Activity log for bug #1773457

Date Who What changed Old value New value Message
2018-05-25 21:18:28 Paddy Landau bug added bug
2018-05-26 13:07:43 Paddy Landau summary Full-system encryption needs to be supported out-of-the-box Full-system encryption needs to be supported out-of-the-box including /boot
2018-05-26 13:31:02 Paddy Landau summary Full-system encryption needs to be supported out-of-the-box including /boot Full-system encryption needs to be supported out-of-the-box including /boot and should not delete other installed systems
2018-05-26 13:31:48 Paddy Landau description In today's world, especially with the likes of the EU's GDPR and the many security fails, Ubuntu installer needs to support full-system encryption out of the box. This means encrypting not only /home but also both root and /boot. The only parts of the system that wouldn't be encrypted are the EFI partition and the initial Grub bootloader, for obvious reasons. Using LUKS and LVM, it is already possible... https://help.ubuntu.com/community/ManualFullSystemEncryption ... but with one major limitation: Grub is incorrectly changed after an update affecting the kernel or Grub, so that a manual Grub update is required each time this happens (this is fully covered in the linked instructions). If the incorrect Grub change is fixed, it should be (relatively) simple to support full-system encryption in the installer. In today's world, especially with the likes of the EU's GDPR and the many security fails, Ubuntu installer needs to support full-system encryption out of the box. This means encrypting not only /home but also both root and /boot. The only parts of the system that wouldn't be encrypted are the EFI partition and the initial Grub bootloader, for obvious reasons. It should also not delete other installed systems unless explicitly requested. Using LUKS and LVM, it is already possible... https://help.ubuntu.com/community/ManualFullSystemEncryption ... but with one major limitation: Grub is incorrectly changed after an update affecting the kernel or Grub, so that a manual Grub update is required each time this happens (this is fully covered in the linked instructions). If the incorrect Grub change is fixed, it should be (relatively) simple to support full-system encryption in the installer.
2018-06-14 14:54:28 Phillip Susi ubiquity (Ubuntu): status New Incomplete
2018-07-02 17:28:20 Dan Streetman bug added subscriber Dan Streetman
2018-07-31 09:51:34 Paddy Landau description In today's world, especially with the likes of the EU's GDPR and the many security fails, Ubuntu installer needs to support full-system encryption out of the box. This means encrypting not only /home but also both root and /boot. The only parts of the system that wouldn't be encrypted are the EFI partition and the initial Grub bootloader, for obvious reasons. It should also not delete other installed systems unless explicitly requested. Using LUKS and LVM, it is already possible... https://help.ubuntu.com/community/ManualFullSystemEncryption ... but with one major limitation: Grub is incorrectly changed after an update affecting the kernel or Grub, so that a manual Grub update is required each time this happens (this is fully covered in the linked instructions). If the incorrect Grub change is fixed, it should be (relatively) simple to support full-system encryption in the installer. In today's world, especially with the likes of the EU's GDPR and the many security fails, Ubuntu installer needs to support full-system encryption out of the box. This means encrypting not only /home but also both root and /boot. The only parts of the system that wouldn't be encrypted are the EFI partition and the initial Grub bootloader, for obvious reasons. It should also not delete other installed systems unless explicitly requested. On top of this, the previous method of encrypting data (ecryptfs) is now considered buggy, and full-disk encryption is recommended as an alternative. Unfortunately, the current implementation of full-disk encryption wipes any existing OS such as Windows, making the implementation unusable for most users. Now, using LUKS and LVM, it is already possible to have full-disk encryption (strictly, full-partition encryption because it leaves any existing OS alone), while encrypting /boot. Reference: https://help.ubuntu.com/community/ManualFullSystemEncryption ... but with one major limitation: Grub is incorrectly changed after an update affecting the kernel or Grub, so that a manual Grub update is required each time this happens (this is fully covered in the linked instructions). If the incorrect Grub change is fixed, it should be (relatively) simple to support full-system encryption in the installer.
