HN 표시: mTLS를 통한 원격 LUKS 디스크 암호 해독
hackernews
|
|
📦 오픈소스
#luks
#mtls
#네트워크
#디스크 암호화
#보안
원문 출처: hackernews · Genesis Park에서 요약 및 분석
요약
이 기사는 SSH 암호 입력 없이 네트워크를 통해 원격으로 LUKS 디스크 암호 해제를 수행하는 mTLS 기반 프로토콜을 소개합니다. 클라이언트는 내부 네트워크에서 CA와 임시 인증서를 생성하고 부팅 파티션에 저장하며, 서버는 이를 검증하여 TTL 내에서만 디스크 잠금 해제를 허용합니다. 이 방식은 공개 네트워크와 부팅 파티션 접근이 가능한 공격자에 대해 SSH를 통한 수동 입력과 동일한 위협 모델을 가지며, 자동화된 안전한 잠금 해제 환경을 제공합니다.
본문
sequenceDiagram participant Server participant Client Note over Client,Server: TRUSTED INTERNAL NETWORK Note over Server: Generate TLS CA Note over Client: Generate ephemeralTLS KEY and CERT with internaland external IPsin subjectAltName Note over Client: Generate Na and Nb,enroll Na XOR Nbon LUKS key slot Client->>Server: Register(hash(CERT), Na) Note over Server: Store sourceIP,hash(CERT)and Na with TTL Server-->>Client: CA create participant Boot@{ "type" : "database" } as Boot Partition Client->>Boot: Nb, CERT, KEY, CA Note over Client: REBOOT Note over Client,Server: PUBLIC NETWORK destroy Boot Boot-->>Client: Nb, CERT, KEY, CA Client->>Server: Unlock() over mTLS(require client cert without verifying) Note over Server: If within TTL and noprevious hit, compare certagainst hash(CERT), andstored and new sourceIPsagainst subjectAltName Server-->>Client: Na Note over Client: Unlock disk withNa XOR Nb - Internal network is trusted, e.g. VPN mesh, nodes are not. - A compromised network unlock server won't collude with an external attacker. - Attacker has full access to the public network. - Attacker has eventual access to the disk and can recover any deleted file. Any full disk encryption unlocking scheme of a remote machine without a TPM, e.g. SSH-ing into a dropbear initramfs, is vulnerable to the same attacker: someone who can read your unencrypted /boot partition and sit on your network. Against dropbear, they extract the SSH host key from the initramfs, impersonate your server, and capture the passphrase you type. This protocol doesn't strive to be stronger than that, it accepts the same threat model. An attacker with disk access + network access within the TTL window can steal the ephemeral TLS cert + key from /boot, connect to the server, and retrieve Na. The protocol just removes the human from the loop while being no worse than typing a password over SSH.
Genesis Park 편집팀이 AI를 활용하여 작성한 분석입니다. 원문은 출처 링크를 통해 확인할 수 있습니다.
공유