What do you do exactly at this step? What do I input into Dom0 terminal? Can you unpack this scripting part please? Thanks!
Also, do you have any thoughts about this discussion:
What do you do exactly at this step? What do I input into Dom0 terminal? Can you unpack this scripting part please? Thanks!
Also, do you have any thoughts about this discussion:
grub
for future use (the name could be whatever, it happens that grub
makes sense in this context when youâre used to using variables)Converting /etc/default/grub to use yubikey
. Uses the variable defined above to do that. If youâre reading this in color in the forum, you can notice in the snippet above how the color of $grub
is different to indicate that a variable is in use. This kind of printing is only for you to be able to know whatâs going on while the script runs, it will be printed in the terminal in which the script is executed./etc/default/grub
called /etc/default/grub.bak
. The latter is a common naming scheme for backups. The idea is that /etc/default/grub
will be edited, but if you later on want to revert those changes, youâve got a copy of the original file and can do the opposite operation to overwrite the changes: cp /etc/default/grub.bak /etc/default/grub
./etc/default/grub
and pass them as text to the next steprd.luks.uuid=
by rd.ykluks.uuid=
and pass the result as text to the next steprd.qubes.hide_all_usb
by rd.ykluks.hide_all_usb
and replace the content of /etc/default/grub
with the resulting textGenerating new bootloader
grub2-mkconfig
to generate a file called /boot/efi/EFI/qubes/grub.cfg
. Thatâs a configuration file that GRUB uses to show entries you can boot from. From the logic of the script you can infer that the program grub2-mkconfig
uses the contents of /etc/default/grub
to generate the config file. If you change those and run the program again, you get a new config file. (grub2-mkconfig manual â itâs half a page long, worth a look!)Generating new kernel
dracut
with the -f
option to generate something called an initial image that is used by the kernel. From the logic of the script, you can infer that the initial image that dracut
generates is different when /boot/efi/EFI/qubes/grub.cfg
has changed.dracut creates an initial image used by the kernel for preloading the block device modules (such as IDE, SCSI or RAID) which are needed to access the root filesystem.
Options
-f, --force
overwrite existing initramfs file.
Thank you.
This is what I am most interested in:
That all depends on the previous steps. Is ykchalresp the only authentication method? I have a Yubikey C Bio and ykchalresp does not work, only FIDO2, I believe. How would you modify your directions for C Bio?
Since Qubes is building off of Fedora for base functions, it should be easy for you to tell me how modify the directions of the Fedora article to work on Qubes.
Disclaimer: I donât know myself. That being said, searching about systemd-cryotenroll in the forum lead me to this post, that seems to suggest that performing the initial LUKS unlocking using FIDO2 during startup is not yet possible as of R4.1. Again, I may be reading that wrong, and that information might be incorrect, but I think youâll find some information on the forum starting from there.
Dom0 is not F37 as of latest? Alexanderâs article cited above is addressing current Fedora. FIFO2 authorization is possible with all series 5 keys. I am going to try it, but maybe I should get a non-bio Yubikey for ykchalresp since a lot of the complexity is already worked out smoothly and the script looks solid. But then anyone with the hardware key can unlock. They donât need a fingerprint. So what is the point? Carrying the key is more portable? Its not like HEADS is verifying hardware measurements with a Purism key.
The latest release R4.1 sports Fedora 32 in dom0 (release notes). R4.2 will change that but is not released yet.
Then you could be right about not up for FIDO U2F, systemd cryptenroll, crypttab, and dracut . . . but all that has been around for awhile. F32 is not pre-systemd.
Dom0 can change itâs boot from GRUB to EFI which means systemd boot is possible.
But if Dom0 requires installation or updating, that is a problem. Update Manager asks me to update Dom0 but if that is compromised, all is lost so I donât. FIDO U2F locking LUKS mught require networking access that bypasses even Update Manager security measures.
Probably should get a non-bio series 5 Yubikey with ykchalresp.
Do other keys like Nitro or Feitian have something like ykchalresp that can be installed in Work qube and connected to GRUB?
Still wondering what to do for F37 Dom0 on R4.2 if anyone has any pointers.
I wonder whther the GRUB script method or dracut crypttab is betterâŚ