[Bug 1724035] [NEW] Fails to decrypt /boot with grub-efi default configuration
Roman Odaisky
to.roma.from.lp at qwertty.com
Mon Oct 16 18:15:34 UTC 2017
Public bug reported:
I took a fully functional EFI-based Ubuntu installation running artful
RC and decided to start using full disk encryption. I booted from
removable media, shrank my LVM PV and did cryptsetup-reencrypt --new.
Then I chrooted, added an entry to crypttab, added
GRUB_ENABLE_CRYPTODISK=y to /etc/default/grub and ran update-initramfs
-u; update-grub; grub-install. I ended up with:
sda1 -- ESP
sda2 -- LUKS -- LVM (/ is here, including /boot)
So far so good, this should have done the trick, but the system ended up
unbootable. update-grub does add the necessary commands to grub.cfg...
and then places that grub.cfg inside the encrypted container, putting
only a short grub.cfg into the ESP that redirects to the former.
grub-install should signal an error if components that are essential for
decryption of the container are inside the container. The workaround can
be as simple as mv /boot/grub /boot/efi/grub && ln -s /boot/efi/grub
/boot/grub; but silently proceeding is unacceptable.
Additionally, I wonder if it should become recommended practice for GRUB
to reside entirely in the ESP, as opposed to the current approach where
it’s partly there and partly in /boot.
** Affects: grub2 (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to grub2 in Ubuntu.
https://bugs.launchpad.net/bugs/1724035
Title:
Fails to decrypt /boot with grub-efi default configuration
Status in grub2 package in Ubuntu:
New
Bug description:
I took a fully functional EFI-based Ubuntu installation running artful
RC and decided to start using full disk encryption. I booted from
removable media, shrank my LVM PV and did cryptsetup-reencrypt --new.
Then I chrooted, added an entry to crypttab, added
GRUB_ENABLE_CRYPTODISK=y to /etc/default/grub and ran update-initramfs
-u; update-grub; grub-install. I ended up with:
sda1 -- ESP
sda2 -- LUKS -- LVM (/ is here, including /boot)
So far so good, this should have done the trick, but the system ended
up unbootable. update-grub does add the necessary commands to
grub.cfg... and then places that grub.cfg inside the encrypted
container, putting only a short grub.cfg into the ESP that redirects
to the former.
grub-install should signal an error if components that are essential
for decryption of the container are inside the container. The
workaround can be as simple as mv /boot/grub /boot/efi/grub && ln -s
/boot/efi/grub /boot/grub; but silently proceeding is unacceptable.
Additionally, I wonder if it should become recommended practice for
GRUB to reside entirely in the ESP, as opposed to the current approach
where it’s partly there and partly in /boot.
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/grub2/+bug/1724035/+subscriptions
More information about the foundations-bugs
mailing list