{"id":1253,"date":"2017-11-09T05:04:55","date_gmt":"2017-11-09T03:04:55","guid":{"rendered":"https:\/\/community.virtono.com\/?p=1253"},"modified":"2017-11-09T05:04:55","modified_gmt":"2017-11-09T03:04:55","slug":"unlock-full-encrypted-system-via-ssh","status":"publish","type":"post","link":"https:\/\/www.virtono.com\/community\/tutorial-how-to\/unlock-full-encrypted-system-via-ssh\/","title":{"rendered":"Unlock full-encrypted system via SSH"},"content":{"rendered":"<p>A complete encryption of your own system is an excellent way to ensure the confidentiality of your own data.\u00a0The current Ubuntu installer offers a guided installation to encrypt the entire system with &#8221;\u00a0<b>encrypted LVMs<\/b>\u00a0&#8220;.\u00a0For both the automated installation and the manual way, there are numerous detailed guides that explain the facility.<\/p>\n<p>The advantage of using LVMs is that only one\u00a0<b>password is<\/b>\u00a0required to unlock all logical volumes<b><\/b>must be entered.\u00a0This unlocks the crypto-device containing the volume group and logical volumes for eg &#8220;\/ root&#8221; and &#8220;\/ home&#8221;.\u00a0For successful booting, only an unencrypted boot partition is needed.\u00a0When the server is booted, the password for unlocking the crypto device is then requested (&#8220;Pre-boot authentication&#8221;).\u00a0Since no file system is available except &#8220;\/ boot&#8221;, it is not possible to unlock the system via a remote connection.\u00a0The password must be entered via a connected keyboard, which can be problematic for a server.\u00a0The configuration described in this article therefore prevents a completely encrypted Ubuntu from<\/p>\n<p>More specifically, this article explains how a fully encrypted\u00a0<b>Ubuntu Server 14.04<\/b>\u00a0can be unlocked\u00a0via\u00a0<b>SSH connection<\/b>\u00a0.\u00a0For this purpose, a small SSH server called &#8220;dropbear&#8221;<sup id=\"cite_ref-3\" class=\"reference\">\u00a0is<\/sup>\u00a0installed and set up, which is already available at the time of\u00a0initramfs\u00a0.\u00a0Some information in this guide can also be found in &#8220;\/ usr \/ share \/ doc \/ cryptsetup&#8221; in the file &#8220;README.remote.gz&#8221; (&#8221;\u00a0<b>unlocking rootfs via ssh login in initramfs<\/b>\u00a0&#8220;).<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_73 counter-hierarchy ez-toc-counter ez-toc-light-blue ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.virtono.com\/community\/tutorial-how-to\/unlock-full-encrypted-system-via-ssh\/#installation\" title=\"installation\">installation<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.virtono.com\/community\/tutorial-how-to\/unlock-full-encrypted-system-via-ssh\/#configuration\" title=\"configuration\">configuration<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.virtono.com\/community\/tutorial-how-to\/unlock-full-encrypted-system-via-ssh\/#Network_Configuration\" title=\"Network Configuration\">Network Configuration<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.virtono.com\/community\/tutorial-how-to\/unlock-full-encrypted-system-via-ssh\/#SSH_access_to_Dropbear\" title=\"SSH access to Dropbear\">SSH access to Dropbear<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.virtono.com\/community\/tutorial-how-to\/unlock-full-encrypted-system-via-ssh\/#Unlock_the_crypto_device\" title=\"Unlock the crypto device\">Unlock the crypto device<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"installation\"><\/span><span id=\"Installation\" class=\"mw-headline\">installation<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The dropbear SSH server\u00a0is installed via &#8220;apt&#8221;:<\/p>\n<div class=\"mw-highlight mw-content-ltr\" dir=\"ltr\">\n<pre>sudo apt-get install dropbear\r\n<\/pre>\n<\/div>\n<h2><span class=\"ez-toc-section\" id=\"configuration\"><\/span><span id=\"Konfiguration\" class=\"mw-headline\">configuration<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>First, in the file &#8220;\/etc\/initramfs-tools\/initramfs.conf&#8221; is the line<\/p>\n<div class=\"mw-highlight mw-content-ltr\" dir=\"ltr\">\n<pre><span class=\"nv\">DROPBEAR <\/span><span class=\"o\">=<\/span> y\r\n<\/pre>\n<\/div>\n<p>inserted.<\/p>\n<p><b>Attention:<\/b>\u00a0All configurations regarding the initramfs have to be updated via &#8220;update-initramfs&#8221;:<\/p>\n<div class=\"mw-highlight mw-content-ltr\" dir=\"ltr\">\n<pre>sudo update-initramfs -u\r\n<\/pre>\n<\/div>\n<h3><span class=\"ez-toc-section\" id=\"Network_Configuration\"><\/span><span id=\"Netzwerk-Konfiguration\" class=\"mw-headline\">Network Configuration<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>The network configuration for remote access to the server is performed in the following file:<\/p>\n<div class=\"mw-highlight mw-content-ltr\" dir=\"ltr\">\n<pre>\/etc\/initramfs-tools\/initramfs.conf\r\n<\/pre>\n<\/div>\n<p>The detailed rules for configuring the\u00a0device\u00a0can\u00a0be found under\u00a0nfsroot.txt\u00a0.\u00a0For example, the following line can be added for DHCP:<\/p>\n<div class=\"mw-highlight mw-content-ltr\" dir=\"ltr\">\n<pre><span class=\"c1\"># <\/span>\r\n<span class=\"c1\"># DEVICE: ... <\/span>\r\n<span class=\"c1\"># <\/span>\r\n<span class=\"c1\"># Specify the network interface, like eth0 <\/span>\r\n<span class=\"c1\"># <\/span>\r\n<span class=\"nv\">DEVICE <\/span><span class=\"o\">=<\/span> eth1\r\n <span class=\"nv\">IP <\/span><span class=\"o\">=<\/span> ::::: eth1: dhcp\r\n<\/pre>\n<\/div>\n<p>For a static address, the line must be changed as follows:<\/p>\n<div class=\"mw-highlight mw-content-ltr\" dir=\"ltr\">\n<pre><span class=\"nv\">DEVICE <\/span><span class=\"o\">=<\/span> eth1\r\n <span class=\"nv\">IP <\/span><span class=\"o\">=<\/span> 192.168.56.101:::255.255.255.0::eth1:off\r\n<\/pre>\n<\/div>\n<p>Again an update of the initramfs is done:<\/p>\n<div class=\"mw-highlight mw-content-ltr\" dir=\"ltr\">\n<pre>sudo update-initramfs -u\r\n<\/pre>\n<\/div>\n<p>Now the network device is already configured before polling the password for the crypto device.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"SSH_access_to_Dropbear\"><\/span><span id=\"SSH-Zugriff_auf_Dropbear\" class=\"mw-headline\">SSH access to Dropbear<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Dropbear creates several keys during installation.\u00a0The host key for identification<span style=\"font-size: 13.3333px\">\u00a0<\/span>of the server is located in:<\/p>\n<div class=\"mw-highlight mw-content-ltr\" dir=\"ltr\">\n<pre>lvtest @ubuntu: ~ $ ls \/ etc \/ initramfs-tools \/ etc \/ dropbear \/\r\ndropbear_dss_host_key dropbear_rsa_host_key\r\n<\/pre>\n<\/div>\n<p>In addition,\u00a0RSA\u00a0keys\u00a0are automatically\u00a0generated\u00a0for public-key authentication.\u00a0These are stored in the following directory:<\/p>\n<div class=\"mw-highlight mw-content-ltr\" dir=\"ltr\">\n<pre>lvtest @ ubuntu: ~ $ ls \/etc\/initramfs-tools\/root\/.ssh\/\r\nauthorized_keys id_rsa id_rsa.pub\r\n<\/pre>\n<\/div>\n<p>The private key &#8220;id_rsa&#8221; can be used to access the server from the client.\u00a0He has to be transferred to the client via a secure path.<\/p>\n<p><b>Attention:<\/b>\u00a0The private key of Dropbear is unencrypted, if the file &#8220;id_rsa&#8221; should be stolen by an attacker, it has direct access to the Dropbear SSH server.\u00a0Since Dropbear is compatible with openssh keys, it is recommended that you create your own SSH key pair on the client and then add the public key to the &#8220;Authorized Keys&#8221; file of Dropbear (\u00a0see also SSH_Key_Login\u00a0) (on the client):<\/p>\n<div class=\"mw-highlight mw-content-ltr\" dir=\"ltr\">\n<pre>ssh-keygen \r\nGenerating public \/ private rsa key pair.\r\nEnter file in which to save the key <span class=\"o\">(<\/span> \/home\/client\/.ssh\/id_rsa <span class=\"o\">)<\/span> : \/home\/client\/.ssh\/dropbear\/id_rsa_initram\r\nEnter passphrase <span class=\"o\">(<\/span> empty <span class=\"k\">for<\/span> no passphrase <span class=\"o\">)<\/span> :\r\nEnter same passphrase again: \r\nYour identification has been saved in \/home\/client\/.ssh\/dropbear\/id_rsa_initram.\r\nYour public key has been saved in \/home\/client\/.ssh\/dropbear\/id_rsa_initram.pub.\r\n<\/pre>\n<\/div>\n<p><b>Important:<\/b>\u00a0The use of a password ensures the encryption of the private key using the AES-CBC 128-bit key.\u00a0The private key can thus only be used after the password has been entered successfully, since the file &#8220;id_rsa_initram&#8221; is not available in plain text.\u00a0The public key can now be copied to the server:<\/p>\n<div class=\"mw-highlight mw-content-ltr\" dir=\"ltr\">\n<pre>client @ test: ~ $ scp \/home\/client\/.ssh\/dropbear\/id_rsa_initram.pub lvtest@192.168.56.101: \/ home \/ lvtest \r\nlvtest@192.168.56.101 <span class=\"err\">'<\/span> s password:\r\nid_rsa_initram.pub 100%   <span class=\"m\">396<\/span>      0.4KB \/ s 00:00\r\n<\/pre>\n<\/div>\n<p>In order for us to access the server, we add (on the server) the client created public key to the &#8220;Authorized Keys&#8221; file of Dropbear:<\/p>\n<div class=\"mw-highlight mw-content-ltr\" dir=\"ltr\">\n<pre>lvtest @ ubuntu: ~ $ sudo su\r\nroot @ ubuntu: \/ home \/ lvtest # cat id_rsa_initram.pub &gt;&gt; \/etc\/initramfs-tools\/root\/.ssh\/authorized_keys\r\n<\/pre>\n<\/div>\n<p>Now the server can be restarted and a connection test carried out with the key pair just created:<\/p>\n<div class=\"mw-highlight mw-content-ltr\" dir=\"ltr\">\n<pre>client @ test: ~ $ ssh -i .ssh \/ dropbear \/ id_rsa_initram -o <span class=\"nv\">UserKnownHostsFile <\/span><span class=\"o\">=<\/span> .ssh \/ dropbear \/ known_hosts root@192.168.56.101\r\nThe authenticity of host <span class=\"s1\">'192.168.56.101 (192.168.56.101)'<\/span> can not <span class=\"s1\">be established. <\/span>\r\n<span class=\"s1\">RSA key fingerprint is 03: 92: 1f: 35: fc: e2: 2b: db: ac: 9b: b7: 03: ba: 37: e5: f1. <\/span>\r\n<span class=\"s1\">Are you sure you want to continue connecting (yes \/ no)? yes <\/span>\r\n<span class=\"s1\">Warning: Permanently added '<\/span> 192.168.56.101 <span class=\"s1\">' (RSA) to the list of known hosts.<\/span>\r\n\r\n\r\n<span class=\"s1\">BusyBox v1.21.1 (Ubuntu 1: 1.21.0-1ubuntu1) built-in shell (ash) <\/span>\r\n<span class=\"s1\">Enter '<\/span> help <span class=\"err\">' <\/span> <span class=\"k\">for<\/span> a list of built-in commands.\r\n\r\n<span class=\"c1\">#<\/span>\r\n<\/pre>\n<\/div>\n<p>So the test was successful and we get on the server a BusyBox shell, which we use later for unlocking the crypto-device.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Unlock_the_crypto_device\"><\/span><span id=\"Entsperren_des_Crypto-Devices\" class=\"mw-headline\">Unlock the crypto device<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>If the connection test to Dropbear has been successful, the actual unlocking of the encrypted LVMs can be done.\u00a0Due to a bug in Ubuntu&#8217;s Plymouth, however, there are still some lines left in<\/p>\n<div class=\"mw-highlight mw-content-ltr\" dir=\"ltr\">\n<pre>\/ Usr \/ share \/ initramfs-tools \/ scripts \/ local-top \/ cryptroot\r\n<\/pre>\n<\/div>\n<p>be commented out.\u00a0Which lines are that can also be found in post # 5 under\u00a0[1]\u00a0(after line 289):<\/p>\n<div class=\"mw-highlight mw-content-ltr\" dir=\"ltr\">\n<pre><span class=\"k\">if <\/span> <span class=\"o\">[<\/span> -z <span class=\"s2\">\" <\/span><span class=\"nv\">$ c <\/span><span class=\"s2\">ryptkeyscript\" <\/span> <span class=\"o\">] <\/span><span class=\"p\">; <\/span> <span class=\"k\">then <\/span>\r\n   <span class=\"nv\">cryptkey <\/span><span class=\"o\">= <\/span><span class=\"s2\">\"Unlocking the disk <\/span><span class=\"nv\">$ c <\/span><span class=\"s2\">ryptsource ( <\/span><span class=\"nv\">$ c <\/span><span class=\"s2\">rypttarget) \\ nEnter passphrase:\" <\/span>\r\n   <span class=\"c1\">#if [-x \/ bin \/ plymouth] &amp;&amp; plymouth --ping; then <\/span>\r\n   <span class=\"c1\"># cryptkeyscript = \"plymouth ask-for-password --prompt\" <\/span>\r\n   <span class=\"c1\"># cryptkey = $ (echo -e \"$ cryptkey\") <\/span>\r\n   <span class=\"c1\">#else <\/span>\r\n    <span class=\"nv\">cryptkeyscript <\/span><span class=\"o\">= <\/span><span class=\"s2\">\"\/ lib \/ cryptsetup \/ askpass\" <\/span>\r\n   <span class=\"c1\">#fi <\/span>\r\n  <span class=\"k\">fi<\/span>\r\n<\/pre>\n<\/div>\n<p><b>Attention:<\/b>\u00a0After commenting out the lines, the unlocking of the crypto devices only works remotely and no longer locally!