_crypttab_path: '/cryptreboot/zfs_crypttab',
|
36
|
+
script_path: '/scripts/zfs',
|
37
|
+
entries_generator: CryptTab::ZfsKeystoreEntriesGenerator.new,
|
38
|
+
files_generator: FilesGenerator.new)
|
39
|
+
@crypttab_path = crypttab_path
|
40
|
+
@tmp_crypttab_path = tmp_crypttab_path
|
41
|
+
@script_path = script_path
|
42
|
+
@entries_generator = entries_generator
|
43
|
+
@files_generator = files_generator
|
44
|
+
end
|
45
|
+
end
|
46
|
+
end
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: crypt_reboot
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.
|
4
|
+
version: 0.3.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Paweł Pokrywka
|
8
|
-
autorequire:
|
8
|
+
autorequire:
|
9
9
|
bindir: exe
|
10
10
|
cert_chain: []
|
11
|
-
date:
|
11
|
+
date: 2024-09-28 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: tty-command
|
@@ -52,7 +52,7 @@ dependencies:
|
|
52
52
|
- - "~>"
|
53
53
|
- !ruby/object:Gem::Version
|
54
54
|
version: 1.0.3
|
55
|
-
description:
|
55
|
+
description:
|
56
56
|
email:
|
57
57
|
- pepawel@users.noreply.github.com
|
58
58
|
executables:
|
@@ -85,6 +85,7 @@ files:
|
|
85
85
|
- lib/crypt_reboot/crypt_tab/keyfile_locator.rb
|
86
86
|
- lib/crypt_reboot/crypt_tab/luks_to_plain_converter.rb
|
87
87
|
- lib/crypt_reboot/crypt_tab/serializer.rb
|
88
|
+
- lib/crypt_reboot/crypt_tab/zfs_keystore_entries_generator.rb
|
88
89
|
- lib/crypt_reboot/elastic_memory_locker.rb
|
89
90
|
- lib/crypt_reboot/files_generator.rb
|
90
91
|
- lib/crypt_reboot/files_writer.rb
|
@@ -108,6 +109,7 @@ files:
|
|
108
109
|
- lib/crypt_reboot/luks/dumper/luks_v2_parser.rb
|
109
110
|
- lib/crypt_reboot/luks/key_fetcher.rb
|
110
111
|
- lib/crypt_reboot/luks/version_detector.rb
|
112
|
+
- lib/crypt_reboot/luks_crypt_tab_patcher.rb
|
111
113
|
- lib/crypt_reboot/passphrase_asker.rb
|
112
114
|
- lib/crypt_reboot/patched_initramfs_generator.rb
|
113
115
|
- lib/crypt_reboot/rebooter.rb
|
@@ -123,6 +125,7 @@ files:
|
|
123
125
|
- lib/crypt_reboot/safe_temp/mounter.rb
|
124
126
|
- lib/crypt_reboot/single_assign_restricted_map.rb
|
125
127
|
- lib/crypt_reboot/version.rb
|
128
|
+
- lib/crypt_reboot/zfs_keystore_patcher.rb
|
126
129
|
homepage: https://phantomno.de/cryptreboot
|
127
130
|
licenses:
|
128
131
|
- MIT
|
@@ -131,7 +134,7 @@ metadata:
|
|
131
134
|
source_code_uri: https://github.com/phantom-node/cryptreboot
|
132
135
|
changelog_uri: https://github.com/phantom-node/cryptreboot/blob/master/CHANGELOG.md
|
133
136
|
rubygems_mfa_required: 'true'
|
134
|
-
post_install_message:
|
137
|
+
post_install_message:
|
135
138
|
rdoc_options: []
|
136
139
|
require_paths:
|
137
140
|
- lib
|
@@ -146,8 +149,8 @@ required_rubygems_version: !ruby/object:Gem::Requirement
|
|
146
149
|
- !ruby/object:Gem::Version
|
147
150
|
version: '0'
|
148
151
|
requirements: []
|
149
|
-
rubygems_version: 3.
|
150
|
-
signing_key:
|
152
|
+
rubygems_version: 3.5.4
|
153
|
+
signing_key:
|
151
154
|
specification_version: 4
|
152
155
|
summary: Linux utility for automatic and secure unlocking of encrypted disks on reboot
|
153
156
|
test_files: []
|