Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 25 Nov 2019 09:15:12 -0600
From:      Karl Denninger <karl@denninger.net>
To:        freebsd-questions@freebsd.org
Subject:   Re: Geli password over network strategies
Message-ID:  <070fde61-d128-bae6-b381-75c9a204980b@denninger.net>
In-Reply-To: <9dd8e65a-afdd-514f-0dc0-6bb60b9faaab@florencepaul.com>
References:  <4ac6ee31-ab05-97f6-da4b-c2d798651fdf@florencepaul.com> <9dd8e65a-afdd-514f-0dc0-6bb60b9faaab@florencepaul.com>

index | next in thread | previous in thread | raw e-mail

[-- Attachment #1 --]

On 11/25/2019 08:45, Paul Florence via freebsd-questions wrote:
> Hello everyone,
>
> I am currently running a home-made server with 12.0-RELEASE-p10 using
> full disk geli encryption. When I boot the server, I first have to
> type a password to decrypt the whole system.
>
> However, my ISP is having some power issues and in the last few weeks
> I had to go there quite a few times to type a passphrase.
>
> I would like now to be able to enter my passphrase over the network.
>
> Would the following boot process be possible ?
>
> 1. First boot from an unencrypted kernel from a USB stick.
>
> 2. Then start an SSH server.
>
> 3. Input my passphrase over an ssh terminal.
>
> 4. Use the provided passphrase as the geli secret to boot the OS from
> the disk
>
> If no, has anyone had to deal with this kind of problem ? If so, what
> kind of strategy did you decide to use ?
>
Yep.  My infrastructure is UPS backed but UPS batteries run out and then
things shut down.  When power comes back, well, I'd like to be able to
enter that password with REASONABLE security.

Here's my strategy for dealing with it.

Front-end the server with something that is a dedicated firewall and
WILL reboot on power fail and come back to multi-user, normal mode (I
use a pcEngines box that boots off SD and runs with root mounted
read-only; there is thus essentially zero risk of said box not coming
all the way back up unattended.)  It runs StrongSwan.

Now from "wherever" I can either ssh or VPN into that after a power
failure.  The main box is, at this point, sitting at a console prompt
asking for a GELI password as the loader requires it to unlock the root
ZFS pool.

I now have choices; I could have the big box set up to go to a serial
console and have the serial port plugged in but instead my usual choice
is to instead use the existing "big box's" IPKVM feature which I can
access via two means -- either over the VPN (since my laptop now appears
to be on the local LAN which has the IPKVM port on it) or I can sign
into the gateway and use "ssh" to set up a temporary tunnel to the
https: port on the IPKVM interface thereby allowing me to directly do a
"https://gateway-ip-address:whateverport" and sign into the IPKVM that
way, then use its functionality to get direct console access.  Either
way the session is encrypted so the password cannot be picked off.

-- 
Karl Denninger
karl@denninger.net <mailto:karl@denninger.net>
/The Market Ticker/
/[S/MIME encrypted email preferred]/