\u00a0<b>It is therefore essential that all previous settings have been checked (preferably individually and consecutively):<\/b><\/p>\n<ol>\n<li>Successful installation<\/li>\n<li>Network configuration of the device<\/li>\n<li>Access to Dropbear via SSH with public-key authentication<\/li>\n<li>Local unlocking of crypto-devices<\/li>\n<\/ol>\n<p>If, for example, the configuration of the SSH server or the network device fails, a physical access to the server is required and the password must be entered with an attached keyboard.\u00a0The patch of the Plymouth bug may therefore only be carried out if the other settings work safely!<\/p>\n<p>Another possibility would be the creation of a hook script, but this variant was not verified by the author of this wiki article and is therefore only to be tested at your own risk.\u00a0Finally, update the initramfs configuration again:<\/p>\n<div class=\"mw-highlight mw-content-ltr\" dir=\"ltr\">\n<pre>sudo update-initramfs -u\r\n<\/pre>\n<\/div>\n<p>Now we connect back to the server via SSH (Dropbear) and get to BusyBox Shell:<\/p>\n<div class=\"mw-highlight mw-content-ltr\" dir=\"ltr\">\n<pre>client @ test: ~ $ ssh -i .ssh \/ dropbear \/ id_rsa_initram -o <span class=\"nv\">UserKnownHostsFile <\/span><span class=\"o\">=<\/span> .ssh \/ dropbear \/ known_hosts root@192.168.56.101\r\n\r\nBusyBox v1.21.1 <span class=\"o\">(<\/span> Ubuntu 1: 1.21.0-1ubuntu1 <span class=\"o\">)<\/span> built-in shell <span class=\"o\">(<\/span> ash <span class=\"o\">)<\/span> \r\nEnter <span class=\"s1\">'help' <\/span> <span class=\"k\">for<\/span> a list of built-in commands.\r\n<\/pre>\n<\/div>\n<p>There we unlock our encrypted LVMs with the following commands, whereby the password &#8220;encryptiontest&#8221; has to be replaced by the own one chosen when creating the crypto-device.\u00a0For ensemble there are 2 possibilities:<\/p>\n<ul>\n<li><b>\/ Lib \/ cryptsetup \/ passfifo<\/b><\/li>\n<\/ul>\n<pre># echo -n \"encryptiontest\"&gt; \/ lib \/ cryptsetup \/ passfifo\r\n<\/pre>\n<ul>\n<li><b>\/ Lib \/ cryptsetup \/ askpass<\/b><\/li>\n<\/ul>\n<p>The variant without\u00a0<i>echo<\/i>\u00a0, and thus without the password appearing, looks like this:<\/p>\n<pre># \/ lib \/ cryptsetup \/ askpass \"passphrase:\"&gt; \/ lib \/ cryptsetup \/ passfifo \r\npassphrase:\r\n<\/pre>\n<p>For\u00a0<i>passphrase<\/i>\u00a0, the password must be entered.<\/p>\n<p>Then the devices are unlocked and the server continues booting.\u00a0Now runs on the server another, &#8220;conventional&#8221; SSH server (usually openssh), you can connect to this as usual.\u00a0If an openssh server is already running when Dropbear is installed, Dropbear quits automatically after the server has completely booted.\u00a0The command sequence can then be completed in one step:<\/p>\n<div class=\"mw-highlight mw-content-ltr\" dir=\"ltr\">\n<pre>ssh -i .ssh \/ dropbear \/ id_rsa_initram -o <span class=\"nv\">UserKnownHostsFile <\/span><span class=\"o\">=<\/span> .ssh \/ dropbear \/ known_hosts root@192.168.56.101 <span class=\"s2\">\"echo -ne \\\" encryptiontest \\ \"&gt; \/ lib \/ cryptsetup \/ passfifo\"<\/span>\r\n<\/pre>\n<\/div>\n<p>Using a custom Known Hosts file is recommended because Dropbear uses a different fingerprint than the openssh server.\u00a0If Dropbear and openssh do not use different &#8220;Known-Host&#8221; files, the following warning will appear:<\/p>\n<div class=\"mw-highlight mw-content-ltr\" dir=\"ltr\">\n<pre>ssh -i .ssh \/ dropbear \/ id_rsa_initram root@192.168.56.101 <span class=\"s2\">\"echo -ne \\\" encryptiontest \\ \"&gt; \/ lib \/ cryptsetup \/ passfifo\"<\/span>\r\n@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@\r\n@ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @\r\n@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @@@@@@@@@\r\nIT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!