Nuke My LUKS is a network panic button designed to overwrite with random data the LUKS header of computers in a LAN.
Python Shell
Switch branches/tags
Nothing to show
Clone or download
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Permalink
Failed to load latest commit information.
LICENSE
README.md
client.py
generateconfig.py
nukemyluks.sh
server.py

README.md

Nuke My LUKS

A simple network-based panic button designed to overwrite the LUKS header with random data and shutdown the computer in case of an emergency situation.

This tool can be useful for activists, human right workers and others that face an adversary, such as law enforcement, that can coerce the subject to disclose the encryption passwords for the computer's hard drives.

IMPORTANT: This will make impossible to recover any data stored in the disk even if the password is known. It is recommended to store your backups, as well as your original LUKS header, encrypted and in a safe location. Use this code with precaution.

How it works

Nuke My LUKS is divided in four different small pieces of code:

  • client.py
  • server.py
  • generateconfig.py
  • nukemyluks.sh

In a nutshell, it works by sending a UDP broadcast message to port 1337 with a tag appended to a user-defined password. In case the password matches, the script for destroying the LUKS header is executed.

NOTE: Configure your firewall rules to allow UDP broadcast messages from your trusted computer running the client of Nuke My LUKS.

PS: Notice that it is possible to repurpose this code to use any shell script and perform other actions, but the original design is to destroy the LUKS header of the computer.

Limitations

PLEASE READ: As the script used to destroy the LUKS header with random data reads off /dev/urandom and writes its content into the begining of a LUKS-capable device, such as /dev/sda1, there is no guarantee this action will work as intended in SSD drives, given the way these drives behave during write operations.

For more information about this topic see Data remanence on Wikipedia.

dm-crypt/LUKS version > 1.6.4 implements the option luksErase. However, in order to ensure it will also have a similar effect in older installations we're using the old fashioned dd instead.

Usage

Generate a config file using generateconfig.py:

julio@trouble:~/programming/Python/security/nukemyluks$ ./generateconfig.py mysupersecretpassword
[+] Configuration file created successfully.

Copy the generated config.ini file, server.py and the LUKS header destruction script to the computers you want to have this code running:

julio@trouble:~/programming/Python/security/nukemyluks$ cat config.ini
[config]
password_hash = $2a$13$fFEVaVHalvesYhVMUJTrUOjGPdUUvxzLIJUIqU8.jc3PJFbbQ.vSe

Make sure the script nukemyluks.sh can run with root privileges. This is necessary to call dd on a device.

Now execute server.py and leave it running on the background.

In case of panic, pass your password to client.py:

julio@trouble:~/programming/Python/security/nukemyluks$ ./client.py mysupersecretpassword

Author

Contributors

If you think you can improve this code, feel free to send a pull request.

Known issues

None yet.

Credits

This code was inspired in the idea of panicbcast by Niklas Femerstrand.