mirror of
https://github.com/linuxboot/heads.git
synced 2025-02-08 12:00:11 +00:00
Changes: - As per master: when TOTP cannot unseal TOTP, user is prompted to either reset or regenerate TOTP - Now, when either is done and a previous TPM Disk Unlock Key was setuped, the user is guided into: - Regenerating checksums and signing them - Regenerating TPM disk Unlock Key and resealing TPM disk Unlock Key with passphrase into TPM - LUKS header being modified, user is asked to resign kexec.sig one last time prior of being able to default boot - When no previous Disk Unlock Key was setuped, the user is guided into: - The above, plus - Detection of LUKS containers,suggesting only relevant partitions - Addition of TRACE and DEBUG statements to troubleshoot actual vs expected behavior while coding - Were missing under TPM Disk Unlock Key setup codepaths - Fixes for #645 : We now check if only one slots exists and we do not use it if its slot1. - Also shows in DEBUG traces now Unrelated staged changes - ash_functions: warn and die now contains proper spacing and eye attaction - all warn and die calls modified if containing warnings and too much punctuation - unify usage of term TPM Disk Unlock Key and Disk Recovery Key
89 lines
2.3 KiB
Bash
Executable File
89 lines
2.3 KiB
Bash
Executable File
#!/bin/bash
|
|
# Generate a TPM key used to unlock LUKS disks
|
|
|
|
. /etc/functions
|
|
|
|
TRACE "kexec-save-key: start"
|
|
set -e -o pipefail
|
|
. /etc/functions
|
|
|
|
lvm_volume_group=""
|
|
skip_sign="n"
|
|
while getopts "sp:d:l:" arg; do
|
|
case $arg in
|
|
s) skip_sign="y" ;;
|
|
p) paramsdir="$OPTARG" ;;
|
|
d) paramsdev="$OPTARG" ;;
|
|
l) lvm_volume_group="$OPTARG" ;;
|
|
esac
|
|
done
|
|
|
|
DEBUG "kexec-save-key prior of parsing: paramsdir: $paramsdir, paramsdev: $paramsdev, lvm_volume_group: $lvm_volume_group"
|
|
|
|
shift `expr $OPTIND - 1`
|
|
key_devices="$@"
|
|
|
|
DEBUG "kexec-save-key: key_devices: $key_devices"
|
|
|
|
if [ -z "$paramsdir" ]; then
|
|
die "Usage: $0 [-s] -p /boot [-l qubes_dom0] [/dev/sda2 /dev/sda5 ...] "
|
|
fi
|
|
|
|
if [ -z "$paramsdev" ]; then
|
|
paramsdev="$paramsdir"
|
|
DEBUG "kexec-save-key: paramsdev modified to : $paramsdev"
|
|
fi
|
|
|
|
paramsdev="${paramsdev%%/}"
|
|
paramsdir="${paramsdir%%/}"
|
|
|
|
DEBUG "kexec-save-key prior of last override: paramsdir: $paramsdir, paramsdev: $paramsdev, lvm_volume_group: $lvm_volume_group"
|
|
|
|
if [ -n "$lvm_volume_group" ]; then
|
|
lvm vgchange -a y $lvm_volume_group \
|
|
|| die "Failed to activate the LVM group"
|
|
|
|
for dev in /dev/$lvm_volume_group/*; do
|
|
key_devices="$key_devices $dev"
|
|
done
|
|
fi
|
|
|
|
if [ -z "$key_devices" ]; then
|
|
die "No devices specified for TPM key insertion"
|
|
fi
|
|
|
|
# try to switch to rw mode
|
|
mount -o rw,remount $paramsdev
|
|
|
|
rm -f $paramsdir/kexec_key_lvm.txt || true
|
|
if [ -n "$lvm_volume_group" ]; then
|
|
DEBUG "kexec-save-key saving under $paramsdir/kexec_key_lvm.txt : lvm_volume_group: $lvm_volume_group"
|
|
echo "$lvm_volume_group" > $paramsdir/kexec_key_lvm.txt \
|
|
|| die "Failed to write lvm group to key config "
|
|
fi
|
|
|
|
rm -f $paramsdir/kexec_key_devices.txt || true
|
|
for dev in $key_devices; do
|
|
DEBUG "gettinmg uuid for $dev"
|
|
uuid=`cryptsetup luksUUID "$dev" 2>/dev/null` \
|
|
|| die "Failed to get UUID for device $dev"
|
|
DEBUG "saving under $paramsdir/kexec_key_devices.txt : dev: $dev, uuid: $uuid"
|
|
echo "$dev $uuid" >> $paramsdir/kexec_key_devices.txt \
|
|
|| die "Failed to add $dev:$uuid to key devices config"
|
|
done
|
|
|
|
kexec-seal-key $paramsdir \
|
|
|| die "Failed to save and generate key in TPM"
|
|
|
|
if [ "$skip_sign" != "y" ]; then
|
|
extparam=
|
|
if [ "$CONFIG_IGNORE_ROLLBACK" != "y" ]; then
|
|
extparam=-r
|
|
fi
|
|
# sign and auto-roll config counter
|
|
kexec-sign-config -p $paramsdir $extparam \
|
|
|| die "Failed to sign updated config"
|
|
fi
|
|
|
|
# switch back to ro mode
|
|
mount -o ro,remount $paramsdev |