[pkg-cryptsetup-devel] Bug#978642: Wipe LUKS Disk Encryption Key for Root Disk from RAM during Shutdown to defeat Cold Boot Attacks from Initial Ramdisk (initramfs-tools or dracut)
adrelanos at riseup.net
Tue Dec 29 15:51:40 GMT 2020
X-Debbugs-CC: whonix-devel at whonix.org
systemd does not wipe the LUKS disk encryption key for root disk from
RAM during shutdown.
Quote myself :
> Avoiding all sidelines, keeping this simple, for my understanding and
for the record and please correct me if I am wrong... Summary:
> "cryptsetup close" of root device during shutdown is already implemented.
Quote systemd developer Lennart Poettering :
> iff your initrd/distro of choice do so. For the root disk it doesn’t
matter what systemd does, it matters what the initrd/distro do. hence
ping the maintainers of those.
The purpose of this is to defeat a cold boot attack.    
Debian package cryptsetup-suspend  wipes LUKS disk encryption key for
root disk from RAM during during system suspend but not during system
shutdown as far as I know. Please correct me if I am wrong, however it
sounds to be as if wipe during shutdown might be substantially easier
than wipe during suspend.
Or perhaps "Wipe LUKS Disk Encryption Key for Root Disk from RAM during
Shutdown" is already implemented in initramfs-tools or dracut?
I reported this bug against Debian cryptsetup. However, I don't know, if
this this is (partially) also a task for initramfs-tools or dracut.
Please kindly move / re-assign this ticket as appropriate.
More information about the pkg-cryptsetup-devel