mirror of
https://github.com/linuxboot/heads.git
synced 2024-12-19 04:57:55 +00:00
6923fb5e20
-coreboot support of TPM v2.0 (shared config for TPM2 support across all 4 previous variations) -swtpm set to be launched under TPM v2.0 mode under board config -Documentation file under each board.md softlinks to qemu-coreboot-fbwhiptail-tpm1.md (which has been generalized) This is skeleton for TPM v2 integration under Heads ------------- WiP TODO: - libcurl cannot be built as a tpm2-tools dependency as of now not sure why. curl currently needs to be added in board config to be built - Note: tpm-reset (master and here) needs some review, no handle of no tpm use case. Caller is responsible to not call it otherwise does nothing - init tries to bind fd and fails currently - Note: Check if whiptail is different of fbwhiptail in clearing screen. As of now every clear seems to be removed, still whiptail clears previous console output - When no OS' /boot can be mounted, do not try to TPM reset (will fail) - seal-hotpkey is not working properly - setting disk unlock key asks for TPM ownership passphrase (sealing in NV requires ownership, but text is misleading user as if reowning TPM) - We should cache input, feed tpm behind the scene and wipe passphrase and state clearly that this is TPM disk unlock kye passphrase. - primary key from TPM2 is invalid most of the time from kexec-select-boot and verifying global hashes but is setuped correctly at disk unlock key setup - would be nice to take advantage of bash function tracing to understand where we are for debugging purposes, code takes ash in consideration only - tpmr says it implements nv calls but actually doesn't. Removing those falsely wrapped functions would help. - Implementing them would be better - REVIEW TODOS IN CODE - READD CIRCLECI CONFIG Current state: - TPM unseal works without disk unlock key and generates TOTP properly (was missing die condition at unseal to not produce always good TOTP even if invalid) - TPM disk encryption key fails. Hypothesis is that sealing with USB drivers loaded and measures in inconsistent with sealed with/without. - TPM disk unsealing happens without USB modules being loaded in non-HOTP setup. This fails. - Current tests are with fbwhiptail (no clear called so having traces on command line of what happens) - Testing with HOTP implementation for sealing/unsealing since that forces USB module loads on each boot to remove this from failing possibilities
75 lines
1.7 KiB
Bash
Executable File
75 lines
1.7 KiB
Bash
Executable File
#!/bin/sh
|
|
# Generate a TPM key used to unlock LUKS disks
|
|
set -e -o pipefail
|
|
. /etc/functions
|
|
|
|
lvm_volume_group=""
|
|
skip_sign="n"
|
|
while getopts "sp:d:l:" arg; do
|
|
case $arg in
|
|
s) skip_sign="y" ;;
|
|
p) paramsdir="$OPTARG" ;;
|
|
d) paramsdev="$OPTARG" ;;
|
|
l) lvm_volume_group="$OPTARG" ;;
|
|
esac
|
|
done
|
|
shift `expr $OPTIND - 1`
|
|
key_devices="$@"
|
|
|
|
if [ -z "$paramsdir" ]; then
|
|
die "Usage: $0 [-s] -p /boot [-l qubes_dom0] [/dev/sda2 /dev/sda5 ...] "
|
|
fi
|
|
|
|
if [ -z "$paramsdev" ]; then
|
|
paramsdev="$paramsdir"
|
|
fi
|
|
|
|
paramsdev="${paramsdev%%/}"
|
|
paramsdir="${paramsdir%%/}"
|
|
|
|
if [ -n "$lvm_volume_group" ]; then
|
|
lvm vgchange -a y $lvm_volume_group \
|
|
|| die "Failed to activate the LVM group"
|
|
|
|
for dev in /dev/$lvm_volume_group/*; do
|
|
key_devices="$key_devices $dev"
|
|
done
|
|
fi
|
|
|
|
if [ -z "$key_devices" ]; then
|
|
die "No devices specified for TPM key insertion"
|
|
fi
|
|
|
|
# try to switch to rw mode
|
|
mount -o rw,remount $paramsdev
|
|
|
|
rm -f $paramsdir/kexec_key_lvm.txt || true
|
|
if [ -n "$lvm_volume_group" ]; then
|
|
echo "$lvm_volume_group" > $paramsdir/kexec_key_lvm.txt \
|
|
|| die "Failed to write lvm group to key config "
|
|
fi
|
|
|
|
rm -f $paramsdir/kexec_key_devices.txt || true
|
|
for dev in $key_devices; do
|
|
uuid=`cryptsetup luksUUID "$dev" 2>/dev/null` \
|
|
|| die "Failed to get UUID for device $dev"
|
|
echo "$dev $uuid" >> $paramsdir/kexec_key_devices.txt \
|
|
|| die "Failed to add $dev:$uuid to key devices config"
|
|
done
|
|
|
|
kexec-seal-key $paramsdir \
|
|
|| die "Failed to save and generate key in TPM"
|
|
|
|
if [ "$skip_sign" != "y" ]; then
|
|
extparam=
|
|
if [ "$CONFIG_IGNORE_ROLLBACK" != "y" ]; then
|
|
extparam=-r
|
|
fi
|
|
# sign and auto-roll config counter
|
|
kexec-sign-config -p $paramsdir $extparam \
|
|
|| die "Failed to sign updated config"
|
|
fi
|
|
|
|
# switch back to ro mode
|
|
mount -o ro,remount $paramsdev
|