On 5/16/2025 12:59 PM, whiteman808 wrote:
Hello,

Are there any advantages from putting Linux on encrypted root at bare metal 
server if I often access remotely server from ssh, and sometimes need to reboot 
it? What about key supplied during unlocking server after reboot or manually 
power on? Giving remotely password doesn't seems safe to me.

I want to protect against burglary and I'm not sure whether doing full disk 
encryption is a right way to go. Maybe should I just instead of trying to focus 
on the software side try to take more care of physical security?

Burglary is a difficult use case to protect against, because as you point out you need to provide the key somehow at boot.  There are TPM-based approaches that are not well-supported on Linux distros which try to ensure that the key is only readable if the disk is booted normally, but you're still vulnerable to any physical access OS vulnerability.

I run servers with full disk encryption on SOME of my storage, but not the OS drives. I store the key in a file on the OS drive. This obviously provides no security against burglary, but the benefit is that when a disk with sensitive data fails it is encrypted with a strong key (no memorable passphrase). You need both the OS disk and the encrypted disk to read anything sensitive, so I can just toss the failed disk in the trash. This also allows unattended boot.

Another approach you could consider is putting the key on another host available over the network. Your initramfs/etc could use a credential stored on it to access the remote host and retrieve the disk key. The remote host could be a Pi hidden someplace non-obvious. Then if the host is stolen and not kept powered on continuously (ie not a sophisticated attacker) the disk won't be readable, but it would boot just fine as long as it is attached to your LAN.

There might be some other variations on a theme like that using some sort of credential vault software. Approaches like that could also be used to remotely disable the device if you can't access it - the credential vault could be told to not provide the key any longer.

In any case there are definitely use-cases for full disk encryption that still add value even if it isn't as secure as having to remember a LUKS key on boot.

--

Rich


Reply via email to