You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The encryption-option uses a keyfile (/crypto_keyfile.bin), which is included in initramfs for booting the system by crypttab option (keyscript=/bin/cat). The initramfs are not protected by root privileges, so key is output of cat and could be extracted... I think the keyscript option in crypttab is not used anymore.
Usually for Debian-distros you should following steps:
And if that is (what you described above) a general clamares and/or debian security issue, you have to fill a bug/issue against calamares and/or debian!
It ist about the permissions of initramfs "umask=0077". This ist already fixed and implemented for Calamares and Debian. It was also fixed for archlinux mkinitcpio... Above I described one solution for this problem...
I think in bullseye-install-media Calamares AND "Debian" put a own "umask=0077-file" into /etc/initramfs-tools/conf.d directory. Maybe it is the way Calamares and/or Debian Installation Media are configured.
The encryption-option uses a keyfile (/crypto_keyfile.bin), which is included in initramfs for booting the system by crypttab option (keyscript=/bin/cat). The initramfs are not protected by root privileges, so key is output of cat and could be extracted... I think the keyscript option in crypttab is not used anymore.
Usually for Debian-distros you should following steps:
Step 2 tells initramfs-generation using the keyfile and step 3 uses restrictive privileges for the initramfs archives.
The text was updated successfully, but these errors were encountered: