On 08/13/2018 05:32 PM, joevio...@gmail.com wrote:
On Monday, 13 August 2018 17:13:06 UTC-4, Chris Laprise  wrote:
On 08/13/2018 04:47 PM,
Related question.

If I installed Qubes and used LUKS encryption (I have to run cryptsetup 
openLuks just to see the LVM inside)... then I add physical drives to my Volume 
Group, and start adding more AppVMs to the pool, that starts writing to the 
PV...
Is the data on the new drive, encrypted?
Can anyone forensically pull data from those new AppVMs since it wasn't 
originally a part of the LUKS encrypted drive?

Based on the sparse description I'd say No, the new space is not
encrypted. You have to add separate LUKS/dmcrypt block layers to those
new devices and then treat those dmcrypt block devices as the new pvs.

If you're doing this to qubes_dom0, then it could be a little tricky
getting all of the encrypted "pvs" to unlock at the same time during the
boot process. You'd need to investigate how crypttab and grub
accommodate that multi-volume setup.

--

Chris Laprise
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886


I would imagine it would require a longer grub entry with rd.luks attributes 
for other UUIDs.

Yes, but if you can get crypttab to accept multiple volumes that share a keyfile or password then dracut may be able to setup the grub entries automatically.


But it seems I have an LVM over LUKS configuration... when what I want is a 
LUKS over LVM.

[...]

The problem is that Qubes 4.0 manipulates lvm directly so unless you opt for Qubes managing your vms with Ext4 image files (not a nice way to go), what you could end up with is:

lvm --> luks --> lvm --> device

And I don't think that could truly work under ideal conditions because thats COW on top of COW. This is also the reason that Btrfs on lvm is frowned upon... stacking this way is not reliable.

If I choose btrfs for my next install, I can avoid the LVM problems, but can I 
expand onto new physical volumes by adding more drives?

IMO, Btrfs gives you some added reliability and simplicity - devices can be added and removed with ease, even when it reduces overall space. But since encryption is still a separate luks layer you're still faced with managing multiple luks volumes under Btrfs.

The only other possibility I can think of is to experiment with ecryptfs on top of Btrfs. If you got it to work with Qubes it could span physical volumes easily and the main (only?) downside would be increased vulnerability to _physical_ (not remote) attacks.


--

Chris Laprise, tas...@posteo.net
https://github.com/tasket
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f0e94454-b91f-547b-17fd-f7697c2c4a31%40posteo.net.
For more options, visit https://groups.google.com/d/optout.

Reply via email to