FileVault 2 with UserData /Users on a separate parttiion

nessts
Valued Contributor II

Has anybody been using Filevault 2 on a system with multiple partitions and one of those being mounted at /Users?
if so are you actually encrypting /Users and getting it to automount?
I thought at one point FV2 was going to be Whole Disk Encryption, but it is not, it only encrypts your root/boot volume and leaves your data unencrypted on the other partition. So far in limited testing, when i encrypt the /Users partition it no longer mounts with the fstab entry, which is likely due to not having the passphrase to decrypt the disk.
anyhow if anybody has figured this out I would love to hear it.

1 ACCEPTED SOLUTION

nessts
Valued Contributor II

Nice Crhis, thanks.

View solution in original post

13 REPLIES 13

rtrouton
Release Candidate Programs Tester

FileVault 2 encrypts on a per-partition basis. If you've got multiple encrypted partitions, with another partition holding your account home folders, you'll need to unlock that partition before it mounts.

The usual way OS X handles automated unlocks is by saving the unlock password in the user's login keychain. Since that keychain would be on the locked and inaccessible partition, that won't work. You would need to find some other means of unlocking that partition.

One thing that's important to keep in mind is that FileVault 2 was designed for use with laptops, where the home folders lived in /Users on the laptop's boot drive. It was not designed with multi-partition setups in mind.

nessts
Valued Contributor II

yeah i have multiple partitions so i can participate in see programs and easily get back to a useful OS and not have to copy my data every time I rebuild.

arielper
New Contributor II

If I may ask, what was the reasoning behind putting Users on a separate partition? Also, did you name that partition "Users"? I've setup Mac Pro's with mixed HDD and SDDs. I had named a drive "Users" to store home folders and I had several problems with it not mounting properly, or I would end up with 2 mounts, "Users" and a "Users 1" shadow volume. This was without encryption. Those problems went away when I renamed the volume to something else. I don't know if this affects you, but it's something to be careful about.

nessts
Valued Contributor II

@arielper My methodology is based around the fact that if i can restore an OS to a good known working state in about 10 minutes what would be the point in trying to figure out why something stopped working properly. And when it comes time to upgrade an OS for the users i can pre-stage the OS on the other partition and then reboot to the new OS when we are ready to change. And as I said personally i belong to the Seed program so I am always running the latest and newest updates or OS, and sometimes they are not all that fun to run so i fall back to a stable OS.
we name the partition UserData and we mount at /Users has been working for 4 years.
Now that many of our users are going to laptops we need to start encrypting, but turning on FV only encrypts the OS partition, other whole disk encryption tools will encrypt all 3 partitions and they mount properly, but you cannot change the boot device so there is not much point in having an alternate boot device. Seems that this is not a simple thing to do.

Josh_S
Contributor III

You could probably script a startup item/launch daemon that consults an encrypted keychain stored on the boot partition that automatically decrypts and mounts your Users partition upon booting into the encrypted boot partition. By making this keychain, and the script, readable/executable by root only and storing them on the encrypted boot partition, you'll minimize your security risk. You'll likely need to work with the "security" and "diskutil cs" commands.

nessts
Valued Contributor II

@Josh_S that is likely what I will do, just add the item to the system keychain, and write a launchdeamon and script to mount, but i was really hoping that fstab had an undocumented mount option i could use and not have to get that deep. Thanks for verifying that as an idea though.

rtrouton
Release Candidate Programs Tester

I'm not in the Seed program, but this sounds like a testing problem best solved with a virtual machine setup.

nessts
Valued Contributor II

i used to test not on my primary machine but never found problems.
Using what i have to live off of points out problems right away.
i have 6 machines on my desk, and rebuild most of them in week except the server.

Chris
Valued Contributor

nessts
Valued Contributor II

Nice Crhis, thanks.

nessts
Valued Contributor II

or Chris, need to do some finger yoga before starting to type for the day I see

axnessj
New Contributor

Has anyone tried this? I like the look of it, but I don't see how the password gets updated. Especially AD users whose password gets changed using an external process. Just hoping I don't have to go back to PGP.

Chris
Valued Contributor

I don't think that would be a problem as the password is stored in the System Keychain