It seems like decryption actually happens in the initramfs. I initially thought it happened in grub due to the need for a cryptdevice
boot parameter but looking into it more, it looks like the cryptroot initramfs hook does it.
That hook seems to use the cryptsetup_message
function in /lib/cryptsetup/functions for messages and the source code of that function is:
cryptsetup_message() {
local IFS=' '
if [ "${0#/scripts/}" != "$0" ] && [ -x /bin/plymouth ] && plymouth --ping; then
plymouth message --text="cryptsetup: $*"
elif [ ${#*} -lt 70 ]; then
echo "cryptsetup: $*" >&2
else
# use busybox's fold(1) and sed(1) at initramfs stage
echo "cryptsetup: $*" | fold -s | sed '1! s/^/ /' >&2
fi
return 0
}
Also, files such as /lib/cryptsetup/functions need to be protected by dangerous-files too. Otherwise an attacker can just edit something like cryptsetup_message()
to run rm /etc/apparmor.d/init-systemd
to bypass the policy.
Edit:
/lib/cryptsetup/functions is actually already read-only due to apparmor-profile-everything making all libraries/binaries read-only. We should still look around for other things like this that are not protected in the policy though.