Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Install pfsense on full encrypted hard

    Scheduled Pinned Locked Moved Problems Installing or Upgrading pfSense Software
    19 Posts 8 Posters 8.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • johnpozJ
      johnpoz LAYER 8 Global Moderator
      last edited by

      "our corporate policy states that all server "

      Its not a SERVER – its a firewall/router ;)  Do you have the compact flash of all of your cisco routers encrypted?

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 24.11 | Lab VMs 2.8, 24.11

      1 Reply Last reply Reply Quote 0
      • O
        oldparrothead
        last edited by

        Don't use Cisco, overpriced and overblown for most equipment (speaking with 20+ years of using them).

        However, that was not the question asked.

        Sounds like politico talk  ;D

        Got your point, will try to approach my client with this, but pretty sure he will not buy it.
        Thanks for your quick response, I actually do appreciate it!

        Tom

        1 Reply Last reply Reply Quote 0
        • johnpozJ
          johnpoz LAYER 8 Global Moderator
          last edited by

          Cisco was just an example - So I am curious if your other networking equipment that has storage like compact flash - which in sense is the same as a hard drive. Are they encrypted?

          How do you want to define "server" anything you can ssh to or telnet too could be considered a server if you want to blanket.. They serve up that service so server.  Is their storage encrypted?

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.8, 24.11

          1 Reply Last reply Reply Quote 0
          • O
            oldparrothead
            last edited by

            No, flash memory in routers is NOT encrypted.
            However, outside routers contain do not contain any passwords in cleartext which could compromise the integrity of the network.

            Although we have doubts that pfSense would be compromised due to our current architecture, so did Target.
            As a former bank employee, I know that hackers with nothing else to do simply find this stuff a challenge (admit it….)

            So, back to the original point, is there a know way to install pfSense to encrypt the hard drive? Without using a Virtual Machine?

            Thanks,

            Tom

            1 Reply Last reply Reply Quote 0
            • stephenw10S
              stephenw10 Netgate Administrator
              last edited by

              Never tried it, probably one for the devs, but the relevant options appear to be in the kernel:

              options   GEOM_BDE
              options   GEOM_ELI 
              

              You can use geom to set up software mirroring so it seems at least feasible.
              https://doc.pfsense.org/index.php/Create_a_Software_RAID1_%28gmirror%29

              Steve

              1 Reply Last reply Reply Quote 0
              • johnpozJ
                johnpoz LAYER 8 Global Moderator
                last edited by

                Other than the CA private key which does not have a password - but does not need to be stored on pfsense if that is really a concern.  What passwords would be stored on pfsense in clear that could compromise the integrity of the network?  I am honestly curious on this thought process.

                Is the pfsense admin password stored in clear?  lets say it was - to gain access to this wouldn't the box already have to be compromised, or have physical access to it.. So wouldn't the security already be compromised?

                Are you saying that users vpn or cert passwords are stored in clear?

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.8, 24.11

                1 Reply Last reply Reply Quote 0
                • N
                  NOYB
                  last edited by

                  @oldparrothead:

                  …
                  As a former bank employee, I know that hackers with nothing else to do simply find this stuff a challenge (admit it....)

                  So, back to the original point, is there a know way to install pfSense to encrypt the hard drive? Without using a Virtual Machine?

                  Thanks,

                  Tom

                  Disk encryption is not a defense against hackers.  When the machine is up and running the contents are accessible to any hacker that finds their way in.

                  Disk encryption only protects the contents of and off system.  Typically in the case of physical theft.

                  Please note.  I'm not arguing against the value of pfSense disk encryption.  Just pointing out that it is not a hacker defense for an up and running system.

                  Depending on packages, logging, type of business, etc. it is probably reasonable that sensitive data could be on the system that should be protected in the case of physical security breach and theft.

                  Perhaps off loading the storage logs, etc. could be a solution.

                  Regarding the need to be present to enter a passphrase to reboot.  This is only the case if the encryption cannot make use of a TPM or such.  Merely being able to boot the machine does not provide a thief access to the contents.  They still would need valid user credentials.  But the encryption, even with TPM to unlock prevents the drive from being slaved to another system to gain access.

                  And by the way probably any government agency that would physically take your equipment can probably coerce you or some other employee to divulge the passphrase.

                  Just some things to think about when pondering what it is you are trying to protect and from whom and in what circumstances.

                  1 Reply Last reply Reply Quote 0
                  • stephenw10S
                    stephenw10 Netgate Administrator
                    last edited by

                    Sometimes it's easier and quicker to just do something that you've been instructed to do even if you know it's not going to help one iota. That assumes of course that it isn't going to actually make things worse.  ;)

                    Steve

                    1 Reply Last reply Reply Quote 0
                    • N
                      NOYB
                      last edited by

                      @stephenw10:

                      Sometimes it's easier and quicker to just do something that you've been instructed to do even if you know it's not going to help one iota. That assumes of course that it isn't going to actually make things worse.  ;)

                      Steve

                      Yup.  It's no wonder so many companies, organizations and gov. agencies, do so many dumb things.

                      Those giving the marching orders aren't the ones with the knowledge, just simply those with the power and political influence, etc.

                      1 Reply Last reply Reply Quote 0
                      • F
                        Finger79
                        last edited by

                        @johnpoz:

                        Other than the CA private key (and other private keys and shared keys) which does not have a password - but does not need to be stored on pfsense if that is really a concern.

                        Is there a way to encrypt and password protect the CA private key if using the native pfSense CA?  Ideally I would have a separate physical keyserver that's 100% offline, but that's a project for another day.

                        And also, ideally, I would offload a lot of the logs to another log server or repository, but that's also a project for another day.

                        I'm still very interested in implementing GELI full-disk encryption (with manual passphrase entry every reboot) to help mitigate physical theft from some meth-head burglar breaking into my house.  I think most people are fully aware that any mounted encrypted disk, container, or partition – while running -- is transparently and fully in the clear.  I think those of us interested in full-disk encryption are merely trying to mitigate physical theft from common thieves.

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.