How to enable only disk password (and no user password) on boot to unlock disk?

I am on 10.14.1, clean install. I chose APFS Encrypted and gave a long passphrase. Later on in the install setup, when I had to create a user account, I was forced to also enter the disk passphrase. From then on, whenever I reboot, the only way to unlock the disk is my user password instead of the disk passphrase. This seriously hampers security, as my disk passphrase is significantly stronger than my user password.


I don't want that the disk can be unlocked by a user password, I want that the disk passphrase must be entered on a reboot or cold start. Any idea how to achieve that?


(As a workaround, maybe I have to create a system user that does not have a login shell and give it the same passphrase as the disk? Ugly. Or use HFS+ and CoreStorage? I was on El Capitan previously, where I could simply remove all users using fdesetup from being able to unlock the disk. Now on 10.14.1 and APFS I always need at least one user in the fdesetup list. FileVault is forcing me the bind the disk passphrase to a user password.)


Thanks for any help and/or clarification.

MacBook Pro with Retina display, macOS Mojave (10.14.1)

Posted on Dec 2, 2018 2:46 AM

Reply
Question marked as Top-ranking reply

Posted on Dec 21, 2018 1:33 AM

Hi All


Thanks again for all your replies.


After trying different ways of installation and configurations and playing around with FileVault and fdesetup for a while with 10.14.2, I have come to the conclusion that it is not possible anymore to not bind the unlocking of the disk to a user. So I have created a sharing only user (which means shell /usr/bin/false/, home /dev/null) called _diskpassword with the same password as the disk password, set the IsHidden flag so that it does not show up in preferences (just for convenience), and removed all users from the fdesetup list except _diskpassword. So this is a user with the only purpose to unlock the disk. This is a workaround, not a solution. I plan to file a bug report as I am not sure this is intended behavior.

24 replies
Question marked as Top-ranking reply

Dec 21, 2018 1:33 AM in response to lotlorien

Hi All


Thanks again for all your replies.


After trying different ways of installation and configurations and playing around with FileVault and fdesetup for a while with 10.14.2, I have come to the conclusion that it is not possible anymore to not bind the unlocking of the disk to a user. So I have created a sharing only user (which means shell /usr/bin/false/, home /dev/null) called _diskpassword with the same password as the disk password, set the IsHidden flag so that it does not show up in preferences (just for convenience), and removed all users from the fdesetup list except _diskpassword. So this is a user with the only purpose to unlock the disk. This is a workaround, not a solution. I plan to file a bug report as I am not sure this is intended behavior.

Dec 2, 2018 6:12 AM in response to lotlorien

FileVault was enabled by default.

Did you uncheck the box that asked if you wanted to enable FileVault, or did it just go ahead and enable it?

Is there a way to disable FileVault without decryption?

No. You have to then encrypt the disk without using FileVault. I don't know if that is possible after installing the OS. It may be possible using diskutil in Terminal in Internet Recovery.


I think etresoft has done some digging into non-FileVault encryption and may be able to offer a suggestion if he pops in.

Dec 2, 2018 6:33 AM in response to lotlorien

It sounds like everything is working as designed. The only thing I would have suggested is hacking around in fdsetup, which you have already done. I’ve never tried to remove a user.


I suggest setting up an administrator user with a very strong password, perhaps the same as the disk password. Then remove your normal user with fdsetup. That should give you the security you desire.


However, I do think you are going overboard on security. FileVault with a normal password is secure enough for anyone. I don’t know if it would meet government security standards, but then you probably shouldn’t be using a Mac for that kind of work.

Dec 2, 2018 1:11 PM in response to lotlorien

I confirm that I have tried to disable FileVault in the Security settings,

That's not what I am asking.

You started this by encrypting the drive, then installing the OS.

After installing, the Setup Assistant runs asking for various config options. It asked if you wanted FileVault. Did you leave that box checked, or did you uncheck it before proceeding?


If you left it checked, then I would suggest you start over and see what happens if you install onto an encrypted drive, then do not enable FileVault in the Setup Assistant.