\r\n<\/pre>\n<\/div>\n<p>This warning has its origin in that now the standard file &#8220;~ \/ .ssh \/ known_hosts&#8221; is used, in which the fingerprint of the openssh server is.\u00a0It is therefore advisable for the Dropbear and openssh servers to use different &#8220;Known Host&#8221; files.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A complete encryption of your own system is an excellent way to ensure the confidentiality of your own data.\u00a0The current Ubuntu installer offers a guided installation to encrypt the entire system with &#8221;\u00a0encrypted LVMs\u00a0&#8220;.\u00a0For both the automated installation and the manual way, there are numerous detailed guides that explain the<\/p>\n","protected":false},"author":3,"featured_media":1255,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[3],"tags":[],"class_list":["post-1253","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tutorial-how-to"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/11\/dropbear-logo-walking_700_726_FFFFFF_c1.jpg?fit=700%2C726&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7ISfL-kd","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":850,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/how-to-work-your-mac-security\/","url_meta":{"origin":1253,"position":0},"title":"How to Work your Mac Security.","author":"Daniel Draga","date":"January 13, 2017","format":false,"excerpt":"Apple's Iphone Celebrated its 10th anniversary, so I've decided to articles, focusing on Apple's product. I hope you will enjoy these, readers. So, how exactly you work security on your Mac, here is how. Enable the OS X firewall The firewall in OS X is a network filter that\u00a0allows you\u2026","rel":"","context":"In &quot;IT News&quot;","block_context":{"text":"IT News","link":"https:\/\/www.virtono.com\/community\/category\/internet-and-technology-news\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/01\/mac-733178_960_720.jpg?fit=960%2C637&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/01\/mac-733178_960_720.jpg?fit=960%2C637&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/01\/mac-733178_960_720.jpg?fit=960%2C637&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/01\/mac-733178_960_720.jpg?fit=960%2C637&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":3507,"url":"https:\/\/www.virtono.com\/community\/tutorial-how-to\/how-to-install-lemp-stack-linux-nginx-mysql-and-php-on-ubuntu-22-04\/","url_meta":{"origin":1253,"position":1},"title":"How to install LEMP stack (Linux, Nginx, MySQL, and PHP) on Ubuntu 22.04","author":"George B.","date":"June 20, 2023","format":false,"excerpt":"Introduction The LEMP stack is a popular software stack for web development and hosting. It includes four major components: Linux, Nginx, MySQL, and PHP. Each component serves a specific purpose in powering dynamic websites and web applications. Linux is the operating system that serves as the LEMP stack's foundation. In\u2026","rel":"","context":"In &quot;Tutorials&quot;","block_context":{"text":"Tutorials","link":"https:\/\/www.virtono.com\/community\/category\/tutorial-how-to\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/06\/How-to-install-LEMP-stack-Linux-Nginx-MySQL-PHP-on-Ubuntu-22-04.png?fit=600%2C330&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/06\/How-to-install-LEMP-stack-Linux-Nginx-MySQL-PHP-on-Ubuntu-22-04.png?fit=600%2C330&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/06\/How-to-install-LEMP-stack-Linux-Nginx-MySQL-PHP-on-Ubuntu-22-04.png?fit=600%2C330&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":1246,"url":"https:\/\/www.virtono.com\/community\/tutorial-how-to\/set-up-password-authentication-with-active-directory-under-debian\/","url_meta":{"origin":1253,"position":2},"title":"Set up password authentication with Active Directory under Debian","author":"Daniel Draga","date":"November 6, 2017","format":false,"excerpt":"Centralized directory services such as OpenLDAP or Active Directory (AD) simplify\u00a0password management\u00a0for the administrator and the user.