ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Solved supporting an office of computers with full drive encryption

    IT Discussion
    17
    166
    16.9k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • coliverC
      coliver @Dashrender
      last edited by

      @Dashrender said in supporting an office of computers with full drive encryption:

      @stacksofplates said in supporting an office of computers with full drive encryption:

      @Dashrender said in supporting an office of computers with full drive encryption:

      @stacksofplates said in supporting an office of computers with full drive encryption:

      @Dashrender said in supporting an office of computers with full drive encryption:

      @scottalanmiller said in supporting an office of computers with full drive encryption:

      @Dashrender said in supporting an office of computers with full drive encryption:

      @NerdyDad said in supporting an office of computers with full drive encryption:

      @Dashrender said in supporting an office of computers with full drive encryption:

      @scottalanmiller said in supporting an office of computers with full drive encryption:

      @Dashrender said in supporting an office of computers with full drive encryption:

      @scottalanmiller said in supporting an office of computers with full drive encryption:

      @Dashrender said in supporting an office of computers with full drive encryption:

      @scottalanmiller said in supporting an office of computers with full drive encryption:

      @Dashrender said in supporting an office of computers with full drive encryption:

      @scottalanmiller said in supporting an office of computers with full drive encryption:

      the files written to the disk are encrypted (or not written at all.)

      OK I think I see what Scott is writing here. IE has a setting:
      https://i.imgur.com/audFdVc.png

      This will prevent encrypted pages from being saved to disk.

      But my question to @scottalanmiller is - What about confidential information that is viewed over a non encrypted connection?

      Is there a way to make IE, and all other software, not write temp files to the drive at all? And of course, I never saw any discussion at all about the page file, which as far as I know can only be encrypted when using full disk encryption.

      Not that I know of, but you can make sure that it only writes to the encrypted user drive.

      how?

      By putting the user's directories on D... the thing we are discussing.

      Not trusting Windows is a different matter. If you feel Windows simply can't be trusted, the only answer is really to leave Windows.

      I do trust Windows, let's just assume that they aren't doing anything wrong. I still don't know how you access an encrypted location during logon so that Windows can load the profile. How are you accomplishing this?

      You don't, you decrypt it before logging in. No matter what you do, encryption comes out to be a pain.

      HOW? How are you decrypting before logon? This is what Mike wants to know.

      Key is stored in the TPM. TPM/Bios/UEFI decrypts the drive in order to boot Windows before login.

      This is not what Scott is talking about at all though.

      I've not tested this, but any reason it can't work with just one partition like LUKS can?

      No clue what LUKS is, but assuming a single partition, how do you do remote updates to an encrypted drive? I'm assuming it can't boot without a user there to type in a password.

      We can encrypt home directories and still boot the machine. Why would it not be able to boot? The user data is on a separate drive. I'm lost as to why it wouldn't work.

      I'm not talking about BOOTING, I'm talking about loading the user profile. In the case of Windows - how would you load a profile that's stored on an encrypted (still locked) partition? When you enter the username/password, the system tries to load the profile from D but can't becuase it's locked. But you can't unlock it until after you log in.

      See the problem?

      LUKS uses the users password to unlock the partition.

      That would be awesome, and totally solve this problem - any know if Bitlocker can do this? I think @dafyre tried but it didn't work.

      No bitlocker does not do that. You have to get a third party software to do it.

      1 Reply Last reply Reply Quote 0
      • stacksofplatesS
        stacksofplates
        last edited by

        One thing to consider is not doing full disk means that someone can possibly modify or install a modified version of a piece of software or install a key logger on the OS disk. Then the password doesn't matter.

        scottalanmillerS DashrenderD 2 Replies Last reply Reply Quote 1
        • scottalanmillerS
          scottalanmiller @Dashrender
          last edited by

          @Dashrender said in supporting an office of computers with full drive encryption:

          OK, let's assume that is correct, how do you propose protecting that data when the system is booted up and updates are being applied?

          By having it be encrypted and even the OS can't access it.

          1 Reply Last reply Reply Quote 0
          • scottalanmillerS
            scottalanmiller @Dashrender
            last edited by

            @Dashrender said in supporting an office of computers with full drive encryption:

            But how did the computer bootup in the first place? The whole reason is the OS isn't encrypted is because we want to be able to do remote updates, which requires the PC to be on and booted. And if the PC can be one and booted without a password supplied, then someone could probably hack the boot partition in an attempt to get the key that I assume must be stored in the OS partition to unlock the data partition upon boot, right?

            If the OS has the key, the whole system doesn't work. The key has to be held by the user, not the OS regardless of anything else. Full disk, partial disk (partition encryption)... the key can't be on the drive.

            1 Reply Last reply Reply Quote 0
            • scottalanmillerS
              scottalanmiller @stacksofplates
              last edited by

              @stacksofplates said in supporting an office of computers with full drive encryption:

              One thing to consider is not doing full disk means that someone can possibly modify or install a modified version of a piece of software or install a key logger on the OS disk. Then the password doesn't matter.

              That's potentially true. Could happen on the UEFI too, though.

              1 Reply Last reply Reply Quote 0
              • DashrenderD
                Dashrender @stacksofplates
                last edited by

                @stacksofplates said in supporting an office of computers with full drive encryption:

                One thing to consider is not doing full disk means that someone can possibly modify or install a modified version of a piece of software or install a key logger on the OS disk. Then the password doesn't matter.

                which of course defeats the whole secure thing in the first place.

                scottalanmillerS 1 Reply Last reply Reply Quote 0
                • scottalanmillerS
                  scottalanmiller @Dashrender
                  last edited by

                  @Dashrender said in supporting an office of computers with full drive encryption:

                  @stacksofplates said in supporting an office of computers with full drive encryption:

                  One thing to consider is not doing full disk means that someone can possibly modify or install a modified version of a piece of software or install a key logger on the OS disk. Then the password doesn't matter.

                  which of course defeats the whole secure thing in the first place.

                  How would someone by expected to install that? 99% of possible installs like that will affect an encrypted drive as much as a non-encrypted one. This is one of those "we mentioned a risk" that isn't a viable real world risk and it sounds reasonable until we apply real world risk to it.

                  It's not nearly as significant as, say, missing a day of patching.

                  DashrenderD 1 Reply Last reply Reply Quote 0
                  • DashrenderD
                    Dashrender @scottalanmiller
                    last edited by

                    @scottalanmiller said in supporting an office of computers with full drive encryption:

                    @Dashrender said in supporting an office of computers with full drive encryption:

                    @stacksofplates said in supporting an office of computers with full drive encryption:

                    One thing to consider is not doing full disk means that someone can possibly modify or install a modified version of a piece of software or install a key logger on the OS disk. Then the password doesn't matter.

                    which of course defeats the whole secure thing in the first place.

                    How would someone by expected to install that? 99% of possible installs like that will affect an encrypted drive as much as a non-encrypted one. This is one of those "we mentioned a risk" that isn't a viable real world risk and it sounds reasonable until we apply real world risk to it.

                    It's not nearly as significant as, say, missing a day of patching.

                    You don't think so? Let's assume the boot partition is non encrypted, and Secure Boot is disabled. A janitor could crack it open and install a keylogger.

                    is that more or less likely than being hacked because you didn't patch? OK probably a lot less likely.

                    scottalanmillerS 1 Reply Last reply Reply Quote 0
                    • scottalanmillerS
                      scottalanmiller @Dashrender
                      last edited by

                      @Dashrender said in supporting an office of computers with full drive encryption:

                      It's not nearly as significant as, say, missing a day of patching.

                      You don't think so? Let's assume the boot partition is non encrypted, and Secure Boot is disabled. A janitor could crack it open and install a keylogger.

                      I'm not saying that he can't, but if your own staff is your concern, encryption is really not going to do anything. He's got a hundred other ways to do more damage. For example, he's install a physical keylogger that bypasses your full disk encryption because that's even easier than that. He's not bother with this method, because it's not the path of least resistance to this end game.

                      1 Reply Last reply Reply Quote 0
                      • scottalanmillerS
                        scottalanmiller
                        last edited by

                        In the janitor scenario... remember that if the laptop (assuming that it is a laptop) is properly secured he'll not have any attack against an unencrypted drive except to remove it physically from the machine, hook it up to another machine and infect it that way. If he could bypass the password and logon stage, you'd be compromised already so we can ignore that.

                        In the case where he has the physical access to attack the unencrypted system with a key logger to go after the encrypted portion, he's got access to bypass everything and make the attack moot.

                        stacksofplatesS 1 Reply Last reply Reply Quote 0
                        • wrx7mW
                          wrx7m
                          last edited by

                          I saw this marked as solved but can't seem to find the post that mentions the solution/what the OP ended up doing.

                          scottalanmillerS Mike DavisM 2 Replies Last reply Reply Quote 1
                          • scottalanmillerS
                            scottalanmiller @wrx7m
                            last edited by

                            @wrx7m said in supporting an office of computers with full drive encryption:

                            I saw this marked as solved but can't seem to find the post that mentions the solution/what the OP ended up doing.

                            He was only fact finding. It's not his customer. he was trying to determine the cost to support the customer.

                            1 Reply Last reply Reply Quote 1
                            • stacksofplatesS
                              stacksofplates @scottalanmiller
                              last edited by

                              @scottalanmiller said in supporting an office of computers with full drive encryption:

                              In the janitor scenario... remember that if the laptop (assuming that it is a laptop) is properly secured he'll not have any attack against an unencrypted drive except to remove it physically from the machine, hook it up to another machine and infect it that way. If he could bypass the password and logon stage, you'd be compromised already so we can ignore that.

                              In the case where he has the physical access to attack the unencrypted system with a key logger to go after the encrypted portion, he's got access to bypass everything and make the attack moot.

                              That was kind of my point. If the whole drive is encrypted there isn't anything they can do on the disk itself. If the OS isn't encrypted you can essentially do anything.

                              We have labels that cover the side panels that you can't pull off and reattach. So they can't put anything in the machine without it being obvious. But if the OS isn't encrypted, they could boot to a recovery and chroot into the OS and install whatever they want (assuming BIOS allows media booting, etc).

                              With the full disk encryption, they can't do anything without the key.

                              scottalanmillerS 1 Reply Last reply Reply Quote 0
                              • scottalanmillerS
                                scottalanmiller @stacksofplates
                                last edited by

                                @stacksofplates said in supporting an office of computers with full drive encryption:

                                @scottalanmiller said in supporting an office of computers with full drive encryption:

                                In the janitor scenario... remember that if the laptop (assuming that it is a laptop) is properly secured he'll not have any attack against an unencrypted drive except to remove it physically from the machine, hook it up to another machine and infect it that way. If he could bypass the password and logon stage, you'd be compromised already so we can ignore that.

                                In the case where he has the physical access to attack the unencrypted system with a key logger to go after the encrypted portion, he's got access to bypass everything and make the attack moot.

                                That was kind of my point. If the whole drive is encrypted there isn't anything they can do on the disk itself. If the OS isn't encrypted you can essentially do anything.

                                We have labels that cover the side panels that you can't pull off and reattach. So they can't put anything in the machine without it being obvious. But if the OS isn't encrypted, they could boot to a recovery and chroot into the OS and install whatever they want (assuming BIOS allows media booting, etc).

                                With the full disk encryption, they can't do anything without the key.

                                But that was my point. If your OS was secured, you'd not be able to boot to any recovery. The only way it would be to break into the physical box and both are compromised at that point. It's not OS encryption that protects you in that case.

                                stacksofplatesS 1 Reply Last reply Reply Quote 0
                                • stacksofplatesS
                                  stacksofplates @scottalanmiller
                                  last edited by

                                  @scottalanmiller said in supporting an office of computers with full drive encryption:

                                  @stacksofplates said in supporting an office of computers with full drive encryption:

                                  @scottalanmiller said in supporting an office of computers with full drive encryption:

                                  In the janitor scenario... remember that if the laptop (assuming that it is a laptop) is properly secured he'll not have any attack against an unencrypted drive except to remove it physically from the machine, hook it up to another machine and infect it that way. If he could bypass the password and logon stage, you'd be compromised already so we can ignore that.

                                  In the case where he has the physical access to attack the unencrypted system with a key logger to go after the encrypted portion, he's got access to bypass everything and make the attack moot.

                                  That was kind of my point. If the whole drive is encrypted there isn't anything they can do on the disk itself. If the OS isn't encrypted you can essentially do anything.

                                  We have labels that cover the side panels that you can't pull off and reattach. So they can't put anything in the machine without it being obvious. But if the OS isn't encrypted, they could boot to a recovery and chroot into the OS and install whatever they want (assuming BIOS allows media booting, etc).

                                  With the full disk encryption, they can't do anything without the key.

                                  But that was my point. If your OS was secured, you'd not be able to boot to any recovery. The only way it would be to break into the physical box and both are compromised at that point. It's not OS encryption that protects you in that case.

                                  There isn't anything that protects against this other than BIOS, which isn't OS security.

                                  For example, if I encrypt the full drive but leave BIOS open (or they steal the disk), they can boot to recovery but will gain nothing. They can't get into the disk without the key. It's still protecting you from breaking into the box because they can't get anything on the disk at all if its fully encrypted.

                                  scottalanmillerS 1 Reply Last reply Reply Quote 1
                                  • scottalanmillerS
                                    scottalanmiller @stacksofplates
                                    last edited by

                                    @stacksofplates said in supporting an office of computers with full drive encryption:

                                    There isn't anything that protects against this other than BIOS, which isn't OS security.

                                    For example, if I encrypt the full drive but leave BIOS open (or they steal the disk), they can boot to recovery but will gain nothing. They can't get into the disk without the key. It's still protecting you from breaking into the box because they can't get anything on the disk at all if its fully encrypted.

                                    If you restrict recovery and boot options and make it obvious that the case has been opened... how would partial disk encryption not provide that protection as well?

                                    stacksofplatesS 1 Reply Last reply Reply Quote 0
                                    • stacksofplatesS
                                      stacksofplates @scottalanmiller
                                      last edited by stacksofplates

                                      @scottalanmiller said in supporting an office of computers with full drive encryption:

                                      @stacksofplates said in supporting an office of computers with full drive encryption:

                                      There isn't anything that protects against this other than BIOS, which isn't OS security.

                                      For example, if I encrypt the full drive but leave BIOS open (or they steal the disk), they can boot to recovery but will gain nothing. They can't get into the disk without the key. It's still protecting you from breaking into the box because they can't get anything on the disk at all if its fully encrypted.

                                      If you restrict recovery and boot options and make it obvious that the case has been opened... how would partial disk encryption not provide that protection as well?

                                      It probably would. There are some unknowns like whether system restore points would have any of this data in them and people can accidentally move data to the unencrypted partition/drive.

                                      I'm also coming at this from the angle of where I work. There are some legit concerns with our data so our systems are required for full disk encryption and any information like that isn't on laptops. Boot loader is password protected and BIOS is locked down. Even USB ports are disabled and kernel modules are removed.

                                      scottalanmillerS 1 Reply Last reply Reply Quote 0
                                      • scottalanmillerS
                                        scottalanmiller @stacksofplates
                                        last edited by

                                        @stacksofplates said in supporting an office of computers with full drive encryption:

                                        @scottalanmiller said in supporting an office of computers with full drive encryption:

                                        @stacksofplates said in supporting an office of computers with full drive encryption:

                                        There isn't anything that protects against this other than BIOS, which isn't OS security.

                                        For example, if I encrypt the full drive but leave BIOS open (or they steal the disk), they can boot to recovery but will gain nothing. They can't get into the disk without the key. It's still protecting you from breaking into the box because they can't get anything on the disk at all if its fully encrypted.

                                        If you restrict recovery and boot options and make it obvious that the case has been opened... how would partial disk encryption not provide that protection as well?

