This article provides a step-by-step guide on how to install an Ubuntu Linux system with full disk encryption (new installation). However, you should take a relaxed day as topical newbie for further reading. You don't have to keep everything in mind but it is never an error to acquaint oneself with something new.
The described setup was tested with the following versions (32bit and 64bit):
- Ubuntu 9.04 Jaunty, 9.10 Karmic, 10.04 Lucid, 10.10 Maverick, 11.04 Natty, 11.10 Oneiric.
- Kubuntu 10.04 Lucid, 11.04 Natty.
- I did not have the time to test every version out there. Therefore it does not mean that this manual does not work for you if your version is not listed above.
In this case, full disk encryption means:
- All non-boot data of the system will be encrypted (incl. temporary files and swap)
- Only a small boot partition remains unencrypted to store the boot loader and the kernel. The security of your data won't be affected by this.
Additional key points:
- This how-to does not use the (IMHO inflexible) Alternate-CD crypto setup.
- There will be a separate
/homepartition within the encrypted volume, making backups and fresh installations easier.
- Despite the fact that there is more than one single encrypted partition, you only have to enter one single password during boot time. The Logical Volume Manager (LVM) is used to make this possible. LVM will be used as “crypto container”, containing the different partitions
- You don't loose any comfort – apart from the password question when the system boots, you don't have to expect any changes during daily usage. This is also true regarding kernel and/or distribution updates, there is nothing special to keep in mind. Therefore it is really worth it to tough it out.
- Suspend-to-disk (S4)/hibernation works (if it also would work on an unencrypted installation, for sure).
- Thanks to Logical Volume Manager (LVM), subsequent partitioning changes are possible.
Short summary to get an overview of the actions needed to be done:
- Boot a live session plus install the needed software (LVM, LUKS/cryptsetup).
- Subdivide the target device into two partitions:
- small boot partition (~200MB are more than enough)
- unformatted partition (remaining space)
- Encrypt the unformatted partition, unlock it afterwards.
- Creation of a LVM group on the unformatted, unlocked crypto partition, containing the root, home and swap partition.
- Start of the graphical Ubuntu installation wizard, telling it to use the root, home and swap partition within the encrypted LVM group plus the small, unencrypted partition as
- Do not reboot directly after the installation wizard finished its work. Change into the freshly installed system with
chrootinstead. This is needed to install the required software (LVM, LUKS/cryptsetup) on it (you won't be able to boot it otherwise).
If it's all Greek to you, don't be scared. It is no rocket science.
The very good article Linux Magazin 2005/08: Geheime Niederschrift - Festplattenverschlüsselung mit DM-Crypt und Cryptsetup-LUKS: Technik und Anwendung is still valid and contains much LUKS background knowledge, e.g. preventing some questions why a special encryption method is (not) used. If you don't understand German, have a look at the Wikipedia articles about Disk encryption theory, LUKS, AES, and Block cipher modes of operation.
However, you can still install and use the crypto system, even if you are not interested in this additional information.
- A Ubuntu installation CD (not the Alternate-CD) to be able to start a live session: download
- Working Internet connection. You have to install some additional software packages during the live session (for which Internet connection is necessary). It is probably most convenient to connect your system to a Internet router or something similar to prevent needless configuration at the live session. If your network card does not work out-of-the-box, you may want to temporarily install a cheap Realtek NIC or something like that.
Before you paralyze your real system, it is a good idea to try everything out in a virtual machine.
Semi-automatic installation by script (recommended)
I provide a crypt-setup bash script, making the system installation faster and easier. The scripts prompts the user to enter the needed data (target device, partition sizes, key length etc.) and processes the installation as described at ”Manual installation” afterwards. This saves much typing and prevents errors. Using the script, a full disk encryption setup should only take a few minutes longer than a default installation.
- Start the live session. Boot from the installation CD and start a live session (not the installer). The fitting menu item should be “Try Ubuntu” or something similar (the notation may vary a little bit, depending on the Ubuntu version and when/if a key was pressed). Please choose the language you are going to use on the installed system right from the start. This prevents problems regarding the keyboard layout and the password setup.1)
- Run the script. Open a terminal and run the following commands to download and start the script (copy and paste recommended):
wget "http://blog.andreas-haerter.com/_export/code/2011/06/18/ubuntu-full-disk-encryption-lvm-luks.sh?codeblock=1" -O "/tmp/ubuntu-full-disk-encryption-lvm-luks.sh" chmod a+rx "/tmp/ubuntu-full-disk-encryption-lvm-luks.sh" sudo "/tmp/ubuntu-full-disk-encryption-lvm-luks.sh"
You have to replace
sdX by your own target decive (e.g.
hda). Pay attention to this if you are going to copy & paste the commands.