2018-07-31 19:08:26 schamane bug added subscriber schamane
2018-08-03 19:16:10 Milan Niznansky bug added subscriber Milan Niznansky
2018-08-03 19:32:53 Milan Niznansky bug task added grub (Ubuntu)
2018-08-03 21:14:26 Launchpad Janitor grub2 (Ubuntu): status New Confirmed
2018-08-03 21:14:26 Steve Langasek affects grub (Ubuntu) grub2 (Ubuntu)
2018-08-06 00:54:56 Launchpad Janitor grub2 (Ubuntu): status New Confirmed
2018-08-06 00:55:02 Sami Ben Hatit bug added subscriber Sami Ben Hatit
2018-08-07 08:28:17 Paddy Landau description In today's world, especially with the likes of the EU's GDPR and the many security fails, Ubuntu installer needs to support full-system encryption out of the box. This means encrypting not only /home but also both root and /boot. The only parts of the system that wouldn't be encrypted are the EFI partition and the initial Grub bootloader, for obvious reasons. It should also not delete other installed systems unless explicitly requested. On top of this, the previous method of encrypting data (ecryptfs) is now considered buggy, and full-disk encryption is recommended as an alternative. Unfortunately, the current implementation of full-disk encryption wipes any existing OS such as Windows, making the implementation unusable for most users. Now, using LUKS and LVM, it is already possible to have full-disk encryption (strictly, full-partition encryption because it leaves any existing OS alone), while encrypting /boot. Reference: https://help.ubuntu.com/community/ManualFullSystemEncryption ... but with one major limitation: Grub is incorrectly changed after an update affecting the kernel or Grub, so that a manual Grub update is required each time this happens (this is fully covered in the linked instructions). If the incorrect Grub change is fixed, it should be (relatively) simple to support full-system encryption in the installer. In today's world, especially with the likes of the EU's GDPR and the many security fails, Ubuntu installer needs to support full-system encryption out of the box. This means encrypting not only /home but also both root and /boot. The only parts of the system that wouldn't be encrypted are the EFI partition and the initial Grub bootloader, for obvious reasons. It should also not delete other installed systems unless explicitly requested. On top of this, the previous method of encrypting data (ecryptfs) is now considered buggy, and full-disk encryption is recommended as an alternative. Unfortunately, the current implementation of full-disk encryption wipes any existing OS such as Windows, making the implementation unusable for most users. Now, using LUKS and LVM, it is already possible to have full-disk encryption (strictly, full-partition encryption because it leaves any existing OS alone), while encrypting /boot. Reference: https://help.ubuntu.com/community/ManualFullSystemEncryption ... but with one major limitation: Grub is incorrectly changed after an update affecting the kernel or Grub, so that a manual Grub update is required each time this happens (this is fully covered in the linked instructions). If the incorrect Grub change is fixed, it should be (relatively) simple to support full-system encryption in the installer. Further information (2018-08-17): The NCSC recommends, "Use LUKS/dm-crypt to provide full volume encryption." References: • https://blog.ubuntu.com/2018/07/30/national-cyber-security-centre-publish-ubuntu-18-04-lts-security-guide • https://www.ncsc.gov.uk/guidance/eud-security-guidance-ubuntu-1804-lts
2018-08-11 21:06:47 Iason Manolas bug added subscriber Iason Manolas
2018-08-15 15:22:23 Simon May bug added subscriber Simon May
2018-08-16 11:42:41 morgents bug added subscriber morgents
2018-09-06 06:28:55 Mario Vukelic bug added subscriber Mario Vukelic
2018-09-10 12:54:29 Viktoria Nemkin bug added subscriber Viktoria Nemkin
2018-09-11 18:24:43 Wes tags encryption installer luks bionic cosmic encryption installer luks
2018-09-11 18:25:23 Wes marked as duplicate 1514120
2018-11-13 07:51:59 Jarno Suni bug added subscriber Jarno Suni
2018-12-10 21:48:23 Paulo bug added subscriber Paulo
2019-03-15 10:00:05 semreh bug added subscriber semreh
2019-04-24 10:20:07 Dan Streetman removed subscriber Dan Streetman
