On Sat, Feb 14, 2026 at 07:01:52AM +0000, [email protected] wrote:
> On Sat, Jan 24, 2026 at 04:21:28PM +0000, Crystal Kolipe wrote:
> >On Sat, Jan 24, 2026 at 04:09:25PM +0000, [email protected] wrote:
> >>With the SSDs that are present on nearly all servers these days,
> >>deleting data from the disk (e.g if it fails or if the disk is replaced)
> >>is not possible to do reliably. The only solution is to encrypt all
> >>system data (root, swap, etc) and then destroy the encryption key once
> >>the disk is no longer needed.
> >
> >If that is the problem you are trying to solve, you could simply use a
> >hard-coded passphrase or a keydisk volume on a permanently connected USB 
> >drive
> >or even the same disk, (depending on the exact level of destroyability you
> >want for the key data).
> 
> Permanently attaching a USB drive to a server rented in a remote
> datacenter from a large provider

This is the first time in this thread that you've mentioned the server being
in a remote datacenter that you don't have physical access to.

The most obvious solution to this aspect of the problem is to rent a dedicated
server in a datacenter where only you have access to your machine.

In practice, depending on what services are available 'locally', you might
have to rent a minimum of something like 4U of space to get your own
'locked box', but it's certainly possible.

That is by far a high enough level security for the majority of people.

Note that you need to consider this even in the case of using a passphrase at
the bootloader, because if anybody has physical access to the machines they
could just write a custom MBR which loads code to log your 'keypresses', and
write it to the boot disk.  You'd see ten minutes or so of downtime, which
could be passed off by the malicious party as a hardware problem.

> At the very least, it will require coordination with the
> hosting provider and payment of "remote hands" fees to have one of their
> engineers insert your USB stick in the server you rented from them.

So you want a high level of security, but don't want the fees associated with
that?

In that case, just rent any old cheap server and use it to relay encrypted
traffic to a machine in your own home on your home DSL line.  If your
residential ISP does not allow arbitrary inbound traffic, use an IPSEC tunnel
to the server.

That way, the server never sees any decrypted data or the keys.  Even if
somebody compromises it and fakes a connection to your server at home, they
can't do anything more than anybody could do by compromising any other piece
of network hardware along the path.

> What's more, it makes it impossible to reliably destroy the encryption
> key -- how do you ensure chain-of-custody and destruction of the USB
> stick once the server is decomissioned?

If you've followed my suggestion to rent a server in a datacenter where you
have physical access, then you can go and remove the USB drive yourself.

If not, (presumably due to cost), you first overwrite it at the raw device
level whilst still connected to the server.  This already gives a high degree
of confidence that the key has been destroyed.  The removal and delivery of
the usb drive introduces a small but non-zero level of risk.

> Putting key material on the same disk does not solve the problem, since
> data destruction on an SSD cannot be assured. Therefore, any plaintext
> key material on the disk cannot be reliably destroyed. This negates the
> whole point of the exercise.

Please _read_ and _understand_ what I post before replying.

I specifically qualified the idea of storing the key material on the same SSD:

" depending on the exact level of destroyability you want for the key data "

If you have a 4 Tb SSD, and it is either unencrypted or encrypted but you have
the key to decrypt it, then you potentially need to reliably overwrite and
therefore destroy 4 Tb of data.

In that case, it's plausible and even likely that useful scraps of data would
still survive on the flash memory chips, below the logical level that the SSD
controller presents to you as a block device.

At that point you already need a fair amount of knowledge or resources to
retrieve that data - either a custom firmware, or the ability to remove the
flash memory chips and read data directly from them.  Not really a job for a
home hobbyist.  But a plausable risk does still exist.

On the other hand, if you have a 4 Tb SSD, and it's encrypted with an
encryption key that is stored on the same device, then you only need to
adequately overwrite the blocks holding the key data.  As long as those blocks
are overwritten, the key is effectively destroyed.

For somebody to retrieve the key data after overwriting the SSD at a block
deivce level, all of the following would need to be true:

* The key data survived the overwrite because one or more copies of it were
  stored in flash memory blocks that the SSD did not make accessible as part
  of the logical block device it was presenting.

* Either somebody has enough knowledge to write a custom firmware to read
  those blocks, or enough knowledge and sufficient equipment to physically
  remove the memory chips and read them manually.

* They are able to identify the key material within 4 Tb of random looking
  data.

* Useful encrypted data, (that they can now decrypt), survived the initial
  overwrite.

Are you saying that this is not an acceptable level of security for your data?

> >If you have a specific threat model that you are trying to protect against,
> >and you believe that the only thing preventing you from doing that is the
> >inability to enter a passphrase at the bootloader without being at a keyboard
> >which is physically connected to the server, this suggests to me that your
> >logic is flawed elsewhere.  So it might be worth explaining exactly what you
> >are trying to do.

> Remote unlocking FDE using dropbear-initramfs is standard practice with
> other operating systems, and is widely supported as a solution to the
> problem of un-wipeable SSDs.

That is just a statement about 'other operating systems'.

OpenBSD is not 'other operating systems'.

You have not explained your threat model, so you have not answered the
question that would allow me or anybody else to give you suggestions or advice
for configuring an OpenBSD system to do what you want.

> The other solutions presented in this thread are either clever but
> unsupported (using TPMs) or impractical and fail to meet all
> requirements (USB stick).

If you consider dropbear-initramfs to be a solution to your threat model,
(which you have not elaborated on), then why not use an OS that supports this
mode of operation?

Note that there are a large number of OpenBSD installations in diverse places
all over the world, many of them performing critical security related duties.

Everybody else seems to have found an adequate solution to the problem you are
claiming exists.

Reply via email to