-
-
Notifications
You must be signed in to change notification settings - Fork 185
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
linux-x230-maximized: readd CONFIG_CRYPTO_AES for x230i since i3 doesn't have INTEL AES NI cpu acceleration. #1473
linux-x230-maximized: readd CONFIG_CRYPTO_AES for x230i since i3 doesn't have INTEL AES NI cpu acceleration. #1473
Conversation
…n't have INTEL AES NI cpu acceleration.
WIth heads-x230-maximized-v0.2.0-1752-g5bf14d2.rom it now seems to work as expected! :) Heads can open the volume and seal with TPM. Debian still asks for the password when booting though (in addition). Is that expected behaviour? I do have encrypted swap, not sure if that affects it(?) |
It all depends on the partition scheme. If using BRTFS (same as if using BRTFS under Qubes 4.1+ partition scheme) then two LUKS containers are expected to be unlocked from the TPM disk unlock key. So you should go back into Boot options -> show boot options -> save as default, and answer yes to reseal TPM disk unlock key. But this time, pass the two LUKS containers (eg /dev/sda2 /dev/sda3). Qubes default TLVM partition scheme has it all under a single LUKS container. I guess the information under https://osresearch.net/InstallingOS/#compatibility is not specific enough and could be improved, or the code could suggest found LUKS partitions only to confuse less the user.... Note that BRTFS is not supported within Heads. Only ext4 and TLVM (Thin LVM volume support without thin-lvm-tools). If needs be and tangent is to go torward XFS and BRTFS, we could try to add those tools as well. Note that #1446 is adding support for EXT4 repair tools and ExFat repair tools as well which is now the default for bought sdcards and thumb drives, where Thin LVMs are more and more despised for their added complexity which slows down disk operations. Also, I'm not sure if https://osresearch.net/InstallingOS/#default-boot-and-disk-unlock is true anymore, since my testing with Talos II and debian invalidates the statement there saying that init doesn't process crypttab: it does, otherwise I would not be able to boot into my OS. @krystian-hebel you reported something similar. What is your partition scheme on Talos II's debian install? The magic happening in the background here is:
@natterangell : So if only one LUKS container is overriden out of many, the final OS will ask for as many LUKS container it doesn't know how to unlock. Let me know if specifying both LUKS containers when setuping a TPM disk unlock key worked (it should: the logic parses those entries and will fail if the partition provided is not a LUKS drive, otherwise leaving slot 0 untouched (disk recovery key) and kills slot1 and then replaces slot 1 with the in-memory generated key corresponding to sealed secret in TPM, which TPM disk unlock key is unsealed with sealed measurements and NV region passphrase. This is why you type a different passphrase on Heads (TPM NV region passphrase to unlock TPM disk unlock key) then on Final OS (Disk recovery key). Hope this clarified everything. Would appreciate if you could do a PR on heads-wiki if that information is unclear to you. Related: asked question to @marmarek at https://forum.qubes-os.org/t/btrfs-and-qubes-os/6967/28 to see if BRTFS was expected to become the default partition scheme over current TLVM default, since QubesOS is first citizen of Heads. But if all OSes are moving away of TLVM, Heads will need to choose what to support in kernel and on filesystem tools provided for recovery shell. Heads cannot support everything since we are limited in ROM space (until we can switch to squashfs/overlayfs, when: undefined). |
Space comparison between master and this PR's sizes.txt files for x230-maximized boards Replication notes:
|
And now some digging into the numbers from previous post:
We don't care for maximized boards though:
Where after merging this, we still have 5316772 bytes in the empt region of CBFS for x230-maximized board and a little less for x230-maximized-hotp but still plenty enough. Note that legacy boards now has a new discrepency when compared to maximized boards, wich I will just carry along in next linux kernel version bumps. |
...
Actually, I forgot about that wiki entry! Editing /etc/crypttab as described worked! Now the disk boots without additional password entry.
The encrypted swap is part of the same default volume group, so it unlocks fine along with / after adjusting crypttab. So the wiki works fine for Debian. All is well! Thank you @tlaurion |
@natterangell please describe what was wrong on Debian (11? 12?) crypttab file? Was non-existent? I'm asking since, just as qubesos doesn't have a default crypttab, Heads generated one. It means that the one generated for Debian in your case doesn't support expected format. :/ Which version of Debian once again? |
Debian 12 "Bookworm", default encrypted install with LVM. As mentioned here:
The vanilla file as installed by Debian looks like this: sda5_crypt UUID=XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX none luks,discard Replacing "none" with "/secret.key", and adding "keyscript=/bin/cat" at the end of the line as described in wiki, then |
@natterangell Should fix #1472.
Todo:
cryptsetup benchmark
on his laptop (Please tet x230-maximized roms produced by this PR under "Checks")CONFIG_CRYPTO_AES