A Linux machine has a partition with sensitive data. The goal is to prevent one from booting up from a live usb and mounting the machine's hard drive and copying the data.
The partition is encrypted with cryptsetup.
But it has to get decrypted on boot. So a key file is created to hold the password. The key is added to LUKS:
sudo cryptsetup luksAddKey <encrypted_device> <path_to_key>
For the system to find it on boot, the key file is linked in the /etc/crypttab:
$ sudo nano /etc/crypttab
# Content of the crypttab file
cryptpart UUID=<partition_uuid> <path_to_key> luks
Question
Using a live USB, one can read the /etc/crypttab and find the path of the key file and break the lock.
What is the solution?