#luks2

2025-06-09

I finally got my #ArchLinux disk encryption upgraded to #LUKS2. It certainly was a challenge because #grub does not seem to play nicely with it but I did get it to work. Grub has a bug in it where passphrases entered from the keyboard need to use PBDKF2 and key files need to use Argon2id. Once I figured this out, everything worked smoothly.

🅹🅴🅳🅸🅴 🇺🇦🕊️jedie@chaos.social
2025-06-08

Mir ist aufgefallen, das bei #TuxedoOS das Benutzer Passwort nicht mit dem #luks2 Passwort synchronisiert wird.

z.B. user Passwort in KDE ändern oder einen neuen benutzer anlegen. Ich kann dennoch die Verschlüsselung nur mit dem initialen Passwort, bei der Installation aufschließen.

Offenbar gibt es auch keine Möglichkeit per GUI ein Passwort hinzuzufügen. Sehe nur die Möglichkeit mit cryptsetup auf Konsole zu arbeiten.

Übersehe ich was? @tuxedocomputers

VoidZeroOne :tranarchy_a_genderqueer: :v_trans: :v_pan:TheOneDoc@tech.lgbt
2025-04-05

The #GMKtec NucBox M5 Plus is now up and running @chimera_linux

Thx again @q66 for puting all theat time and work in what is rapidly becoming my fav Linux Distro of all times.

#linux #kde #screenshot #btrfs #LUKS2 #2025

chimera linux running btrfs in a LUKS2 encrypted setup with KDE Plasma 6.3.4 on a GMKtec NucBox M5 Plus
Dirk Woutersdiwou
2025-03-20

Vollständige Festplattenverschlüsselung unter Manjaro Linux

Manjaro Linux bringt mit Calamares einen hervorragenden Installer mit, der aber leider nur eingeschränkte Möglichkeiten bezüglich des Partitionenlayout bietet. Eine komplette Verschlüsselung aller Linux Partitionen, inkl. /boot und dann noch […]

dirkwouters.de/vollstaendige-f

Dirk Woutersdiwou
2025-03-20

Arch Linux mit vollständiger Festplattenverschlüsselung

GRUB Bootloader zusammen mit LUKS2 und BTRFS Dateisystem Die Einrichtung von Arch Linux mit vollständiger Festplattenverschlüsselung durch LUKS2 bietet ein hohes Maß an Sicherheit für Benutzerdaten und Systemintegrität. LUKS2 (Linux […]

dirkwouters.de/arch-linux-mit-

Robert's Laboratoryrnowotniak
2025-02-17

I organized my like this. I think it's quite well thought out. All disks are SED hardware encrypted with TCG OPAL, root @ and @ home subvolumes are on (mdadm RAID1), additionally encrypted with . A fast storage for less important local data is on NVMe drives. Data on large SATA drives is encrypted in LUKS images or using a cloud-friendly filesystems (), quickly synchronized via LAN sync, and efficiently synced with cloud storage using block-level sync.

Diagram of storage organization on the workstation and the home server.  btrfs, raid1, mdadm, nvme, subvolumes, lansync, block-level sync.
2024-10-27

Te lo Enseño y Te lo Cuento,Seguridad física en Linux(TPM2.0, Yubikey, Luks2, clevis ySystemd) [aHAJCrYG0VY]

fediverse.tv/videos/watch/b453

2024-05-13
Finally HMAC encryption for in-kernel TPM clients is going to a release! Has been hanging there for a long time.

LUKS2 and distributions starting to support it motivated me to rewrite the buffering code last Spring because that was my main turn-down in the original patch set, and then James took over and cleaned up the functionality and I reviewed it for few rounds until it was good enough.

With this and TPM2 sealed hard drive encryption there is a somewhat reasonable security model without having to type encryption password to a bootloader prompt (which is tedious). I.e. login and go.

A rare case of security feature also increasing user experience.

#linux #kernel #tpm #luks2
2024-03-10

Is this still true ...

via docs.voidlinux.org/installatio ...

『Cryptsetup defaults to #LUKS2, yet #GRUB releases before 2.06 only had support for LUKS1.

LUKS2 is only partially supported by GRUB; specifically, only the PBKDF2 key derivation function is implemented, which is not the default KDF used with LUKS2, that being Argon2i (GRUB Bug 59409 savannah.gnu.org/bugs/?59409 [0]). LUKS encrypted partitions using Argon2i (as well as the other KDF) can not be decrypted. For that reason, this guide only recommends LUKS1 be used.』

... per that bug link, seems so. Damn ... ah yes, all is coming back to me now :flashback: when I saw Justine S' social.treehouse.systems/@Just efforts of installing encrypted ZFS root (& encrypted swap & hibernation)[1].

---
0- See also: GNU GRUB - Bugs: bug #55093, Add [full] LUKS2 support, savannah.gnu.org/bugs/index.ph

1- Have the bookmark ...
Installing Void Linux with encrypted Root on ZFS, published 20240103, justine.smithies.me.uk/void-li

Kevin P. Flemingkevin@km6g.us
2024-03-04

Achievement unlocked: used systemd-cryptenroll with a newly-installed TPM2 device in my home server to automatically unlock a LUKS2 container (which contains a ZFS pool). I still need to enable Secure Boot on this machine, but this is progress.

#luks2 #systemd #zfs

2024-02-02
2023-11-26

Linux Weekly Roundup: EndeavourOS Galileo with KDE, Rocky Linux 9.3 Updates, Proxmox VE 8.1 Enhancements, and More!
#EndeavourOS #RockyLinux #Proxmox #FreeBSD #OpenMandriva #KDE #LUKS2 #Calamares #SecureBoot #CephReef #OpenSSH #Plasma
linuxtldr.com/weekly-roundup/

2023-08-05

@abcdw what do you mean by #luks2 support, the two #guix patches or for #grub to expand from limited (pbkdf2 only) to full support?

ricardo :mastodon:governa@fosstodon.org
2023-06-13
ricardo :mastodon:governa@fosstodon.org
2023-05-17

#Tails 5.13 Enables #LUKS2 by Default for Persistent Storage and Encrypted Volumes. :linux: 🔒

9to5linux.com/tails-5-13-enabl

2023-05-16

@downey

As you mentioned reencrypt, that's about encrypting existing data? Then maybe this #RHEL guide helps:
access.redhat.com/documentatio

Or just have a complete backup (you should anyway), wipe, create a #LUKS2 partition and possibly #LVM on it and restore..

2023-04-21

It seems my #GRUB understands both argon2i and argon2id now… #cryptodisk #luks2

Christian Pietsch (old acct.)chpietsch@digitalcourage.social
2023-04-18

@mjg59

Thank you for sounding the alert!

I identified a minor issue with your otherwise nice explanation: According to my sources (man cryptsetup, #rfc9106), all #argon2 varieties are memory-hard. RFC 9106 is even titled “Argon2 Memory-Hard Function for Password Hashing and Proof-of-Work Applications”.

However, given that there are known attacks against #argon2i, it seems wise to use #argon2id instead. It is also what is recommended in the RFC.

As a #QubesOS user, I just checked the state of affairs there:

The cryptsetup that comes with QubesOS 3.x used #luks1, and those who did an in-place upgrade to 4.x still have that unless they converted to #luks2 manually (as detailed in the migration guide).

The cryptsetup in QubesOS 4.x uses #luks2, but it still defaults to #argon2i unfortunately.

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst