Veracrypt Self-Destruct Trigger #60
Labels
enhancement
New feature or request
good first issue
Good for newcomers
help wanted
Extra attention is needed
This ticket will track the effort to implement a self-destruct trigger for veracrypt.
Work was started on this by @jneplokh here:
But I believe they got stuck on privilege escalation in Windows. When developing the soft-shutdown trigger on MacOS, I also encountered issues running as a non-root user, so I wrote a simple wrapper to launch a child process as root. I believe this would need to be ported to Windows for this task:
Deliverables would be:
spawn_root_child()
- A python function that, when executed as a non-root user, asks the user (via the official OS UAC prompt) for their password and then launches another python script (root_child_win.py
) as child process with root privileges.root_child_win.sh
A python script that, when executed as root by wrapperspawn_root_child()
, it loops and waits for a command sent over stdin. If sent averacrypt-self-destruct
command, then it calls a functiontrigger_veracrypt-self-destruct()
trigger_veracrypt-self-destruct()
that finds all veracrypt volumes, securely wipes the veracrypt header and footer, and initiates a hard shutdown[1] above would be similar to
spawn_root_child()
insrc/packages/buskill/__init__.py
buskill-app/src/packages/buskill/__init__.py
Lines 567 to 751 in 52d699a
[2] would be similar to https://github.com/BusKill/buskill-app/blob/master/src/packages/buskill/root_child_mac.py
[3] above would be similar to https://github.com/BusKill/buskill-linux/blob/master/triggers/buskill-selfdestruct.sh
[4] above would be similar to https://www.buskill.in/luks-self-destruct/
The text was updated successfully, but these errors were encountered: