Encrypting In Yocto With fscryptctl

I admit, I made a tiny mistake. In the file system encryption blog text, I talked about fscrypt. Both the kernel feature fscrypt and the userspace tool with the same name. However, since I’m mostly focusing on the embedded side of things in this blog, a better userspace tool to recommend for a small Linux system would most likely be fscryptctl. It is basically a simplified version of the fscrypt tool that can manage encryption keys, set up an encryption policy for a directory, and then lock & unlock the encrypted directory. To make up for my mistake, I’ll quickly go through how to add it to the Yocto build and show how to use it.

Comic by Mr. Lovenstein.

Yocto

Like fscrypt, also fscryptctl is available in meta-security. If you read my file system encryption blog text in full, you may remember that I complained about a broken fscrypt recipe. Upon closer inspection, it seems that there’s been some weird fusion between fscrypt and fscryptctl recipes that has caused the fscrypt recipe to get (at least) its SRCREV and version from fscryptctl recipe.

Anyways, to add the fscryptctl to your image, all you need to do is add it to IMAGE_INSTALL after you’ve added meta-security to your build:

IMAGE_INSTALL:append = " fscryptctl"

In addition to this, you’ll need a partition you can encrypt. If you’re using a .wic file to define the image, you can add something like the following line to it:

part /crypted --ondisk mmcblk0 --fstype=ext4 --mkfs-extraopts="-O encrypt" --label crypted --align 4096 --size 100

This is meant for Raspberry Pi image, other systems may require some tweaking. The important part is the --mkfs-extraopts option.

The size difference between the two fscrypt userspace tools is quite significant. fscrypt binary is 5.6MB (and an additional 5MB for the PAM library if you’re using that), while fscryptctl is a mere 67KB! Therefore, if you intend to do simple automated locking and unlocking of encrypted directories on a resource-constrained device, fscryptctl should be the go-to choice.

Example of fscryptctl Use

These instructions are quite similar to the key file protector instructions presented in the fscrypt example in the file system encryption blog text (this is the last time I’ll mention it, I promise). The fscryptctl commands here originate from the fscryptctl README. These commands are meant to be run on a live system after the device has been flashed with the built image that contains fscryptctl and a partition that is suitable for encryption.

First, we create the mount point and mount the example partition:

mkdir /crypted
# Your device type or number may be different
mount /dev/mmcblk0p3 /crypted

Then we’ll create a key file and the directory that should be encrypted:

# Note: This key should be stored securely!
# Leaving it to root with default access is not a good idea
dd if=/dev/urandom of=/secret.key bs=1 count=64
mkdir /crypted/test_dir

After that, we can add the key to the mount point and a policy to the directory:

# The first command outputs the key ID that is required when setting policy
fscryptctl add_key /crypted < /secret.key
fscryptctl set_policy <KEY_ID> /crypted/test_dir

We can use the key_status and get_policy commands to get some information about the encryption status. For example, with the key ID 5d08dbef6c1b0e80ba5f535343a9e175 following prints might be present:

root@raspberrypi4-64:~# fscryptctl key_status 5d08dbef6c1b0e80ba5f535343a9e175 /crypted
Present (user_count=1, added_by_self)

root@raspberrypi4-64:~# fscryptctl get_policy /crypted/test_dir
Encryption policy for /crypted/test_dir:
        Policy version: 2
        Master key identifier: 5d08dbef6c1b0e80ba5f535343a9e175
        Contents encryption mode: AES-256-XTS
        Filenames encryption mode: AES-256-CTS
        Flags: PAD_32
root@raspberrypi4-64:~#

Now it is possible to create files in the directory, for example, by using a simple echo command. Then, to lock the directory, we can remove the key from the mount point:

echo "Super secret stuff" > /crypted/test_dir/test_file
fscryptctl remove_key <KEY_ID> /crypted

This should encrypt the directory, and the file names should now be garbled. To unlock the directory and regain access to the sweet, sweet example files, add_key command can be run again:

fscryptctl add_key /crypted < /secret.key

Conclusion

I think I have now corrected my mistake. Thanks for reading, and like always, I hope you found this useful. If you want to learn more about fscrypt, I recommend reading my blog text about it (okay, this was the last time I’ll mention it).

Share