Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
So I've got a fully encrypted ubuntu-server install. I just did some updates and it's asked me to reboot. Only issue is that I'm hundreds of KM away from it.
Is there a way to reboot it and have it automount the encrypted volume? Can I somehow make the machine execute a script that has the password in it to decrypt and mount the volume and then delete itself?
Long ago I learned how to do that for my RHCSA certificate, then forgot. A prayer to St Google brought me back on track. You have to do some setup with /etc/crypttab; for example see this somewhat dated howto: https://help.ubuntu.com/community/En...anent_Mounting, in particular the section on permanent mounting.
Unfortunately, I have a fully encrypted disk. The whole machine cannot boot without a password during bootup. That guide appears to be how to mount an encrypted /home or swap.
:S It's not the end of the world if I have to reboot it from the physical machine during bootup it just means I'll be doing it a lot less.
Get the crypt support into the initramfs. I've seen blogs for Arch, but I don't know the hook support for Ubuntu.
I assume you already have grub support enabled.
Get the crypt support into the initramfs. I've seen blogs for Arch, but I don't know the hook support for Ubuntu.
I assume you already have grub support enabled.
I'm a super noob when it comes to Linux. If I google "crypt support initramfs ubuntu" will I be going in the right direction?
Yes, that should find most - I had a quick look and most seemed quite old. Most people seem to follow the Ubuntu standard installs, rather than encrypting root and boot.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.