2019-04-24 14:00:40 DJ removed duplicate marker 1514120
2019-07-23 14:56:14 Tom Reynolds bug added subscriber Tom Reynolds
2019-10-11 16:39:23 Xavier Gnata ubiquity (Ubuntu): status Incomplete Confirmed
2019-10-11 16:40:16 Xavier Gnata bug added subscriber Xavier Gnata
2020-02-19 19:48:29 Miguel bug added subscriber Miguel
2020-04-04 10:12:30 Valentyn Kovalenko bug added subscriber Valentyn Kovalenko
2020-04-06 09:55:04 Iason Manolas removed subscriber Iason Manolas
2020-04-19 18:05:58 Paddy Landau description In today's world, especially with the likes of the EU's GDPR and the many security fails, Ubuntu installer needs to support full-system encryption out of the box. This means encrypting not only /home but also both root and /boot. The only parts of the system that wouldn't be encrypted are the EFI partition and the initial Grub bootloader, for obvious reasons. It should also not delete other installed systems unless explicitly requested. On top of this, the previous method of encrypting data (ecryptfs) is now considered buggy, and full-disk encryption is recommended as an alternative. Unfortunately, the current implementation of full-disk encryption wipes any existing OS such as Windows, making the implementation unusable for most users. Now, using LUKS and LVM, it is already possible to have full-disk encryption (strictly, full-partition encryption because it leaves any existing OS alone), while encrypting /boot. Reference: https://help.ubuntu.com/community/ManualFullSystemEncryption ... but with one major limitation: Grub is incorrectly changed after an update affecting the kernel or Grub, so that a manual Grub update is required each time this happens (this is fully covered in the linked instructions). If the incorrect Grub change is fixed, it should be (relatively) simple to support full-system encryption in the installer. Further information (2018-08-17): The NCSC recommends, "Use LUKS/dm-crypt to provide full volume encryption." References: • https://blog.ubuntu.com/2018/07/30/national-cyber-security-centre-publish-ubuntu-18-04-lts-security-guide • https://www.ncsc.gov.uk/guidance/eud-security-guidance-ubuntu-1804-lts In today's world, especially with the likes of the EU's GDPR and the many security fails, Ubuntu installer needs to support full-system encryption out of the box. This means encrypting not only /home but also both root and /boot. The only parts of the system that wouldn't be encrypted are the EFI partition and the initial Grub bootloader, for obvious reasons. It should also not delete other installed systems unless explicitly requested. On top of this, the previous method of encrypting data (ecryptfs) is now considered buggy, and full-disk encryption is recommended as an alternative. Unfortunately, the current implementation of full-disk encryption wipes any existing OS such as Windows, making the implementation unusable for most users. Now, using LUKS and LVM, it is already possible to have full-disk encryption (strictly, full-partition encryption because it leaves any existing OS alone), while encrypting /boot. Reference: https://help.ubuntu.com/community/ManualFullSystemEncryption ... but with one major limitation: Grub is incorrectly changed after an update affecting the kernel or Grub, so that a manual Grub update is required each time this happens (this is fully covered in the linked instructions). If the incorrect Grub change is fixed, it should be (relatively) simple to support full-system encryption in the installer. Further information (2018-08-17): The NCSC recommends, "Use LUKS/dm-crypt to provide full volume encryption." References: • https://blog.ubuntu.com/2018/07/30/national-cyber-security-centre-publish-ubuntu-18-04-lts-security-guide • https://www.ncsc.gov.uk/guidance/eud-security-guidance-ubuntu-1804-lts **EDIT** Refer to comment #47 for an alternative version.
2020-10-17 00:15:10 Akihiro HARAI bug added subscriber Akihiro HARAI
2020-11-17 16:52:37 Martin Bruzina bug added subscriber Martin Bruzina
2020-12-22 18:28:58 Julian Andres Klode grub2 (Ubuntu): importance Undecided Wishlist
2020-12-26 12:44:28 Adam Romanek bug added subscriber Adam Romanek
2021-02-23 11:15:02 Michel-Ekimia bug added subscriber Michel-Ekimia