Skip to content

Nitrokey/qubes-oem

Repository files navigation

Qubes unattended OEM installer with LUKS+LVM

This script creates an secondary configuration image for Qubes (currently R4.2.3) that can be used for:

  • works unattended (plug in, power on, leave alone for 10 minutes)
  • performs an OEM install - on the subsequent boot the user will be presented with the installer screen to set up their language, timezone, login info, etc.
  • sets up LVM on LUKS with initial password
  • pre installs the Nitrokey App2 and Nitrokey App in the feodra template
  • can be used to hide extra GPU from dom0 (use gpu option) to allow esay install

WARNING WARNING WARNING

DO NOT BOOT THIS IMAGE ON ANY COMPUER THAT CONTAINS ANY USEFUL DATA This installer is COMPLETELY UNATTENDED, it doesn't need a keypress to start, doesn't ask any questions, doesn't wait for any confirmation and IT WILL ERASE THE COMPUTERS'S STORAGE COMPLETELY AND UNCONDITIONALLY, including existing LVMs.

You have been warned. Label the disc or pendrive appropriately to avoid mistakes.

Initial LUKS password

Yes, the initial password for LUKS is hardcoded in the kickstart file. Even if it weren't literally hardcoded (which is easy enough to fix, and probably will be; not a big deal anyway), all installations performed with a single image will share the initial password. However, thanks to how LUKS uses passwords, the actual encryption master key will be different on each install. As long as the password is changed by the end user, their installation will not share any key material with other instances.

It is, of course, possible for a vendor using this installer to covertly copy the LUKS master key off the installed system between installation and first boot, to retain access to data (unless the user runs cryptsetup-reencrypt). It's also possible for the vendor to just backdoor the initrd (which contains the LUKS password prompt), or the OS itself, or the bootloader, or the firmware, or any other part of the computer. The usual caveats for using any pre-installed software/firmware/etc. still apply.

Usage

./make-image.sh de
./make-image.sh de gpu 

Run make-image.sh to build an QUBES_OEM image (or download the image). Use a DVD or pendrive like with a regular Qubes installer together with this image on a Seprated Install. When booting the Option "OEM Install(Kickstarter) will apear choose this. No other actions are needed, the script will download the official ISO itself.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published