On 01/12/15 19:57, Marek Marczykowski-Górecki wrote:
> On Sun, Jan 11, 2015 at 08:47:42PM -0600, Jake wrote:
>> did some poking around and, afaict, qubes uses LUKS with the default
>> parameters. i found some cryptsetup defaults at
>>
>>
https://wiki.archlinux.org/index.php/Dm-crypt/Device_encryption
>>
>> this shows that cipher, key size, (pbkdf) hash algo and iter time are
>> aes-xts-plain64, 256, sha1 and 1000 ms, respectively.
>>
>> i'd like to change these to non-default settings, but i'm not very
>> familiar with the install process for qubes. as best i can tell, these
>> knobs are not exposed by the qubes installer and i didn't see anything
>> about it in the archive. i've used openbsd and bitrig for many years and
>> i can just drop to shell before kicking off the install and manually
>> configure FDE. is there a a similar process for manually configuring the
>> LUKS volume when installing qubes?
> You can switch to terminal with Alt-Ctrl-F2 and create LUKS partition
> manually.
marek,
thanks for the clues. i got it working after several failed attempts, so
i'll include the steps i took in case anyone else wants to tinker with
the LUKS knobs.
- boot into installer, wait for first gui screen to appear where it asks
about language/localization
- hit Ctrl+Alt+F2 on your keyboard to escape to a shell session. NOTE:
my laptop keyboard did not work properly, had to plug in a USB keyboard
- check and adjust the partitioning on the drive you plan to install to
with parted. i left the partition table as "msdos"/MBR type, created a
500 MB ext4 bootable partition with mount point /boot, and created
another partition for the rest of the disk.
- run "cryptsetup luksFormat <options> <rest of disk device>" to set the
LUKS options just so and set the passphrase
- make sure the new container works by doing "cryptsetup luksOpen root"
then "mkfs.ext4 /dev/mapper/root" to format it, then mount it, umount
it, and finally "cryptsetup luksClose root".
- everything should be set with the preparation, so hit Ctrl+Alt+F7 to
go back to the gui installer
- continue installing per the usual and when you get to the disk
partitioning/allocation part, pay attention
- when you select the disk, it will complain about only having a few MB
of space, uncheck the "Encrypt and ask me about the passphrase later"
box and hit the Custom button.
- in this menu, you should see the unencrypted boot partition and an
encrypted LUKS partition. you need to unlock the LUKS partition here,
i.e. enter passphrase.
- this next part was a bit glitchy but i managed to get it working after
a reboot. you need to set the mount points on these partitions once the
LUKS is unlocked. set the mount point for the LUKS partition as /, make
sure the encrypted box stays checked and that you check the format box
(req'd for root partition). similarly, set /boot as the mount point for
the unencrypted boot partition.
- now the install should complete without event and you have a LUKS
container with the options you set above.
i relied mainly on the 1st link listed below with some additional info
from the others.
http://thesimplecomputer.info/full-disk-encryption-with-ubuntu
https://code.google.com/p/cryptsetup/wiki/FrequentlyAskedQuestions
http://www.cyberciti.biz/hardware/howto-linux-hard-disk-encryption-with-luks-cryptsetup-command/
regards,
jake