LinuxQuestions.org
Share your knowledge at the LQ Wiki.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 10-23-2018, 09:54 AM   #1
MrLinuxUser12
LQ Newbie
 
Registered: May 2017
Posts: 13

Rep: Reputation: Disabled
Post Dual boot 2 Linux OSes with full disk encryption and dedicated shared storage


Hello!

I am going to reinstall Linux on my notebook, and I've decided I want to go for a dual boot -- Debian and Parrot Security (another Debian derivative). Both of these have installers that allow for full disk encryption.

I've already set up a system with "manual" disk encryption before, utilizing the graphical installers, so I've got at least some knowledge in the field. I've never worked with the underlying commands concerning GRUB or CryptSetup, though.

My goal is to create a system with full disk encryption in legacy BIOS (to harness the advantage of TRUE full disk encryption), allowing dual boot of the two systems and (ideally) a shared storage space. Most likely a shared home partition.

The whole disk should be decryptable with just one password. And preferrably, I shouldn't have to enter the same password again just to unlock the shared storage space.

Now as I'm a relative beginner in this field, I wanted to ask the experts (you) on what's the best way to set this up (saving myself some hours of time over doing something that turns out to be wrong in hindsight).
Is there a clean and easy way to do this? If I need to get my hands dirty with commands, at what point are they absolutely required and what do I do?

Last edited by MrLinuxUser12; 10-23-2018 at 09:58 AM.
 
Old 10-23-2018, 01:30 PM   #2
RickDeckard
Member
 
Registered: Jan 2014
Location: Canton, Georgia, USA
Distribution: Debian 12
Posts: 205

Rep: Reputation: Disabled
I'll suggest to you installing a shared boot partition for both Debian and Parrot Security to a USB drive which would remove the need for jumping through GRUB cryptodisk hoops while allowing your main hard drive to remain fully encrypted. Bonus of course being that whoever does not have your USB cannot access your device. You shouldn't need to do much of anything to get that set up, just select the USB as your boot partition and off you go.

And as for the shared storage, I would set it up from the command line prior to installing either system. Before the system install procedures, go to the terminal in both LiveCD's (I assume that is going to be your installation method) and unlock the finished product. Then start install and once you get to custom partitioning your home LV should be visible.

Oh, and when you're given this installation option to mount a filesystem elect to keep the shared filesystems as they are each time without formatting.

Last edited by RickDeckard; 10-23-2018 at 05:43 PM.
 
Old 11-03-2018, 05:33 PM   #3
cantab
Member
 
Registered: Oct 2009
Location: England
Distribution: Kubuntu, Ubuntu, Debian, Proxmox.
Posts: 553

Rep: Reputation: 115Reputation: 115
For the shared partition, you can add a keyfile to LUKS for the device, save a copy of the keyfile in each distro's root partition, and configure crypttab accordingly.

Here's an example crypttab from my Debian system where I was doing a similar thing. On that setup I was using LUKS on LVM, rather than the installer default of LVM on LUKS.

Code:
spelvia--ssd-root_crypt UUID=94f1724f-71bb-4a05-9805-5c7f81936bd3 none luks
spelvia--ssd-swap_crypt /dev/mapper/spelvia--ssd-swap /dev/urandom swap
spelvia--hdd-home_crypt /dev/mapper/spelvia--hdd-home /etc/luks/spelvia--hdd-home
 
Old 11-05-2018, 05:03 AM   #4
zeebra
Senior Member
 
Registered: Dec 2011
Distribution: Slackware
Posts: 1,830
Blog Entries: 17

Rep: Reputation: 638Reputation: 638Reputation: 638Reputation: 638Reputation: 638Reputation: 638
Sharing /home between 2 distroes is not a problem, as long as you take some precautions. You can use different usernames or place the user home directory on a different place.

For sharing you can make a sharepoint on the /home directory or you can give users rights to each others files or folders.
 
  


Reply

Tags
dual-boot, encryption, luks



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Linux Mint With Full Disk Encryption Wont Boot A4refill Linux - Newbie 1 05-17-2018 08:18 PM
How to have luks encryption with keyfile OR passphrase (efi full disk encryption including boot)? byroncollege Linux - Security 2 03-30-2017 07:45 AM
linux GUI full disk encryption including /boot postcd Linux - Security 12 11-04-2014 12:05 AM
LXer: Dual-boot Fedora 18 and Windows 7, with full disk encryption configured on both OSs LXer Syndicated Linux News 0 02-25-2013 04:00 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 11:40 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration