• Leaflet@lemmy.worldOP
      link
      fedilink
      English
      arrow-up
      8
      ·
      3 days ago

      TPM unlocking FDE is complicated for me. I fully understand measured boot and support it, but it seems less secure to me than manually unlocking the disk.

      Once the disk is unlocked and you’re put onto the display manager, I feel like there are many more vulnerabilities that could be exploited to gain access to your data.

      With manually entering the disk password, the data is locked. You either need to brute force it or use the XKCD wrench method.

      So I feel TPM+Pin is the best for security. Unfortunately Aeon, which is based on OpenSUSE and implements TPM, doesn’t support TPM+Pin. I think it’s mainly due to how poor and widespread TPM support is. It could lock you out entirely.

      • TurboWafflz@lemmy.world
        link
        fedilink
        arrow-up
        1
        ·
        2 days ago

        What makes TPM+pin safer than just having a normal LUKS password? I would think it would be the same amount of security just with more chance of data loss if your computer gets damaged

        • Leaflet@lemmy.worldOP
          link
          fedilink
          English
          arrow-up
          1
          ·
          2 days ago

          TPM is used for measured boot. Measured boot can check various parts of the system to ensure they are the expected values haven’t been tampered with. You don’t want a part of the system to be replaced with malware and not realize it.

          If it detects something changed, it won’t release its secret. It may signal to you that something malicious was done or something benign that the OS updated didn’t account for.

            • Leaflet@lemmy.worldOP
              link
              fedilink
              English
              arrow-up
              2
              ·
              edit-2
              2 days ago

              A recovery code. I did a test install of Aeon and was given the code: dhnhlgc-fbndjbni-ufrkcfnk-nfebvtut-ftkkiiur-tijidtub-hujnucgu-erduhije

              64 digits, but only alphabetical and a certain subset (16/26) due to weirdness of keyboard layouts.

      • Tenderizer78@lemmy.ml
        link
        fedilink
        English
        arrow-up
        2
        arrow-down
        2
        ·
        edit-2
        2 days ago

        As I understand it the TPM is for people who have physical access. It prevents them from cloning your disk.

        I think with an adequately long password (or an adequately resource-intensive encryption algorithm) you can secure your disk enough to prevent unauthorized access. But the TPM would prevent them from removing your hard-drive and shunting it into a super-computer (so all password attempts wouldn’t need to be on the crummy 10-year old laptop CPU) so a TPM + password is more secure.

        • pmk@lemmy.sdf.org
          link
          fedilink
          arrow-up
          2
          ·
          2 days ago

          I’ve read the arguments and trust the people who know far more than I do about this, but… I just find it difficult to think of “unlocks automatically” as more safe than “is locked until I enter my password”. I’m open for it, but it just feels strange to me.

    • mholiv@lemmy.world
      link
      fedilink
      arrow-up
      1
      ·
      2 days ago

      Not really. Imagine they replace the ssh binary with a back doored version. Home directory encryption protects your data but not your system.

  • Is it possible to configure the kernel to allow access to decrypted contend only through the user session?

    Theoretically, kernel keys can be set to be readable only by the user session, and in an uncompromised root is not able to read those keys. I can imagine a filesystem encryption design that uses a user session key to en/decrypt data on the fly using a user session key, such that not even root or a process in another user session could read the mounted filesystem.

    Does such a system exist? As I understand, this is not the way dm-crypt or LUKS work. FDE and TPM are still vulnerable to hacking while everything is running, unlocked, and mounted.