Start the live session
Boot from the installation CD and start a live session (not the installer). The fitting menu item should be “Try Ubuntu” or something similar (the notation may vary a little bit, depending on the Ubuntu version and when/if a key was pressed). Please choose the language you are going to use on the installed system right from the start. This prevents problems regarding the keyboard layout and the password setup.2)
Install needed packages
Because the full disk encryption will be prepared by using a live session (which brings no more than what is absolutely necessary), you have to install some additional packages plus their dependencies for the running session (
cryptsetup). Open a terminal and execute the following command:
sudo apt-get install lvm2 cryptsetup
You can't reboot for understandable reasons (→live session, your changes would be gone after a reboot). This is why you have to load a needed kernel module manually (provided by the packages you installed) using the termimal:
sudo modprobe dm-crypt
Now the current live session does provide everything you need to install the encrypted system.
Create needed partitions
You have to subdivide the target hard disk into two partitions. This will be done with GParted.3) Start it via terminal (→
gksudo gparted) or by clicking “System→Administration→GParted”
The following partitions are needed:
dev/sdX1, ext3, 200MB at the beginning
You can use up to 17 chars for the description. I chose “boot (no crypt)”.
dev/sdX2, unformatted, at least 8GB (the root, home and swap partitions need to find room).
You can use up to 17 chars for the description. I chose “sys (lvm,crypt)”. Normally, you should simply use all remaining space (how it was done in the following).
You can close GParted after all operations were applied (→ green check mark).
Prepare the device
If the target device stored unencrypted data until now, you may want to overwrite the partitions with random data first. This securely prevents all (theoretical!) risks to restore data fragments:
sudo shred -vn 1 /dev/sdX1 sudo shred -vn 1 /dev/sdX2
The whole process is also a good stress test of your hard disk but may needs several hours or even days (depending on the disk size and your CPU).
If your device was already encrypted (or you aren't a security fanatic) you may ignore this. You also should skip this if you are using a SSD.
sdX2 will be prepared to act as crypto device by using the
cryptsetup luksFormat command. This is also the moment to decide which encryption algorithm, chaining mode and initialization vector should be used.
aes-xts-plain is recommended because it brings protection against so called “watermarking” and other known attacks plus encrypts your data securely by using AES:
sudo cryptsetup --cipher aes-xts-plain --key-size 512 --verify-passphrase luksFormat /dev/sdX2 [define the password. Attention: there will be no feedback like * or something similar]
Choose a long, secure password or pass phrase. Even the best encryption is nearly useless if your password is weak.
After formatting, the crypto device needs a name and has to be unlocked to make it possible for the installer to access it. The device is accessible via
/dev/mapper/<chosen name> if everything works. I chose the name
sudo cryptsetup luksOpen /dev/sdX2 lvm_crypt
XTS supports 128 or 256 bit keys. In this case, the keysize of 512 means that both AES and XTS are using the maximum keysize of 256 bit. For slower systems,
--key-size 256 comes into question which equates to a 128 bit encryption.
XTS is available since Ubuntu 8.04 (Hardy Heron) and is more secure than CBC. Therefore
aes-xts-plain is preferable to the frequently-used
aes-cbc-essiv:sha256 (however, it is still secure and there is no real alternative if an old kernel has to be used).
aes-cbc-plain has to be considered as vulnerable, ESSIV instead of PLAIN as initialization vector is strongly recommended in combination with CBC.
The Logical Volume Manager (LVM) won't be used to connect multiple drives here. It is used to prevent the management of different keys respectively the need to type multiple passwords when booting the system. Because
/home gets its own partition and
swap is also encrypted, you normally would have to type a separate password for each partition. To bypass this annoyance, a LVM volume incl. LVM volume group will be generated within the opened crypto partition you created earlier by using the
pvcreate is used to initialize the LVM volume,
vgcreate creates the LVM volume group within the LVM volume:
sudo pvcreate /dev/mapper/lvm_crypt sudo vgcreate ubuntu /dev/mapper/lvm_crypt
Now you are able to create the needed partitions within the LVM volume respectively the LVM volume group
ubuntu. Swap should be ~1.3 times greater as your installed RAM (at least if you want a solid suspend-to-disk (S4)/hibernation). If space is rare (e.g. when using a SSD), you certainly want to use less. But opinions about a sane swap size differ as much as the ones about the size of the root partition. This is why you should look at the following values as an example (but they can be adopted without any problems). The PC I used to write this article got 4GB RAM (→ multiplied by 1.3 = 5200MB swap) and I created a 25GB root partition:
sudo lvcreate -L 5200M -n swap ubuntu sudo lvcreate -L 25000M -n root ubuntu sudo lvcreate -l 100%FREE -n home ubuntu
If you need additional/other partitions, you can create them by using the same schema. If you have problems with the syntax,
man lvcreate may be helpful.
You should format the created partitions to prevent problems with some versions of the graphical Ubuntu-installer
ubiquity (during the graphical installation of the real system, the partitions will be formatted again. So don't worry if you want to choose another file system than EXT4: you can choose it there):
sudo mkswap /dev/mapper/ubuntu-swap sudo mkfs.ext4 /dev/mapper/ubuntu-root sudo mkfs.ext4 /dev/mapper/ubuntu-home
The needed preparations of the encrypted device are finished now. All needed partitions are existing and the installation of the real system can begin.
Installation of the system
After choosing language, time zone etc. you have to choose “specify partitions manually” at the “Prepare disk space” window (the notation may vary a little bit, depending on the used Ubuntu version). There you have to assign the partitions you created before:5)
- Boot partition
- File system (“use as”): ext3 journaling file system (no ext4 to prevent compatibility issues)
- Format the partition: yes
- Mount point:
- Root partition
- File system (“use as”): ext4 journaling file system (or your own option)
- Format the partition: yes
- Mount point:
- Home partition
- File system (“use as”): ext4 journaling file system (or your own option)
- Format the partition: yes
- Mount point:
Complete the setup by following the instructions of the installation wizard. You may activate the “Log in automatically” option (without bad conscience) to prevent the need for typing an additional password before logging in. The encryption password should be enough in single-user environments. Do NOT reboot the system after the installer finished. There is still some work to do.
If you would reboot your system now, the installed system couldn't boot. It still needs the software to access the encrypted drive and has to prompt the user for the password. Therefore we use
chroot to change into the freshly installed system to install the needed packages
cryptsetup (Attention: all following commands have to be executed within the same terminal window. And don't forget to replace
sdX1 with your own partition, e.g.
sudo mount /dev/mapper/ubuntu-root /mnt sudo mount /dev/sdX1 /mnt/boot sudo mount -o bind /dev /mnt/dev sudo mount -t proc proc /mnt/proc sudo mount -t sysfs sys /mnt/sys sudo cp /etc/resolv.conf /mnt/etc/resolv.conf sudo chroot /mnt /bin/bash apt-get install cryptsetup lvm2
You can ignore
update-initramfs warnings (“Can not write log…”, “cryptsetup: WARNING: invalid line in /etc/crypttab”, “Cannot find /lib/modules/[…]-generic”)
Now, you are almost done. Ubuntu was installed into a LVM group on a crypted drive and has the software necessary to decrypt the data. In order to ask the drive to decipher automatically when booting the system, you have to write a fitting UUID entry for the
/dev/sdX2 partition into the
/etc/crypttab file. The following command detects the UUID and writes the needed line into
/etc/crypttab (don't forget to replace
sdX2 with your own partition, e.g.
echo "lvm_crypt UUID=$(ls -la /dev/disk/by-uuid | grep $(basename /dev/sdX2) | cut -d ' ' -f 9) none luks" >> /etc/crypttab
The system has to inherit the
/etc/crypttab changes now (you can ignore “cryptsetup: WARNING: invalid line in /etc/crypttab” and “Cannot find /lib/modules/[…]-generic” warnings):
update-initramfs -u -k all
Done . You should be asked for the password when booting the system. Work with your securely encrypted system as usual. Simply close the chroot environment and reboot your computer:
exit sudo reboot
Tips and tricks
- Change/add/remove passwords: LUKS is able to manage up to eight passwords at the same time. Each password will be stored in a so-called slot (0-7). The currently used slots of the encrypted partition can be printed out by using
luksDump(don't forget to replace
sdX2with your own partition, e.g.
sudo cryptsetup luksDump /dev/sdX2 [...example output follows...] Key Slot 0: ENABLED Iterations: xxxxxx Salt: [...] [...] Key material offset: 8 AF stripes: 4000 Key Slot 1: DISABLED Key Slot 2: DISABLED Key Slot 3: DISABLED Key Slot 4: DISABLED Key Slot 5: DISABLED Key Slot 6: DISABLED Key Slot 7: DISABLED
To add a new password, use
sudo cryptsetup luksAddKey /dev/sdX2
To remove an existing password, use
sudo cryptsetup luksRemoveKey /dev/sdX2
- Access an encrypted system from a Live CD: In the case of emergency, it may be useful to have access to the encrypted files of a system installed by using this manual (you need the password, for sure). Boot the Live CD and install the needed software:
sudo apt-get install lvm2 cryptsetup sudo modprobe dm-crypt
Open/decrypt the device (replace
sda2with your device if needed):
sudo cryptsetup luksOpen /dev/sda2 lvm
Activate the LVM to get /dev/ubuntu/home, /dev/ubuntu/root and /dev/ubuntu/swap:
sudo pvscan sudo vgscan sudo lvscan sudo vgchange -a y
Mount the root and home partition:
sudo mkdir /mnt/root sudo mount /dev/ubuntu/root /mnt/root sudo mkdir /mnt/home sudo mount /dev/ubuntu/home /mnt/home
Now you can access your home partition via
/mnt/home, the root partition is located at
/mnt/root. So you can copy or edit all of your data. If you don't have enough permissions to copy needed files, try it with a filemanager started with
Enrcypt a system
Notice: this article was published on
http://readm3.org/os/ubuntu/full-disk-encryption-lvm-luks first. I moved it to my blog for organizational reasons.
sudo apt-get install gpartedto get it on Kubuntu