Or, did you uncheck it and it still ran through the FileVault setup?

Jan 23, 2019 11:50 AM in response to nephilacapital

What's the link to the bug report? I agree this is a (horrible) bug. Giving away usernames prior to decryption of FDE removes plausible deniability.

Apple bug reports are private. You would only have access to the RDAR number, which is useless. In cases like this, Apple uses bug reports as a was to gauge interest in a particular topic. Anyone who this this is a good idea should file their own bug report. Then, the number of bug reports closed as duplicate would be a measure of user interest. If both of you filed, then that would be 1 bug report and one duplicate. It is always possible for someone at Apple to take an interest and implement the feature regardless, but highly unlikely.


Apple really doesn’t care about things like plausible deniability. Apple offers encryption of all data and makes it easy to use. Those are Apple’s priorities. In recent machines, all data is encrypted by default. That could be what drove this change or it might be that this feature is now only possible one new machines.

Dec 2, 2018 5:59 AM in response to Barney-15E

FileVault was enabled by default. I have read in other threads that encryption and FileVault are separate, and that it is FileVault that binds user passwords to the disk passphrase. So I have tried to disable FileVault, hoping to keep the encryption but not the password binding. However by disabling FileVault the disk gets decrypted an no password whatsoever is required anymore to startup. Is there a way to disable FileVault without decryption?

Dec 2, 2018 7:01 AM in response to etresoft

Thanks for all the replies. So my questions:


  1. It is not possible to have encryption with FileVault turned off (although, as I have read, FileVault and encryption are separate things)? What about first installing the OS without encryption, then boot into recovery and encrypt? Might that trick around enabling FileVault?
  2. Given that FileVault is enabled, it is not possible any more to remove all users from FileVault with fdesetup, forcing the system to ask for the disk passphrase on startup? (I know it was possibly on El Capitan, as I have done it there, it seems to have been still possible in High Sierra according to some threads.)
  3. On top of all that, if I do diskutil apfs list, it says that there is no FileVault on Preboot (that's ok), no FileVault on Recovery (that's ok), and no FileVault (and therefore no encryption) on /private/var/vm - which is not ok, as swap files and hibernation files are stored there, as far as I know. So on Mojave hibernation files are no longer encrypted?
  4. I haven't tried HFS+ and CoreStorage on Mojave yet, but it may allow to remove all users from FileVault, and may also encrypt /private/var/vm. Do you have any experience with that?


Thanks a lot again.

Dec 2, 2018 9:14 AM in response to lotlorien

1. I don’t know if it is possible to encrypt the boot volume without FileVault. This used to be possible. I used to format all of my hard drives as encrypted first - and then install the operating system - to avoid the hours-long encryption process. This did not work the most recent time I attempted that. I can’t tell you if this is a change in Mojave, APFS, or something else. I simply don’t reformat disks that often and I don’t see the need to try it anytime soon.

2. Again, I don’t know. I don’t see the need to try. I’ve already suggested a workaround. You are welcome to keep hacking on it if you want. My data simply isn’t valuable enough to worry about it. There are very few, if any, people in the world who could hack into my system with a default FileVault configuration. If I sincerely felt that such people did exist and that they were after me, I would endeavour to find out why and stop doing whatever it was that made those people interested in me.

3. Swapfiles have been encrypted for years. You can verify this with "sysctl vm.swapusage"

4. It is not possible to increase your level of security by hacking around with untested system configurations. The only logical result of that behaviour is having less security. That is assuming that you would succeed.


Again, I have to ask, what’s the big secret? This is a self-invalidating question. The fact that you are asking about this on the internet guarantees that you don’t need it. The default FileVault settings will give you the highest level of security possible. Any hacks, including the alternate user hack I mentioned, is only going to reduce your effective level of security by increasing the complexity.

This thread has been closed by the system or the community team. You may vote for any posts you find helpful, or search the Community for additional answers.

How to enable only disk password (and no user password) on boot to unlock disk?

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.