ouch@lemmy.world to Linux@lemmy.ml · 2 months agoVPS encryptionmessage-squaremessage-square35fedilinkarrow-up168arrow-down12file-text
arrow-up166arrow-down1message-squareVPS encryptionouch@lemmy.world to Linux@lemmy.ml · 2 months agomessage-square35fedilinkfile-text
minus-squareNegativeLookBehind@lemmy.worldlinkfedilinkEnglisharrow-up5arrow-down8·2 months agoLUKS VPN Encrypt sensitive files
minus-squarePossibly linux@lemmy.ziplinkfedilinkEnglisharrow-up5·2 months agoThat only works if the decryption is happening on hardware you control. You can not trust any part of the VPS including the memory and CPU
minus-squareboredsquirrel@slrpnk.netlinkfedilinkarrow-up3·2 months agoSo how do you decrypt the LUKS vault when you have no sshd running as that thing is not up yet?
minus-squarefuzzy_feeling@programming.devlinkfedilinkarrow-up4·2 months agoyou can but an ssh server in your initramfs. dropbear-initramfs i guess was the name in debian.
minus-squareboredsquirrel@slrpnk.netlinkfedilinkarrow-up1·edit-22 months agoPretty cool! Android and ChromeOS both also just use fuse for userspace (and user-files) encryption. This could totally be used too. But of course, if something is not on your RAM it is not safe
minus-squareNegativeLookBehind@lemmy.worldlinkfedilinkEnglisharrow-up1·2 months agoDo VPSs typical give you LOM? Honest question. Maybe LUKs isn’t good if you can’t console in.
minus-squareZikeji@programming.devlinkfedilinkEnglisharrow-up5·2 months agoLUKS, or anything that relies on the server encrypting, is highly vulnerable (see schizo@forum.uncomfortable.business’s response). Your best bet would be encrypting client side before it arrives on the server using a solution like rclone, restic, borg, etc.
minus-squareboredsquirrel@slrpnk.netlinkfedilinkarrow-up2·2 months agoYes. No proof their LUKS prompt isnt tampered with
minus-squarelud@lemm.eelinkfedilinkarrow-up1·2 months agoYeah, at least the ones I used have some kind of console/terminal you can use and often you can access BIOS and reinstall the OS if you want.
minus-squareJubilantJaguar@lemmy.worldlinkfedilinkarrow-up1·2 months agoAnother option: encrypt a sparse file rather than a disk volume. Mount the file to local filesystem and open and close it there.
LUKS
VPN
Encrypt sensitive files
That only works if the decryption is happening on hardware you control. You can not trust any part of the VPS including the memory and CPU
So how do you decrypt the LUKS vault when you have no sshd running as that thing is not up yet?
you can but an ssh server in your initramfs.
dropbear-initramfs i guess was the name in debian.
Pretty cool!
Android and ChromeOS both also just use fuse for userspace (and user-files) encryption. This could totally be used too.
But of course, if something is not on your RAM it is not safe
Do VPSs typical give you LOM? Honest question. Maybe LUKs isn’t good if you can’t console in.
LUKS, or anything that relies on the server encrypting, is highly vulnerable (see schizo@forum.uncomfortable.business’s response).
Your best bet would be encrypting client side before it arrives on the server using a solution like rclone, restic, borg, etc.
Yes. No proof their LUKS prompt isnt tampered with
Yeah, at least the ones I used have some kind of console/terminal you can use and often you can access BIOS and reinstall the OS if you want.
Another option: encrypt a sparse file rather than a disk volume. Mount the file to local filesystem and open and close it there.