\u00a0In terms of Linux servers, the aspect of SSH\u00a0authentication\u00a0via AD\u00a0is especially\u00a0interesting.\u00a0From the point of view of IT security, this solution is also advantageous: Administrators no longer need to choose and manage different passwords for\u2026","rel":"","context":"In &quot;Tutorials&quot;","block_context":{"text":"Tutorials","link":"https:\/\/www.virtono.com\/community\/category\/tutorial-how-to\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/11\/password-wide.jpeg?fit=623%2C425&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/11\/password-wide.jpeg?fit=623%2C425&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/11\/password-wide.jpeg?fit=623%2C425&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":881,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/linux-security-privacy-on-linuxencryption\/","url_meta":{"origin":1253,"position":3},"title":"Linux Security: Privacy on Linux(Encryption)","author":"Daniel Draga","date":"January 26, 2017","format":false,"excerpt":"Security is an important but complex topic. So I'll be doing a series of articles, focusing on the principles and working of security of Linux. The challenge is that it\u2019s an ever-changing idea. Software we think of as secure can become insecure as hackers figure out how to break though\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/01\/linux-ransomware-wide.jpeg?fit=600%2C315&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/01\/linux-ransomware-wide.jpeg?fit=600%2C315&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/01\/linux-ransomware-wide.jpeg?fit=600%2C315&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":2141,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/disposable-linux-set-up-a-secure-system-for-guests\/","url_meta":{"origin":1253,"position":4},"title":"Disposable Linux: Set up a secure system for guests","author":"Shreyash Sharma","date":"December 14, 2020","format":false,"excerpt":"A live system is ideal if guests want to use the Internet or the youngsters do not yet have their own PC to look at holiday photos.\u00a0It does not allow system changes and is therefore also a candidate for secure banking. A live system, and even better a personally adapted\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2020\/12\/xenialpup.jpg?fit=800%2C450&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2020\/12\/xenialpup.jpg?fit=800%2C450&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2020\/12\/xenialpup.jpg?fit=800%2C450&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2020\/12\/xenialpup.jpg?fit=800%2C450&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":214,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/secure-socket-layer-ssl\/","url_meta":{"origin":1253,"position":5},"title":"Secure Socket Layer (SSL)","author":"Daniel Draga","date":"July 30, 2016","format":false,"excerpt":"SSL stands for Secure Socket Layer. Secure Socket Layer (SSL) technology allows web browsers and web servers to communicate over a secure connection Originally developed by Netscape, SSL has been universally accepted on the World Wide Web for authenticated and encrypted communication between clients and servers. Responsible for the emergence\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/2.jpg?fit=376%2C286&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/1253","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/comments?post=1253"}],"version-history":[{"count":1,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/1253\/revisions"}],"predecessor-version":[{"id":1254,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/1253\/revisions\/1254"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/media\/1255"}],"wp:attachment":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/media?parent=1253"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/categories?post=1253"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/tags?post=1253"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}