F4: No LUKS on nullstone — full-disk encryption missing #1
Loading…
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Severity: Critical — Risk Score 20/25
Status: Accepted long-term risk, pending rebuild window
/dev/nvme0n1p3is a raw LVM PV — no LUKS layer. All logical volumes (root, home, var, swap) plaintext. Matches 2026-04-11 audit finding — 13 months unremediated.Threat model: Drive theft, evil-maid live-USB, cold-boot RAM extraction.
Impact if compromised: LE account key, Gandi PAT, Tuwunel registration tokens (×2), LiveKit signing key, Headscale noise + machine + preauth keys, Mongo creds, RC admin pw, n8n owner creds, simplex plaintext archive, friend's tailnet identity.
Fix: Reinstall with LUKS2 (argon2id) on
p3+ encrypted swap + TPM2 unlock with Secure Boot measurement chain.Verification:
cryptsetup luksDump /dev/nvme0n1p3shows LUKS2 + argon2id + 100k+ iter count.Blocked on: scheduled maintenance window — server is single-host, requires data migration plan first.
Source:
security/nullstone-server/2026-05-02.md§F4.