                                        It probably would. There are some unknowns like whether system restore points would have any of this data in them and people can accidentally move data to the unencrypted partition/drive.

                                        I'm also coming at this from the angle of where I work. There are some legit concerns with our data so our systems are required for full disk encryption and any information like that isn't on laptops. Boot loader is password protected and BIOS is locked down. Even USB ports are disabled and kernel modules are removed.

                                        Right, well I'm assuming that boot loader and all that is locked down here too, or there is too much risk regardless.

                                        stacksofplatesS 2 Replies Last reply Reply Quote 1
                                        • stacksofplatesS
                                          stacksofplates @scottalanmiller
                                          last edited by stacksofplates

                                          @scottalanmiller said in supporting an office of computers with full drive encryption:

                                          @stacksofplates said in supporting an office of computers with full drive encryption:

                                          @scottalanmiller said in supporting an office of computers with full drive encryption:

                                          @stacksofplates said in supporting an office of computers with full drive encryption:

                                          There isn't anything that protects against this other than BIOS, which isn't OS security.

                                          For example, if I encrypt the full drive but leave BIOS open (or they steal the disk), they can boot to recovery but will gain nothing. They can't get into the disk without the key. It's still protecting you from breaking into the box because they can't get anything on the disk at all if its fully encrypted.

                                          If you restrict recovery and boot options and make it obvious that the case has been opened... how would partial disk encryption not provide that protection as well?

                                          It probably would. There are some unknowns like whether system restore points would have any of this data in them and people can accidentally move data to the unencrypted partition/drive.

                                          I'm also coming at this from the angle of where I work. There are some legit concerns with our data so our systems are required for full disk encryption and any information like that isn't on laptops. Boot loader is password protected and BIOS is locked down. Even USB ports are disabled and kernel modules are removed.

                                          Right, well I'm assuming that boot loader and all that is locked down here too, or there is too much risk regardless.

                                          Ya, I don't believe how many people I've seen use super long passwords and not password protect the boot loader. All I need is "rd.break" and I'm in.

                                          I guess it also helps mitigate mistakes by admins. If you don't have fully automated builds like happens a lot in smaller environments, there are a lot of variables that can make a difference.

                                          scottalanmillerS 1 Reply Last reply Reply Quote 1
                                          • stacksofplatesS
                                            stacksofplates @scottalanmiller
                                            last edited by stacksofplates

                                            @scottalanmiller said in supporting an office of computers with full drive encryption:

                                            @stacksofplates said in supporting an office of computers with full drive encryption:

                                            @scottalanmiller said in supporting an office of computers with full drive encryption:

                                            @stacksofplates said in supporting an office of computers with full drive encryption:

                                            There isn't anything that protects against this other than BIOS, which isn't OS security.

                                            For example, if I encrypt the full drive but leave BIOS open (or they steal the disk), they can boot to recovery but will gain nothing. They can't get into the disk without the key. It's still protecting you from breaking into the box because they can't get anything on the disk at all if its fully encrypted.

                                            If you restrict recovery and boot options and make it obvious that the case has been opened... how would partial disk encryption not provide that protection as well?

                                            It probably would. There are some unknowns like whether system restore points would have any of this data in them and people can accidentally move data to the unencrypted partition/drive.

                                            I'm also coming at this from the angle of where I work. There are some legit concerns with our data so our systems are required for full disk encryption and any information like that isn't on laptops. Boot loader is password protected and BIOS is locked down. Even USB ports are disabled and kernel modules are removed.

                                            Right, well I'm assuming that boot loader and all that is locked down here too, or there is too much risk regardless.

                                            Which is again why Open Source is important. Things like system restore having this data would be understood.

                                            Maybe it already is and I just don't know. Not a Windows admin.

                                            scottalanmillerS 1 Reply Last reply Reply Quote 1
                                            • 1
                                            • 2
                                            • 5
                                            • 6
                                            • 7
                                            • 8
                                            • 9
                                            • 8 / 9
                                            • First post
                                              Last post