!agkXCfUrgbadYlQXRj:kack.it

NixOS + TPMs

178 Members
43 Servers

You have reached the beginning of time (for this room).


SenderMessageTime
24 Jan 2022
@zhaofeng:zhaofeng.liZhaofeng LiYou can still dual-boot Windows, just allow Microsoft's certificates in your db22:41:29
@zhaofeng:zhaofeng.liZhaofeng LiFound it: https://wiki.archlinux.org/title/Unified_Extensible_Firmware_Interface/Secure_Boot#Dual_booting_with_other_operating_systems22:42:16
@colemickens:matrix.org@colemickens:matrix.orgHrmph, now I feel like I wasted my time with the shim, but this would require figuring out signing :s22:42:19
@zhaofeng:zhaofeng.liZhaofeng LiIt's actually pretty simple after you generate all the keys and enroll them in your BIOS22:43:13
@zhaofeng:zhaofeng.liZhaofeng LiEverything else can be done from the OS22:43:30
@colemickens:matrix.org@colemickens:matrix.orgI just assume people are signing outside the store or doing some sandboxing trick to get to the private key or something. I've always avoided that, but maybe it's not a huge deal.22:44:10
@zhaofeng:zhaofeng.liZhaofeng Li
In reply to @zhaofeng:zhaofeng.li
You can get actual Secure Boot signing working with https://github.com/frogamic/nix-machines/tree/main/modules/systemd-secure-boot
The module here automatically creates a unified kernel image (kernel + initrd) for each generation and signs them
22:45:10
@zhaofeng:zhaofeng.liZhaofeng LiAnd the end-user experience is seamless22:45:23
@colemickens:matrix.org@colemickens:matrix.orgOh, right, it just takes a path to the key.22:45:40
@colemickens:matrix.org@colemickens:matrix.orgHuh, why was I over thinking this.22:45:46
@colemickens:matrix.org@colemickens:matrix.orgNeato.22:45:49
@colemickens:matrix.org@colemickens:matrix.org Thanks a bunch Zhaofeng Li , I'll have to spend another weekend day trying to do this the right way then! 22:47:21
31 Jan 2022
@bernardo:matrix.parity.io@bernardo:matrix.parity.io changed their profile picture.11:49:42
2 Feb 2022
@cw:kernelpanic.cafe@cw:kernelpanic.cafe changed their display name from CoilWinder (novus ordo seclorum) to Chuck Winter.08:37:03
3 Feb 2022
@lvkm:matrix.orglvkm joined the room.08:49:27
@lewo:matrix.orglewo joined the room.21:47:17
4 Feb 2022
@mic92:nixos.dev@mic92:nixos.devis this any good? https://github.com/whooo/tpm2-ssh-agent 14:08:18
15 Feb 2022
@stigo:matrix.org@stigo:matrix.org
In reply to @mic92:nixos.dev
is this any good? https://github.com/whooo/tpm2-ssh-agent
I've been using gpg with tpm for ssh for a while now, quite happy with it. Unable to change passphrases for tpm backed keys tho.
16:02:28
@stigo:matrix.org@stigo:matrix.orgWas wondering if anyone has had any luck setting up TPM2 with LUKS on NixOS?16:03:08
@mic92:nixos.dev@mic92:nixos.devI try to keep my system gnupg-free because of bad past experiences. I think andi- was working on that, but don't know the status16:04:05
@stigo:matrix.org@stigo:matrix.org"happy" and "gpg" are unlikely to be in the same sentence though.16:04:08
@zhaofeng:zhaofeng.liZhaofeng Li
In reply to @stigo:matrix.org
Was wondering if anyone has had any luck setting up TPM2 with LUKS on NixOS?
I use clevis and add the decrypt command to my boot.initrd.luks.devices.<name>.preOpenCommands
16:30:19
@zhaofeng:zhaofeng.liZhaofeng LiI added an option so the decryption process immediately falls back to password if the key file doesn't exist instead of waiting: https://github.com/NixOS/nixpkgs/pull/15019616:31:16
@zhaofeng:zhaofeng.liZhaofeng LiFor better TPM+LUKS integration, there was https://github.com/NixOS/nixpkgs/pull/134577 but it was decided that we wanted to wait for systemd in stage-1 for cryptenroll support which is still in limbo at the moment16:33:00

Show newer messages


Back to Room ListRoom Version: 6