If you have a LUKS container and want it to unlock, without reading the scripts, run sudo ./install.sh
. This will:
1. create a crypttab for you (unless one exists)
2. install libtss2 and associated
3. patch cryptsetup scripts, include necessary components in the initramfs
4. update the initramfs
and then you may need to use 'systemd-cryptenroll' to enroll a LUKS TPM2 key, if you haven't done that already.
Current installations of Ubuntu come with System D that are built to support TPM2 already. If you're trying to get older Ubuntu to work with a TPM, you'll need to modify the scripts to build SystemD with TPM2 support enabled. Code is available in the install script, it will install Docker on your host system and then do all the work inside docker, so there is minimal impact. The CWD will get some extra packages added to it, plus some extra directories with source files inside, but you can ignore all of that - once the script has completed successfully this entire directory can be removed.
- Read the scripts for full details of what's happening. They've been documented by function names, and should be reasonably easy to understand both what's happening and why it is happening. start with install.sh 'tldr_just_Work' and read the rest of the functions from there.
- patches/cryptroot.patch patches /usr/share/initramfs/local-top/cryptroot
- patches/cryptsetup_functions.patch replaces /usr/lib/cryptsetup/functions.sh
- systemd_cryptsetup_hook adds to /etc/initramfs-tools/hooks
These files build on the 'cryptroot' module in initramfs-tools/cryptsetup to allow the bash /etc/crypttab
file to support the 'tpm-device=xxx' option and pass it through to the systemd-crypsetup application to allow automatically decrypting a device using LUKS and a TPM.
To compile Systemd with TPM2 support, the script build_systemd_with_tpm2_support.sh
can be used to either build inside a fresh ubuntu:22.04 image, or on the host.
This will create the deb files for system in the current working directory.
To build inside a fresh docker image: ./build_systemd_with_tpm2_support.sh
Or, to build on this host directly: ./build_systemd_with_tpm2_support.sh on_this_host
I've been unable to establish who publishes the files I've patched and how they are licensed, so I've only included the patch here so I do not infringe anyone's copyright or break licensing.
This is a rough and ready summary of the process to get a system running with an encrypted root. It isn't as detailed as I'd like and there are more ways to get this to work (Work in Progress!). A lot of this has been developed from the excellent articles in Arch Linux, so if there are steps missing you may need to read around the issues, or ask in the 'Issues' and someone (possibly me) will answer when they can.
Potentially useful pages for more context:
- https://wiki.archlinux.org/title/Trusted_Platform_Module#Data-at-rest_encryption_with_LUKS
- https://wiki.archlinux.org/title/Dm-crypt/Encrypting_an_entire_system
- https://wiki.archlinux.org/title/Data-at-rest_encryption
NB: big thanks to the authors of these articles - they helped me get most of the way here!
(using an Ubuntu Desktop live environment some of 1, 2 & 3 probably needs to be done before starting the installer)
- create partitions
- assign space for unencrypted EFI system partition (stores grub2, Linux Kernel and initrd image or other system software)
- assign space for the LVM PV and any other un-encrypted partitions you may want
- assign space for the un-encrypted /boot partition (which may be removed if using a unified kernel image after the system has been configured) - done at the end to allow extending the PV partition in to it with pvresize.
- Format with LUKS
- Use lvm
- pvcreate
- vgcreate
- lvcreate
- Install Ubuntu in to correct LV and unencrypted EFI system and /boot partitions!
- Reboot in to the new Ubuntu environment:
- the system halts in the initrd shell as it does not know how to unlock the LUKS (crypttab not yet created) and find the LV used as root.
- the user has to manually unlock the LUKS partition with cryptsetup, then exit the shell and the system continues to boot.
- Install git, get this repo, run
sudo ./install.sh
- Store a key in the TPM for LUKS
systemd-cryptenroll
- Reboot.
NB: This doesn't protect against a modified initrd as yet. That's another stage of configuring secure boot and creating an (optionally signed) Unified Kernel Image (or enabling key verification with GRUB2 or something along those lines!) But this is a good step on the way! NB2: Apparently the Linux kernel now measures it's own initrd, so if the systemd-cryptenroll is called with the correct registers, then that may be covered off (see issue 2) linked below.
Check this issue for more details about below and any discussion of other attacks to be aware of - or to share details of other attacks that users should be aware of!
You may want to create a unified kernel - this protects against a modified initrd attack. See: this repo]
SecureBoot uses cryptographically signed bootloaders to ensure that the BIOS will not even load an attacker's OS on your hardware. Useful if you are concerned about an attacker repurposing your kit. There's nothing here for now, so read around the topic and feel free to create an issue with comments or even a Pull Request with a link to your repository here.