5
1
Does a tool/method exist which allows encrypting a Windows 7 system volume while providing the possibility to remotely unlock it via ssh during the boot phase? Is it even possible with Windows 7 (I guess it should be)?
On linux, a LUKS encrypted rootfs can be unlocked via ssh during the boot phase (also see /usr/share/doc/cryptsetup/README.remote.gz on Debian).
The DiskCryptor project comes with a powerful bootloader which allows booting an encrypted system volume by unlocking it via USB or LAN (automatically providing the previously hard-coded password). However, I found no possibility to enter the required unlocking password over a ssh connection and I absolutely don't want to hard-code the password somewhere (not even in my (hopefully) secure LAN).
Therefore, a similar solution to the LUKS approach most probably involves a separate unencrypted boot partition with an ssh server and some boot magic which handles the unlocking and allows chain-loading the encrypted system partition with Windows 7.
Does anything like this exist or is being developed?
1What product did you use to encrypt the disk? You describe Linux parallels instead of describing what you did with Windows. There is not enough info here for a useful answer. – harrymc – 2012-07-24T05:50:31.537
@harrymc I'm not asking for a specific solution e.g. using TrueCrypt. I'm just asking for anything that would allow windows system volume encryption as well as remote unlocking via ssh. Perhaps another fork of TrueCrypt or FreeOTFE or whatever - I would gladly use it and encrypt my system volume with it. I used the LUKS example to show that such solutions exist, at least for linux. (I edited the question for clarification)
– speakr – 2012-07-24T09:14:35.0301One solution might be to convert Windows 7 into a virtual machine inside Linux. – harrymc – 2012-07-24T09:35:15.957
This article might help you, but I don't have the right environment for it. – harrymc – 2012-07-24T11:48:50.157
@harrymc Hmm, the mentioned TrueCrypt rescue disk must reside in an encrypted folder and GRUB must be able to access it by asking for a password supplied via ssh.. A lot of conditions, but I'll have a look into this - thanks for the hint. – speakr – 2012-07-24T14:21:24.883
2
I just found this question which mentions
– speakr – 2012-07-24T14:26:34.703kexec. This could be the holy grail: Booting into a LUKS-encrypted linux by unlocking it via ssh, then using kexec to directly boot a TrueCrypt-encrypted windows system volume from there using the TrueCrypt rescue disk. I'll try that. :)Looks promising indeed. – harrymc – 2012-07-24T15:54:57.380
Hi Speakr Unfortunately I don't have a key in hand solution for you but I think the solution may be using Sysinternals PsExec which allow to run any program remotely. http://technet.microsoft.com/en-us/sysinternals/bb897553
– climenole – 2012-07-25T22:55:49.1901@climenole PsExec can only be used to execute applications on an already booted windows system. Therefore, it is no solution for my scenario. – speakr – 2012-07-26T07:29:09.910
http://www.intel.com/content/www/us/en/architecture-and-technology/vpro/vpro-technology-general.html Only works if you have the hardware and the 3rd party apps. – Phillip R. – 2012-07-27T01:57:42.080
@PhillipR. I guess you refer to Intel's hardware-based encryption and KVM remote control. As you already mentioned, this depends on very specific hardware and therefore is no feasible solution. – speakr – 2012-07-27T23:00:37.480
@Speakr yeah, that is the only setup that I have ever heard that could do what you are asking. – Phillip R. – 2012-07-28T02:20:15.220