Hi! I want to try out fedora workstation in the near future (once 39 is out) and was wondering if systemd-homed is ready for everyday use yet.

I'm a bit paranoid and really need my private data encrypted. However, I don't think that full disk encryption is practical for my daily use. Therefore I was really looking forward to the encryption possibilities of systemd-homed.

However, after reading up on it, I was a bit discouraged. AFAIK, there's no option to setup systemd-homed at installation (of fedora). I was an Arch then Manjaro, then Endeavour user for years but don't have the time/patience anymore to configure major parrts of my system anymore. Also, the documentation doesn't seem too noob-friendly to me, which also plays into the time/patience argument.

Is it ready? Can anyone seriously recommend it for a lazy ex-Arch user who doesn't want to break another linux installation?

Thank you in advance. :)

    • vector_zero@lemmy.world
      link
      fedilink
      arrow-up
      25
      arrow-down
      1
      ·
      1 year ago

      I second this.

      Full disk encryption is entirely practical for everyday use. If you don't already have a dedicated TPM, your motherboard/CPU may provide a software TPM (fTPM?). If so, you don't even have to interact with the machine during boot. It's just a bit slower to start up (by a few seconds), which really isn't a big issue for your average user.

      • taaz@biglemmowski.win
        link
        fedilink
        English
        arrow-up
        16
        ·
        edit-2
        1 year ago

        Pardon my ignorance here, but I don't get it how is the whole thing still safe with unlocking from TPM instead of me providing the password at boot time?

        Considering now anyone can just boot the machine into the installed system then bruteforce/exploit something to get login/get read permissions and make a plain copy of the data?
        Where, without tpm, as long as I do not type in the encryption password myself I have a pretty high guarantee that the data is safe, especially when I am not at the (powered down) computer.

        • oshitwaddup@lemmy.antemeridiem.xyz
          link
          fedilink
          arrow-up
          11
          arrow-down
          1
          ·
          1 year ago

          This is what I don't understand either. It seems like with tpm it only protects the data from someone taking or copying the hard drive, but the bigger risk seems like what you describe

          plus, using an encryption password and then automatically logging in the user prevents needing to enter two passwords while still keeping the data secure as long as the machine is off

        • vector_zero@lemmy.world
          link
          fedilink
          arrow-up
          7
          arrow-down
          2
          ·
          1 year ago

          The idea behind it is that the files are stored encrypted at rest, which is really what you want, because once a system is booted, you have to play by the computer's rules (respect file permissions, policies, etc.).

          The TPM provides a secure mechanism to provide a decryption key to the computer during boot, eliminating the need for direct interaction.

          Could it be compromised? Probably, but it would take considerably more effort than a man-in-the-middle on your keyboard via a logic analyzer.

          • michaelrose@lemmy.ml
            link
            fedilink
            English
            arrow-up
            8
            arrow-down
            6
            ·
            1 year ago

            This is a common misunderstanding insofar as how encryption works. You can't flick a bit and TURN your storage unencrypted nor can you plausibly make your computer obey restrictions.

            If your storage is encrypted it remains encrypted always including the file you have open right now. Your takes a plausibly length usable string and uses it to compute or retrieve the long binary number actually needed to decrypt your files. This number is stored in memory such that encrypted files can be decrypted when read into memory.

            Once that key is loaded in memory anyone with 10 minutes and access to google could trivially unlock your computer in several different ways. It is virtually exactly like having no security whatsoever.

            If you don't actually enter a passphrase to unlock you have no meaningful security against anything but the most casual unmotivated snooping.

            Your little sister might not be motivated enough to read your diary but the dipstick that stole your laptop will definitely be spending your money.

            • vector_zero@lemmy.world
              link
              fedilink
              arrow-up
              8
              arrow-down
              1
              ·
              1 year ago

              Once that key is loaded in memory anyone with 10 minutes and access to google could trivially unlock your computer in several different ways. It is virtually exactly like having no security whatsoever.

              I highly doubt it.

              If you have any tips for how I can personally bypass my computer's encryption in 10 minutes without being able to login, I'd love to try my hand at it.

              • michaelrose@lemmy.ml
                link
                fedilink
                English
                arrow-up
                7
                arrow-down
                2
                ·
                1 year ago

                You aren't actually asking to how to bypass encryption because the key is already in memory. You are asking about the much simpler task of compromising a computer with physical access to same. Depending on configuration this can be as ridiculous as killing the lockscreen process or as hard as physically opening the case chilling the contents of ram enough that data survives transfer to different physical hardware. See also the massive attack surface of the USB stack.

                  • michaelrose@lemmy.ml
                    link
                    fedilink
                    English
                    arrow-up
                    7
                    arrow-down
                    2
                    ·
                    1 year ago

                    On most systems you can press a hotkey in grub to edit the Linux command line that will be booted and in about 7 keystrokes gain access to any unlocked filesystem. Asking how you can break into a system you physically control is like asking how many ways you could break into a house supposing you had an hour alone with a crowbar the answers are legion. No machine in someone else's hand which is unlocked can possibly be deemed secure.

                    Even dumber no installer will create such an insecure configuration because the people that design Linux installers are smarter than you.

      • dsemy@lemm.ee
        link
        fedilink
        English
        arrow-up
        12
        arrow-down
        2
        ·
        1 year ago

        TPM is only kinda related to FDE, in that it can be used to unlock a LUKS encrypted volume. FDE doesn’t require a TPM.

        I also wouldn’t recommend automatically unlocking your root partition on boot using the TPM as this allows access to your data if the device is stolen, which, for an average user, defeats the main purpose of FDE.

        • vector_zero@lemmy.world
          link
          fedilink
          arrow-up
          3
          arrow-down
          1
          ·
          1 year ago

          How so? The data is still encrypted on the drive after boot, so unless your machine also automatically logs you in, there shouldn't be anything to worry about.

          • dsemy@lemm.ee
            link
            fedilink
            English
            arrow-up
            9
            arrow-down
            1
            ·
            1 year ago

            At that point you relying on the fact that nothing running in your machine at boot can be compromised - after all, everything running on your machine has access to your unencrypted data.

            If you don’t automatically unlock using the TPM, an attacker only has access to encrypted data.

            • vector_zero@lemmy.world
              link
              fedilink
              arrow-up
              1
              arrow-down
              1
              ·
              1 year ago

              Very true, which is why it's important to run as few services and have a locked down firewall. Maintaining a minimal attack surface is everything.

              • mvirts@lemmy.world
                link
                fedilink
                arrow-up
                4
                arrow-down
                1
                ·
                1 year ago

                If the attack involves stealing the machine it has been demonstrated that you can ice the ram and swap it into another machine without data loss, recover the keys, and access the drive.

                If we're talking apt adversaries it's also possible to just build a ram sniffer

                • losttourist@kbin.social
                  link
                  fedilink
                  arrow-up
                  7
                  ·
                  edit-2
                  1 year ago

                  While true, I think most people's concern is that their laptop is stolen and along with it all the access details for their email, online banking and so on.

                  If you're doing things that mean you're going to be the target of people with the knowledge, time, and technology to freeze the RAM and attempt to recover the data, you're presumably already well aware of those (and other) dangers anyway.

                  • mvirts@lemmy.world
                    link
                    fedilink
                    arrow-up
                    2
                    arrow-down
                    1
                    ·
                    1 year ago

                    I guess my point was that if you're going to use FDE and unlock the disk without a password, don't bother hardening against attacks that involve stealing the whole machine.

                    Agreed that this is almost fiction level paranoia.

      • Prunebutt@feddit.deOP
        link
        fedilink
        arrow-up
        4
        arrow-down
        2
        ·
        1 year ago

        As others explained: If the FDE key is in RAM, I'm vulnerable. My thread model includes a stolen Laptop with the attackers able to freeze my RAM and reading out the keys.

        Thank you for mentioning TPM though. Didn't know of that before. :)

      • PseudoSpock@lemmy.dbzer0.com
        link
        fedilink
        arrow-up
        3
        arrow-down
        2
        ·
        1 year ago

        There are plenty of reasons to not want FDE or not want just FDE alone. Shared computer, your data isn't safe if you share the FDE password with another user who needs to share the system. He said he's paranoid, so he is wanting his data encrypted above all. Home directory encryption, especially on top of FDE, while a performance hit, would do well for that. But most importantly, he said FDE isn't practical for him, end of FDE story.

        • vector_zero@lemmy.world
          link
          fedilink
          arrow-up
          1
          arrow-down
          1
          ·
          1 year ago

          That's a very absolutist way to look at a situation. It's equally likely (in fact, much more likely) that OP is missing a detail or two about FDE, and we won't know for sure until we discuss it.

          • PseudoSpock@lemmy.dbzer0.com
            link
            fedilink
            arrow-up
            1
            arrow-down
            1
            ·
            1 year ago

            The question was specific to systemd-homed. Jumping to why isn't FDE good enough for you isn't even logical. Sure they changed direction later, but it is not what was originally asked. In answering the primary question, additional questions from the OP may have arisen, which is fine. What is not fine is to assume incompetence from the start, which is what ya'll were doing.

    • Prunebutt@feddit.deOP
      link
      fedilink
      arrow-up
      5
      arrow-down
      1
      ·
      edit-2
      1 year ago

      Simple convenience. I usually don't have the time to wait one or two minutes until my full disk is decrypted (I am often late and the only person in a group meeting who brought a laptop for taking minutes).

      I also use a weird keyboard layout (Neo 2) and I never got grub to load with that layout. Typing a 40+ passphrase in QWRETZ is just cumbersome to me.

      Also: I hate to admit it, but I am a bit vain and simply would like a nice gui for entering my password.

      Edit: I forgot to add that I'm playing with the idea of getting a surface tablet and installing linux on it. Then I couldn't count on awlays having a usb keyboard with me.

      • Zikeji@programming.dev
        link
        fedilink
        English
        arrow-up
        8
        ·
        1 year ago

        You can setup FDE that utilizes TPM like Windows does with bitlocker, in such a way that your backup phrase is only necessary if something about your hardware changes.

        Last I set it up however, there wasn't any easy/automatic way. Searching "luks TPM" should get you started.

        • Prunebutt@feddit.deOP
          link
          fedilink
          arrow-up
          2
          arrow-down
          2
          ·
          1 year ago

          I need more than data security at rest. Reading out the keys from ram is well within my threat model.

            • Prunebutt@feddit.deOP
              link
              fedilink
              arrow-up
              2
              ·
              1 year ago

              Care to elaborate why? I thought that systemd can encrypt your home partition when locking your device.

              • wildbus8979@sh.itjust.works
                link
                fedilink
                arrow-up
                1
                ·
                1 year ago

                When locking the device sure, but you could achieve a higher level of security by turning off the machine, or using hibernate with encrypted swap. Boot on my machine with FDE and an NVME sad literally takes seconds anyway…

          • skilltheamps@feddit.de
            link
            fedilink
            arrow-up
            2
            arrow-down
            1
            ·
            1 year ago

            Haha are you serious? In that case nothing short of full disk encryption and secure boot with your own keys is remotely adequate. Do you realize, that just encrypting your /home is at most a mild obscurity measure? If an attacker has potentially access to your computer and parts of it are unencrypted or unsigned, they could easily install a keylogger that sends out your data and/or password the next time you use your computer?!

            If your situation is not just a psychological case of paranoia, but a real threat, then you absolutely need to work on your security knowledge a good amount!

            • Prunebutt@feddit.deOP
              link
              fedilink
              arrow-up
              2
              arrow-down
              6
              ·
              1 year ago

              I don't really hppreciate your tone. Could you be a little less of a dick, please?

              Keyloggers aren't in my threat model (i.e.: they aren't in the MO of my potential attackers).

      • loutr@sh.itjust.works
        link
        fedilink
        arrow-up
        9
        arrow-down
        1
        ·
        1 year ago

        I have a LUKS-encrypted laptop (1GB SSD), it takes about 10 seconds between typing in the password and the start of the boot process.

        • Prunebutt@feddit.deOP
          link
          fedilink
          arrow-up
          2
          arrow-down
          1
          ·
          1 year ago

          I don't think so. There's a high likelihood of both laptop and key ending in the same hands if the laptop is stolen.

          • Dremor@lemmy.world
            link
            fedilink
            arrow-up
            3
            ·
            edit-2
            1 year ago

            The concept of hardware key is precisely to be removed as soon as you are not in front of the device.

            In my case, I'm using one this way. It is tethered to myself with a metal chain, so as soon as I'm not in front of my computer, they are separated and my sensitive data protected. Of course it won't prevent someone from threatening to harm me in order to get access to said key, but he might as well do the same to get access to any kind of password.

            • Prunebutt@feddit.deOP
              link
              fedilink
              arrow-up
              2
              arrow-down
              2
              ·
              1 year ago

              Keys can be confiscated. But in most juristicions you can't legally be forced to give up a password.

              Please take the threat modelling of other people seriously without second guessing it. If people explain openly why they have a certain threat model, I might already give them away to potential attackers.

              • Dremor@lemmy.world
                link
                fedilink
                English
                arrow-up
                3
                ·
                1 year ago

                Unfortunately I'm in one of those jurisdiction where you have to give password if asked by a competent authority (France). If confiscation during transit is a threat in any place I go, my FIDO2 key take another route than I do.

                • Prunebutt@feddit.deOP
                  link
                  fedilink
                  arrow-up
                  1
                  arrow-down
                  2
                  ·
                  1 year ago

                  That wouldn't help if they search your home.

                  I'm appalled that France is already so anti-privacy. But unfortunately, I can't say that I'm surprised.

                  • Dremor@lemmy.world
                    link
                    fedilink
                    arrow-up
                    1
                    arrow-down
                    1
                    ·
                    1 year ago

                    There is privacy and privacy.

                    If the authorities ask you for your password to unlock a device for a valid reason, it is legitimate for them to be able to force you to reveal your password. Even taking it into account, you can refuse, but you'll be fined for it.
                    Those access are logged, and pretty limited if they want to use it as proof against you later. Even if they find something damning against you, if the procedure isn't respected, they cannot use it against you.

                    I don't know why you need such tight security that it has to protect against legitimate law enforcement, but if they really want to get to your data, you can trust me, no amount of TPM, security keys and the like will prevent them to lock you up untill you give them your keys.
                    Except if you cannot, in which case a removable hardware key which do not stay with you unless you are actively use it is the only solution. Most of them have passkeys to prevent them to be used if stolen.

      • taaz@biglemmowski.win
        link
        fedilink
        English
        arrow-up
        9
        ·
        edit-2
        1 year ago

        I am pretty sure, you can as easily have encryption only on a single logical partition of that disk, considering you first create a luks partition, unlock it and then format the mapped device with the target filesystem (and install the OS on there).

        • rufus@discuss.tchncs.de
          link
          fedilink
          arrow-up
          5
          ·
          edit-2
          1 year ago

          Or have an entire LVM volume group on that one encrypted partition / mapped device. And have as many logical volumes inside as you want.

      • d3Xt3r@lemmy.nzM
        link
        fedilink
        arrow-up
        2
        arrow-down
        1
        ·
        1 year ago

        You could potentially run Windows in a VM, then you can get rid of the Windows partition and have it all sit within LUKS.

        • PseudoSpock@lemmy.dbzer0.com
          link
          fedilink
          arrow-up
          1
          arrow-down
          8
          ·
          1 year ago

          He doesn't need to explain why he doesn't like FDE, there are plenty of reasons. Shared device, or maybe 2nd level of encryption, whatever. He already said it wasn't what he wanted, the why is none of your business. If you can answer his question, do. If you can't, just say you can't. His preference is his preference. Now, you going to help the guy or not?

          Also, I honestly don't give a flying f if I get downvoted for telling you what you did wrong. Being in the right is all I need, thanks. Won't be seeing your reply, blocking you before you try to be more of a smug ass.

          • Prunebutt@feddit.deOP
            link
            fedilink
            arrow-up
            4
            ·
            edit-2
            1 year ago

            Short interception here: I actually appreciate the question. I think I didn't thoroughly explain what bugged me with FDE. And the X Y problem is something I'd like to be aware of.

            The implied problems with FDE might actually not fit my situation or threat model, why I think it was important to elaborate.

            Edit: Just thought of it in this way: In this context, I'd rather be asked than have things inferred about me.

            • rufus@discuss.tchncs.de
              link
              fedilink
              arrow-up
              4
              ·
              edit-2
              1 year ago

              Wow. This is not going well… Thanks for trying but I guess we left the realm of reason somehow. I'm glad neither of us wants to continue.

            • PseudoSpock@lemmy.dbzer0.com
              link
              fedilink
              arrow-up
              1
              arrow-down
              6
              ·
              1 year ago

              Wth kid. I stick up for you against someone assuming you don't know anything, and then you stick your hand up and say you actually don't? Fine, you deserve one another.

              For the record, if you can afford the performance hit and are on SSD, I recommend either LUKS FDE or filesystem based encryption (ZFS, for example) + Home directory encryption. Don't forget to encrypt the swap, too. That way if you ever have to share the FDE passphrase with someone you share a computer with, your data in your home directory is still safe, and it can encrypt the filenames, too. If you're on spinning disk, you can still go that hard, but it'll be noticeably slower.

              FDE is fine for most work computers. Home directory encryption is for shared computers, or to stack on FDE if you're sufficiently paranoid.