Commit Graph

27 Commits

Author SHA1 Message Date
036f518ddc improvement 2022-06-30 13:56:29 -04:00
0e2fae2b69 skip ram wipe inside VMs
https://forums.whonix.org/t/is-ram-wipe-possible-inside-whonix-cold-boot-attack-defense/5596/40
2022-06-30 13:50:18 -04:00
e06405c7be undo 2022-06-29 16:56:16 -04:00
1b97d9cb76 fix 2022-06-29 16:30:31 -04:00
92c543e71f output 2022-06-29 16:24:52 -04:00
d4161b2748 output 2022-06-29 16:23:42 -04:00
1ce7b27297 improvement 2022-06-29 16:23:12 -04:00
f5e0c1742a credits 2022-06-29 16:02:05 -04:00
42e24f3c24 update file names 2022-06-29 15:54:49 -04:00
52aaac9b6d rename 2022-06-29 15:53:52 -04:00
619bb3cf4d rename 2022-06-29 15:53:24 -04:00
2a8504cf1b move 2022-06-29 15:51:14 -04:00
af8b211c23 improvements 2022-06-29 15:50:20 -04:00
e9cd5d934b copyright 2022-06-29 15:24:27 -04:00
9ab81d4581 do not power off too fast so wipe ram messages can be read 2022-06-29 15:22:00 -04:00
19439033de copyright 2022-06-29 15:19:56 -04:00
fc202ede16 delete no longer required usr/lib/dracut/modules.d/40sdmem-security-misc/README.md 2022-06-29 15:18:28 -04:00
6d3a08a936 improvements 2022-06-29 15:17:40 -04:00
8a072437cc ram wipe on shutdown: fix, added need_shutdown hook
Otherwise dracut does not run on shutdown.

Without `need_shutdown` file `/run/initramfs/.need_shutdown` does not get created.
And without that file `/usr/lib/dracut/dracut-initramfs-restore`,
which itself is started by `/lib/systemd/system/dracut-shutdown.service` does nothing.
2022-06-29 14:13:30 -04:00
924077e04c verbose 2022-06-29 13:02:53 -04:00
db301dfd7f comment 2022-06-29 13:02:39 -04:00
73d2ada0de comment 2022-06-29 13:02:01 -04:00
295811a88f improvements 2022-06-29 11:14:52 -04:00
024d52a67e improve usr/lib/dracut/modules.d/40sdmem-security-misc/module-setup.sh 2022-06-29 09:52:53 -04:00
29253004b6 minor 2022-06-29 09:38:18 -04:00
6f19af1542 add shebang /bin/sh
to fix lintian warning
security-misc: executable-not-elf-or-script usr/lib/dracut/modules.d/40sdmem-security-misc/wipe.sh
2022-06-29 09:35:08 -04:00
38cdf2722b - Wipe LUKS Disk Encryption Key for Root Disk from RAM during Shutdown to defeat Cold Boot Attacks
- Confirm in console output if encrypted mounts (root disk) is unmounted. (Because that is a pre-condition for wiping the LUKS full disk encryption key from RAM.)

Thanks to @friedy10!

https://github.com/friedy10/dracut/tree/master/modules.d/40sdmem

https://forums.whonix.org/t/is-ram-wipe-possible-inside-whonix-cold-boot-attack-defense/5596
2022-06-29 09:32:55 -04:00