How to verify /boot partition on encrypted LVM setup
- by ml43
Isn't unencrypted /boot partition a weakness for encrypted LVM setup? Attacker may install a malware to /boot partition so that it may sniff encryption password next time system boots. It may also be done by a malware installed to Windows on dual-boot system without any physical access.
Am I missing some protection scheme or at least I may verify that /boot contents didn't change since last system shutdown?