Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Installing Qubes on Heads is hard #27

Closed
osresearch opened this issue Sep 16, 2016 · 2 comments
Closed

Installing Qubes on Heads is hard #27

osresearch opened this issue Sep 16, 2016 · 2 comments
Milestone

Comments

@osresearch
Copy link
Collaborator

There should be some shell scripts in the Heads ROM initrd to make it easier.

@osresearch
Copy link
Collaborator Author

This is getting easier -- the new seal-key script handles almost all of the key management: f99944a

osresearch added a commit that referenced this issue Apr 12, 2017
This adds support for seamless booting of Qubes with a TPM disk key,
as well as signing of qubes files in /boot with a Yubikey.

The signed hashes also includes a TPM counter, which is incremented
when new hashes are signed.  This prevents rollback attacks against
the /boot filesystem.

The TPMTOTP value is presented to the user at the time of entering
the disk encryption keys.  Hitting enter will generate a new code.

The LUKS headers are included in the TPM sealing of the disk
encryption keys.
@osresearch
Copy link
Collaborator Author

There are many scripts to make this easier and I've started documenting how to use them. There are also new scripts to help when an update is performed to sign the new files in /boot and increment the TPM counter (issue #155) to prevent rollback attacks.

tlaurion pushed a commit to tlaurion/heads that referenced this issue May 3, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant