Ubuntu 18.04 full system disk encryption with TPM2 support
I have decided to write down a fully-working procedure to encrypt a newly installed Ubuntu 18.04 system disk, with support for TPM2. This is a copy of my blog article "Ubuntu 18.04 and TPM2 encrypted system disk".
When you encrypt your entire disk, you are required to enter your passphrase every time you boot your computer. The TPM device has a purpose – keeping your secrets secure (available only to your running system), and combined with SecureBoot, which prevents any unknown kernel/disk from booting, and with BIOS password – you should be fully protected against data theft, even when an attacker has a physical access to your computer in the comfort of her home.
It is easier said than done. For the passphrase to work, you need to make sure your initramfs (the initial RAM disk) has the means to extract the passphrase from the TPM, and give it to the encryptFS LUKS mechanism.
I am assuming you are installing an Ubuntu 18 (tested on 18.04) from scratch, you have TPM2 device (Dell Latitude 7490, in my case), and you know your way a bit around Linux. I will not delay on explaining how to edit a file in a restricted location and so on. Also – these steps do not include the hardening of your BIOS settings – passwords and the likes.
Install an Ubuntu 18.04 System
Install an Ubuntu system, and make sure to select ‘encrypt disk’. We aim at full disk encryption. The installer might ask if it should enable SecureBoot – it should, so let it do so. Make sure you remember the passphrases you’ve used in the disk encryption process. We will generate a more complex one later on, but this should do for now. Reboot the system, enter the passphrase, and let’s get to work
Make sure TPM2 works
TPM2 device is /dev/tpm0, in most cases. I did not go into TPM Resource Manager, because it felt overkill for this task. However, you will need to install (using ‘apt’) the package tpm2_tools. Use this opportunity to install ‘perl’.
You can, following that, check that your TPM is working by running the command:
sudo tpm2_nvdefine -x 0x1500016 -a 0x40000001 -s 64 -t 0x2000A -T device
This command will define a 64 byte space at the address 0x1500016. It will skip the resource manager, and go directly to the device.
Generate secret passphrase
To generate your 64bit secret passphrase, you can use the following command (taken from here):
cat /dev/urandom | tr -dc ‘a-zA-Z0-9’ | fold -w 64 | head -n 1 > root.key
Add this key to the LUKS disk
To add this passphrase, you will need to identify the device. Take a look at /etc/crypttab (we will edit it later) and identify the 1nd field – the label, which will relate to the device. Since you have to be in EFI mode, it is most likely /dev/sda3. Note that you will be required to enter the current (and known) passphrase. You can later (when everything’s working fine) remove this passphrase
sudo cryptsetup luksAddKey /dev/sda3 root.key
Save the key inside your TPM slot
Now, we have an additional passphrase, which we will save with the TPM device. Run the following command:
sudo tpm2_nvwrite -x 0x1500016 -a 0x40000001 -f root.key -T device
This will save the key to the slot we have defined earlier. If the command succeeded, remove the root.key file from your system, to prevent easy access to the decryption key.
Create a key recovery script
To read the key from the TPM device, we will need to run a script. The following script would do the trick. Save it to /usr/local/sbin/key and give it execution permissions by root (I used 750, which was excellent, and did not invoke errors later on)
#!/bin/sh key=$(tpm2_nvread -x 0x1500016 -a 0x40000001 -s 64 -o 0 -T device | tail -n 1) key=$(echo $key | tr -d ' ') key=$(echo $key | /usr/bin/perl -ne 's/([0-9a-f]{2})/print chr hex $1/gie')
printf $key
Run the script, and you should get your key printed back, directly from the TPM device.
Adding required commands to initramfs
For the system to be capable of running the script, it needs several commands, and their required libraries and so on. For that, we will use a hook file called /etc/initramfs-tools/hooks/decryptkey
#!/bin/sh PREREQ="" prereqs() { echo "$PREREQ" } case $1 in prereqs) prereqs exit 0 ;; esac . /usr/share/initramfs-tools/hook-functions copy_exec /usr/sbin/tpm2_nvread copy_exec /usr/bin/perl exit 0
The file has 755 permissions, and is owned by root:root
Crypttab
To combine all of this together, we will need to edit /etc/crypttab and modify the argument (for our relevant LUKS) by appending the directive ‘keyscript=/usr/local/sbin/key’
My file looks like this:
sda3_crypt UUID=d4a5a9a4-a2da-4c2e-a24c-1c1f764a66d2 none luks,discard,keyscript=/usr/local/sbin/key
Of course – make sure to save a copy of this file before changing it.
Combining everything together
We should create a new initramfs file, however, we should make sure we keep the existing one for fault handing, if required to. I suggest you run the following command before anything else, so keep the original initramfs file:
sudo cp /boot/initrd.img-`uname -r` /boot/initrd.img-`uname -r`.orig
If we are required to use the regular mechanism, we should edit our GRUB entry and change the initrd entry, and append ‘.orig’ to its name.
Now comes the time when we create the new initramfs, and make ourselves ready for the big change. Do not do it if the TPM read script failed! If it failed, your system will not boot using this initramfs, and you will have to use the alternate (.orig) one. You should continue only if your whole work so far has been error-free. Be warned!
sudo mkinitramfs -o /boot/initrd.img-`uname -r` `uname -r`
You are now ready to reboot and to test your new automated key pull.
Finale
This setup is not fully hardened. To complete the hardening process, you must protect the BIOS with a password, and must make sure no other boot devices can be used. This will leave your computer able to boot only from this boot device (not allowing TPM query through other boot media). You will also want to enable SecureBoot feature on your BIOS, and consider signing your boot yourself.
Troubleshooting
Things might not work well. There are a few methods to debug.
Boot the system with the original initramfs
If you discover your system cannot boot, and you want to boot your system as-it-were, use your original initramfs file, by changing GRUB during the initial menu (you might need to press on ‘Esc’ key at a critical point) . Change the initrd.img-<your kernel here> to initrd.img-<your kernel here>.orig and boot the system. It should prompt for the passphrase, where you can enter the passphrase used during installation.
Debug the boot process
By editing your GRUB menu and appending the word ‘debug=vc’ (without the quotes) to the kernel line, as well as removing the ‘quiet’, ‘splash’ and ‘$vt_hansoff’ directives, you will be able to view the boot process on-screen. It could help a lot.
Stop the boot process at a certain stage
The initramfs goes through a series of “steps”, and you can stop it wherever you want. The reasonable “step” would be right before ‘premount’ stage, which should be just right for you. Add to the kernel line in GRUB menu the directive ‘break’ without the quotes, and remove the excessive directives as mentioned above. This flag can work with ‘debug’ mentioned above, and might give you a lot of insight into your problems. You can read more here about initramfs and how to debug it.
Conclusion
These directives should work well for you. TPM2 enabled, SecureBoot enabled, fresh Ubuntu installation – you should be just fine. Please let me know how it works for you, and hope it helps!
Additional Resources
You can read more at my blog. You will find there various technical articles (such as this one). Since I do not visit Linkedin frequently enough, you are most invited to comment on the original post, with questions or whatever, and I will respond with whatever help I can offer.
Thanks for reading!
IT Professional, Project Manager, Entrepreneur
2 年Hi Etzion, Thanks for the article. Is it possible to do a full disk encryption on Ubuntu Server 18.04 on an existing installation without re-installing the OS?
Directeur TI
4 年Hi Etzion, do you know a complete how-to guide starting with TPM2 complete installation and configuation that will fit your guide, I've read so many posts and tryied a lot of different ways without success, I want to encrypt a complete drive and store the key inside the TPM chip ... thank you