Skip to content

Contact sales

By filling out this form and clicking submit, you acknowledge our privacy policy.
  • Labs icon Lab
  • A Cloud Guru
Google Cloud Platform icon
Labs

Encrypting a Volume with NBDE

In this hands-on lab, we will use Network-Bound Disk Encryption (NBDE) to encrypt a volume on a host. The volume has already been created and encrypted with LUKS. Now we need to implement NBDE so the volume can be automatically decrypted at boot. *This course is not approved or sponsored by Red Hat.*

Google Cloud Platform icon
Labs

Path Info

Level
Clock icon Intermediate
Duration
Clock icon 30m
Published
Clock icon May 17, 2019

Contact sales

By filling out this form and clicking submit, you acknowledge our privacy policy.

Table of Contents

  1. Challenge

    Set Up Tang Server

    Check the Server 1 status first:

    1. In your Server 1 terminal window, check the status of the LUKS-encrypted volume (payroll) by running the following command:
      cryptsetup -v status payroll
      
    2. Determine where the volume is mounted by running the following command:
      df -h
      
    3. List the contents of the payroll directory by running the following command:
      ls /payroll
      

    Switch to your Server 2 terminal window:

    1. Install Tang by running the following command:
      sudo yum install -y tang
      
    2. Generate the keys for Tang by running the following command:
      /usr/libexec/tangd-keygen /var/db/tang
      
    3. Configure Tang to run at boot by running the following command:
      sudo systemctl enable tangd.socket --now
      
    4. Verify that two Tang keys were created by running the following command:
      sudo ls /var/db/tang
      
    5. Determine the IP address of Server 2 by running the following command:
      ip addr
      
  2. Challenge

    Encrypt `/dev/xvdg` Using NBDE

    1. First, install the necessary Clevis packages on Server 1 by running the following command:
      sudo yum install -y clevis clevis-luks clevis-dracut
      
    2. Next, encrypt the /dev/xvdg disk with the Tang key from Server 2 by running the following command:
      sudo clevis bind luks -d /dev/xvdg tang '{"url":"http://10.0.0.<SERVER2_IP>"}'
      
    3. Verify that the key was entered into the LUKS header of /dev/xvdg by running the following command:
      sudo luksmeta show -d /dev/xvdg
      
    4. Verify that slot 1 is active and there is a key value next to it.
    5. Lastly, run the sudo dracut -f command to force to retrieval of the Tang key at boot.

The Cloud Content team comprises subject matter experts hyper focused on services offered by the leading cloud vendors (AWS, GCP, and Azure), as well as cloud-related technologies such as Linux and DevOps. The team is thrilled to share their knowledge to help you build modern tech solutions from the ground up, secure and optimize your environments, and so much more!

What's a lab?

Hands-on Labs are real environments created by industry experts to help you learn. These environments help you gain knowledge and experience, practice without compromising your system, test without risk, destroy without fear, and let you learn from your mistakes. Hands-on Labs: practice your skills before delivering in the real world.

Provided environment for hands-on practice

We will provide the credentials and environment necessary for you to practice right within your browser.

Guided walkthrough

Follow along with the author’s guided walkthrough and build something new in your provided environment!

Did you know?

On average, you retain 75% more of your learning if you get time for practice.

Start learning by doing today

View Plans