How to verify /boot partition on encrypted LVM setup
Posted
by
ml43
on Super User
See other posts from Super User
or by ml43
Published on 2013-11-02T07:04:27Z
Indexed on
2013/11/02
9:58 UTC
Read the original article
Hit count: 183
disk-encryption
|lvm
Isn't unencrypted /boot partition a weakness for encrypted LVM setup? Attacker may install a malware to /boot partition so that it may sniff encryption password next time system boots. It may also be done by a malware installed to Windows on dual-boot system without any physical access.
Am I missing some protection scheme or at least I may verify that /boot contents didn't change since last system shutdown?
© Super User or respective owner