Hi! I want to try out fedora workstation in the near future (once 39 is out) and was wondering if systemd-homed is ready for everyday use yet.

I’m a bit paranoid and really need my private data encrypted. However, I don’t think that full disk encryption is practical for my daily use. Therefore I was really looking forward to the encryption possibilities of systemd-homed.

However, after reading up on it, I was a bit discouraged. AFAIK, there’s no option to setup systemd-homed at installation (of fedora). I was an Arch then Manjaro, then Endeavour user for years but don’t have the time/patience anymore to configure major parrts of my system anymore. Also, the documentation doesn’t seem too noob-friendly to me, which also plays into the time/patience argument.

Is it ready? Can anyone seriously recommend it for a lazy ex-Arch user who doesn’t want to break another linux installation?

Thank you in advance. :)

You are viewing a single thread.
View all comments
0 points

To go back to basics, why is FDE not suitable for your needs?

permalink
report
reply
0 points
*

Simple convenience. I usually don’t have the time to wait one or two minutes until my full disk is decrypted (I am often late and the only person in a group meeting who brought a laptop for taking minutes).

I also use a weird keyboard layout (Neo 2) and I never got grub to load with that layout. Typing a 40+ passphrase in QWRETZ is just cumbersome to me.

Also: I hate to admit it, but I am a bit vain and simply would like a nice gui for entering my password.

Edit: I forgot to add that I’m playing with the idea of getting a surface tablet and installing linux on it. Then I couldn’t count on awlays having a usb keyboard with me.

permalink
report
parent
reply
0 points

You can setup FDE that utilizes TPM like Windows does with bitlocker, in such a way that your backup phrase is only necessary if something about your hardware changes.

Last I set it up however, there wasn’t any easy/automatic way. Searching “luks TPM” should get you started.

permalink
report
parent
reply
0 points

I need more than data security at rest. Reading out the keys from ram is well within my threat model.

permalink
report
parent
reply
0 points

Would a FDE with FIDO2 hardware key meet your needs?

permalink
report
parent
reply
0 points

I don’t think so. There’s a high likelihood of both laptop and key ending in the same hands if the laptop is stolen.

permalink
report
parent
reply
0 points

I have a LUKS-encrypted laptop (1GB SSD), it takes about 10 seconds between typing in the password and the start of the boot process.

permalink
report
parent
reply
0 points
*

Good for you. I have the same setup and it feels too slow to me.

permalink
report
parent
reply
0 points

That’s not answering his question.

permalink
report
parent
reply
0 points
*

I’d like to tell you why you get downvoted:

https://en.wikipedia.org/wiki/XY_problem

X Y problems exist. And are fairly common in IT. That’s why it’s a good idea to ask questions like this.

permalink
report
parent
reply
0 points

He doesn’t need to explain why he doesn’t like FDE, there are plenty of reasons. Shared device, or maybe 2nd level of encryption, whatever. He already said it wasn’t what he wanted, the why is none of your business. If you can answer his question, do. If you can’t, just say you can’t. His preference is his preference. Now, you going to help the guy or not?

Also, I honestly don’t give a flying f if I get downvoted for telling you what you did wrong. Being in the right is all I need, thanks. Won’t be seeing your reply, blocking you before you try to be more of a smug ass.

permalink
report
parent
reply
0 points

I second this.

Full disk encryption is entirely practical for everyday use. If you don’t already have a dedicated TPM, your motherboard/CPU may provide a software TPM (fTPM?). If so, you don’t even have to interact with the machine during boot. It’s just a bit slower to start up (by a few seconds), which really isn’t a big issue for your average user.

permalink
report
parent
reply
0 points
*

Pardon my ignorance here, but I don’t get it how is the whole thing still safe with unlocking from TPM instead of me providing the password at boot time?

Considering now anyone can just boot the machine into the installed system then bruteforce/exploit something to get login/get read permissions and make a plain copy of the data?
Where, without tpm, as long as I do not type in the encryption password myself I have a pretty high guarantee that the data is safe, especially when I am not at the (powered down) computer.

permalink
report
parent
reply
0 points

The idea behind it is that the files are stored encrypted at rest, which is really what you want, because once a system is booted, you have to play by the computer’s rules (respect file permissions, policies, etc.).

The TPM provides a secure mechanism to provide a decryption key to the computer during boot, eliminating the need for direct interaction.

Could it be compromised? Probably, but it would take considerably more effort than a man-in-the-middle on your keyboard via a logic analyzer.

permalink
report
parent
reply
0 points

As others explained: If the FDE key is in RAM, I’m vulnerable. My thread model includes a stolen Laptop with the attackers able to freeze my RAM and reading out the keys.

Thank you for mentioning TPM though. Didn’t know of that before. :)

permalink
report
parent
reply

Linux

!linux@lemmy.ml

Create post

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word “Linux” in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

  • Posts must be relevant to operating systems running the Linux kernel. GNU/Linux or otherwise.
  • No misinformation
  • No NSFW content
  • No hate speech, bigotry, etc

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

Community stats

  • 9.4K

    Monthly active users

  • 3.2K

    Posts

  • 37K

    Comments