Linux Encryption Prerequisites
The following prerequisites apply to all types of Linux encryption, including data drive encryption and root, swap, or system device encryption in online or offline mode. If you want to enable Online Encryption for the VM, additional prerequisites are described in Linux Online Encryption Prerequisites and Considerations.
- Make sure the Linux version you are using is supported. For details, see Supported Platforms.
- If you intend to use this VM with a BoundaryControl-enabled Cloud VM Set, you must install a VMware-supported version of VMware Tools on the VM. For all other VMs, installing VMware Tools is recommended but not required. In all cases, we recommend that you keep the version of VMware Tools up to date.
-
If an entry for the Linux device you intend to encrypt already exists in the Filesystem Table (
/etc/fstab
), you need to remove that entry until the encryption process is complete and the Entrust-created clear text path to the device is available. If you reboot the device after encryption with the/etc/fstab
entry still pointing to the original device path, the system may hang because the encrypted version of the device will fail the filesystem check. For details, see Automatically Mounting Linux Filesystems. -
We recommend that you partition the disk before it is encrypted. When DataControl encrypts a disk it writes a private region at the start of the disk that contains information that allows DataControl to identify which keys are associated with which partition.
For example, let's say you have 2 non-partitioned disks,
/dev/sdb
and/dev/sdc
, where/dev/sdc
is encrypted by DataControl. If you remove/dev/sdb
and reboot the VM,/dev/sdc
will be renamed/dev/sdb
and the association between the keys and the disk will become invalid. At that point access to the encrypted data will be lost.Now let's say you have the same set up as before but you partition disk
/dev/sdc
and then you encrypt the/dev/sdc1
partition. DataControl adds a UUID (Universally Unique Identifier) in the private area at the start of the/dev/sdc
disk that associates the/dev/sdc1
partition with its encryption keys. When you remove/dev/sdb
and reboot the VM, the encrypted partition/dev/sdc1
will be renamed/dev/sdb1
, but the UUID does not change. In this case, DataControl can use the UUID to match the encryption keys to the partition and the data remains accessible even after the partition name has changed.Important: If you want to resize a partition after you have encrypted it with DataControl, there are additional steps you need to take. For more information, see Disk Size Management in Linux.
-
Make sure the Linux VM has access to the following Linux packages and their dependencies:
Encryption Type
Required Packages
All Linux encryption (data drives and system devices) device-mapper
OpenSSL
Python 2.7
orPython 3
Linux root, swap, or system device encryption
Note: If the server to be encrypted has external internet access, any missing package will be installed when you encrypt the root, swap, or system device. If the server is not connected to the internet, these packages must be fully installed before root/swap encryption begins or the encryption request will fail.
busybox
cryptsetup
orcryptsetup-luks
dracut
(RHEL and CentOS) orinitramfs-tools
(Ubuntu)dracut-network
dropbear
EPEL-release
hashalot
OpenSUSE
Linux online encryption (data drives and system devices) dkms
gcc
kernel-devel (RHEL and CentOS)
kernel-headers (RHEL and CentOS)
linux-headers-<kernel-version> (Ubuntu)
-
Beginning with Version 5.1, we now support disk encryption for disks formatted with btrfs. If the root file system or system mount (for example, /var, /usr, /etc) is btrfs and there are multiple disks for storage, only the first disk can be encrypted. The first disk will have an entry in /etc/fstab.
Important: We recommend that you create btrfs on a MBR or GPT partition, and not on a RAW device. RAW devices are vulnerable to device name change, which will render the encrypted device unusable.
- For a given client, you can have either online or offline encryption. You cannot mix them on the same client.