[-- Attachment #2 --]
0	*H
010
	`He0	*H

00H^Ōc!5
H0
	*H
010	UUS10UFlorida10U	Niceville10U
Cuda Systems LLC10UCuda Systems CA1!0UCuda Systems LLC 2017 CA0
170817164217Z
270815164217Z0{10	UUS10UFlorida10U
Cuda Systems LLC10UCuda Systems CA1%0#UCuda Systems LLC 2017 Int CA0"0
	*H
0
h-5B>[;olӴ0~͎O9}9Ye*$g!ukvʶLzN`jL>MD'7U45CB+kY`bd~b*c3Ny-78ju]9HeuέsӬDؽmgwER?&UURj'}9nWD i`XcbGz\gG=u%\Oi13ߝ4
K44pYQr]Ie/r0+eEޝݖ0C15Mݚ@JSZ(zȏNTa(25DD5.l<g[[ZarQQ%Buȴ~~`IohRbʳڟu2MS8EdFUClCMaѳ!}ș+2k/bųE,n当ꖛ\(8WV8	d]b	yXw	܊:I39
00U]^§Q\ӎ0U#0T039N0b010	UUS10UFlorida10U	Niceville10U
Cuda Systems LLC10UCuda Systems CA1!0UCuda Systems LLC 2017 CA	@Ui0U00U0
	*H
:P U!>vJnio-#ן]WyujǑR̀Q
nƇ!GѦFg\yLxgw=OPycehf[}ܷ['4ڝ\[p6\o.B&JF"ZC{;*o*mcCcLY߾`
t*S!񫶭(`]DHP5A~/NPp6=mhk밣'doA$86hm5ӚS@jެEgl
)0JG`%k35PaC?σ
׳HEt}!P㏏%*BxbQwaKG$6h¦Mve;[o-Iی&
I,Tcߎ#t wPA@l0P+KXBպT	zGv;NcI3&JĬUPNa?/%W6G۟N000k#Xd\=0
	*H
0{10	UUS10UFlorida10U
Cuda Systems LLC10UCuda Systems CA1%0#UCuda Systems LLC 2017 Int CA0
170817212120Z
220816212120Z0W10	UUS10UFlorida10U
Cuda Systems LLC10Ukarl@denninger.net0"0
	*H
0
T[I-ΆϏdn;Å@שy.us~_ZG%<MYd\gvfnsa1'6Egyjs"C [{~_KPn+<*pv#Q+H/7[-vqDV^U>f%GX)H.|l`M(Cr>е͇6#odc"YljҦln8@5SA0&ۖ"OGj?UDWZ5	dDB7k-)9Izs-JAv
J6L$Ն1SmY.Lqw*SH;EF'DĦH]MOgQQ|Mٙג2Z9y@y]}6ٽeY9Y2xˆ$T=eCǺǵbn֛{j|@LLt1[Dk5:$=	`	M00<+00.0,+0 http://ocsp.cudasystems.net:88880	U00	`HB0U0U%0++03	`HB
&$OpenSSL Generated Client Certificate0U%՞V=؁;bzQ0U#0]^§Q\ӎϡ010	UUS10UFlorida10U	Niceville10U
Cuda Systems LLC10UCuda Systems CA1!0UCuda Systems LLC 2017 CAH^Ōc!5
H0U0karl@denninger.net0
	*H
۠A0-j%--$%g2#ޡ1^>{K+uGEv1ş7Af&b&O;.;A5*U)ND2bF|\=]<sˋL!wrw٧>YMÄ3\mWR hSv!_zvl? 3_ xU%\^#O*Gk̍YI_&Fꊛ@&1n”} ͬ:{hTP3B.;bU8:Z=^Gw8!k-@xE@i,+'Iᐚ:fhztX7/(hY` O.1}a`%RW^akǂpCAufgDixUTЩ/7}%=jnVZvcF<M=
2^GKH5魉
_O4ެByʈySkw=5@h.0z>
W1000{10	UUS10UFlorida10U
Cuda Systems LLC10UCuda Systems CA1%0#UCuda Systems LLC 2017 Int CAk#Xd\=0
	`HeE0	*H
	1	*H
0	*H
	1
191125151512Z0O	*H
	1B@?._@5mw.G
bQJ).GPT3
CX1e0l	*H
	1_0]0	`He*0	`He0
*H
0*H
0
*H
@0+0
*H
(0	+7100{10	UUS10UFlorida10U
Cuda Systems LLC10UCuda Systems CA1%0#UCuda Systems LLC 2017 Int CAk#Xd\=0*H
	10{10	UUS10UFlorida10U
Cuda Systems LLC10UCuda Systems CA1%0#UCuda Systems LLC 2017 Int CAk#Xd\=0
	*H
b~m.G!X
Uꄆ)/E^nv
%pz	U溝HFuF#s(LAj<R7LkUTu[Ǝp?wLA}0
0?;3`x[x)xPzKf`)HܣB@<bZf~[&(6#@s<uj+-%q)H@<oQ/Jb
J\*UR`ȋ#*X.s8!F,x?Ck`^72C(L괈%su>mKtfVj6}0t.\N=6LVN(.'vb1/MGDŦc89d<ħ+1<tKh'߮E
%J0%4"EN;[>Ԣ7Ms._.~W0|AІ±
help

Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?070fde61-d128-bae6-b381-75c9a204980b>