Conversation
added 3 commits
December 12, 2019 15:34
This hasn't been used in a very long time and is just aging code
Contributor
Author
|
superceded by #148 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
The encryption is accomplished using
cryptsetup, but users do not enter passphrases. Instead, Clevis is used to store the passphrase in the LUKS header with a policy that decrypts the secret using the TPM.During install time multiple different passphrases are used.
passwordpassphrase is used.Ideally this should also be bound to:
Limitation with this is that if FW update is performed BootXXXX variable is created and BootOrder changed. Could break things. Might need to add a post script that fwupd can run to loosen policy for one boot and then on next boot strengthen it again.
Also if a user changes BIOS settings they would break being able to boot again.
Similar to PCR1 this would need to be updated every time that a kernel upgrade occurs to loosen policy for a boot and then strengthen it again.
This is dependent upon the following:
clevis-tpm2andtpm2-toolspackages available at installation time in recovery media