Full disk encryption (https://en.wikipedia.org/wiki/Disk_encryption) should be default option… but the firmware does not contain the modules to encrypt the rootfs.
Please at least provide a tutorial on how to encrypt the rootfs with LUKS and how the remote pre-boot authentication could work.
Hello Lerry,
Thank you for your replay!
Most of the people have supported your project because they want to have a SECURE storage solution. If I can’t encrypt the OS on GnuBee I find it less secure than an ITX motherboard with encrypted OS and property BIOS. Without encrypted rootfs the use cases of GnuBee is very limited :(
All the popular linux distros offer the option to encrypt the OS. Debian also offers the option to encrypt the rootfs durring the install process on a PC. Nowadays this is basic on a secure system.
I would be happy to donate some money to you if you would make a tutorial about encrypting the rootfs with LUKS + pre-boot authentication. I’m sure others also would gladly support your effort on this! Could you make a tutorial about this? Please let us know if you would need support of the community.
In my opinion the benefits are the following in case if someone steals the device:
* the attacker has much less information about the entire system
* can not start the OS
* won’t know what kind of OS the device has
* the attacker can’t be sure what kind cypher and encryption method do I use
* I don’t have to worry about the trash dirs, cash files, temporary OS files, swap files and how knows what else data can the attacker find on the OS partition
ash < /dev/console > /dev/console 2>&1
1 & 2: An average burglar probably would not bother with this at all. In the country where I live this would take for the government minimum few weeks or in most cases probably moths. And One could say that she/he do not have the keys to unlock the system.
3 : Luckily this is not a common practice in the country where I live and there are many other similar countries in the world.
> Are you happy for the gnubee to boot into the initramfs, start sshd, and wait for you to ssh in and provide a password?
Yes, I would be very happy with this solution :)
Thank You very much for your valuable comment!
I have no time and the expertise to play with this but if someone would do it and would create a step-by-step guide I would donate some money to him!
Great, please let us know about your progress!
I was also wounder about the poor AES performance of the device.
With FDE it may be
usable only to store smaller amount of data because the slow speed
but would be great to see real performance benchmarks.
I was also wounder about the poor AES performance of the device.