How to verify /boot partition on encrypted LVM setup

Posted by ml43 on Super User See other posts from Super User or by ml43
Published on 2013-11-02T07:04:27Z Indexed on 2013/11/02 9:58 UTC
Read the original article Hit count: 188

Filed under:
|

Isn't unencrypted /boot partition a weakness for encrypted LVM setup? Attacker may install a malware to /boot partition so that it may sniff encryption password next time system boots. It may also be done by a malware installed to Windows on dual-boot system without any physical access.

Am I missing some protection scheme or at least I may verify that /boot contents didn't change since last system shutdown?

© Super User or respective owner

Related posts about disk-encryption

Related posts about lvm