VerityBook/README.md

230 lines
6.3 KiB
Markdown
Raw Permalink Normal View History

2020-02-11 10:50:54 +01:00
# VerityBook
2018-08-28 09:25:03 +02:00
2018-09-05 12:55:22 +02:00
Let's put all the fancy features together, we developed in the last years:
2018-09-05 12:56:52 +02:00
2018-09-05 12:55:22 +02:00
- Combined kernel+initramfs EFI binaries
- Secure Boot
- clevis with TPM2
- LUKS2
- dm-verity + squashfs root
- Flatpak
- flickerless boot
2018-09-05 12:56:52 +02:00
2018-09-05 12:55:22 +02:00
and build a Chromebook like Fedorabook, where you can install all software via Flatpak.
2020-02-19 13:39:28 +01:00
This is WIP. Please test and report issues, comments or missing components on https://github.com/haraldh/VerityBook/issues
2018-08-28 09:25:03 +02:00
2018-09-05 12:37:00 +02:00
## Goals
- secure boot to the login screen
2018-09-14 10:24:53 +02:00
- immutable base OS
2018-09-05 12:37:00 +02:00
- ensured integrity to the login screen
- encrypted volatile data
- A/B boot switching for updates
- Flatpak
- basic desktop
- optional: bind encrypted data partition to TPM2
- optional: frequent reencryption of the data partition
## Non-Goals
2018-09-14 10:24:53 +02:00
- can't secure against a remote attacker writing anything to disk
- can't secure against a remote attacker scraping secret keys from the kernel
## FAQ
### Isn't encrypting everything enough?
If a remote attacker modifies your binaries in /usr/bin, you cannot be sure of a secure boot
to the login screen anymore.
### Why readonly /etc?
A remote attacker modifying /etc can completely change your boot sequence and you cannot be sure of a
secure boot to the login screen anymore.
2018-09-05 12:37:00 +02:00
2018-09-18 12:34:45 +02:00
All configurable files have been whitelisted and moved to /cfg.
2018-09-05 12:37:00 +02:00
## TODO
- merge mkimage.sh and clonedisk
2018-09-05 15:50:51 +02:00
- move all quirks from prepare-root.sh to quirks directory
- source all quirks depending on package installation on command line options
2018-09-05 12:55:22 +02:00
- change partition UUIDs for /data
2018-09-05 12:56:52 +02:00
* UUID for TPM LUKS
* UUID for LUKS
* UUID for unencrypted xfs
2018-09-05 13:14:58 +02:00
- ensure /data to be on same disk as root
- add "load=<efipath>" to kernel command line via efi stub
2018-09-05 13:37:07 +02:00
- add admin LUKS key via [public key](https://blog.g3rt.nl/luks-smartcard-or-token.html)
- sssd
2018-09-05 13:42:47 +02:00
- support more clevis pins and mixed pins
2018-09-05 14:24:25 +02:00
- option to always clean data disk on boot
2018-09-05 12:55:22 +02:00
2018-09-05 13:33:02 +02:00
## Complete / What works already?
- boot from single efi binary
- dm_verity + squashfs immutable, integrity checked root
- passwd + shadow + group + gshadow decoupled from system in /var
- bind LUKS2 with tpm2 to machine
2018-09-07 16:47:54 +02:00
- swap on LUKS2 with tpm2 (no password for resume from disk??)
2018-09-18 12:34:45 +02:00
- /home /cfg and /var on single data partition
- Secure Boot
2018-09-20 07:24:26 +02:00
- selinux
2018-10-19 14:32:39 +02:00
- firmware update (works, but needs a secure boot signed fwup*.efi)
2018-09-05 13:33:02 +02:00
2018-09-05 12:55:22 +02:00
## Known Failures
2018-09-07 16:47:54 +02:00
- systemd: failed to umount /var
2018-09-20 16:02:21 +02:00
- needs a ´´´restorecond -FmvR /cfg /var /home´´´ after first boot, because systemd-tmpfiles does not seem
to restore all context
- vga switcheroo is not accessible for lockdown=1, because the kernel does not allow access to /sys/kernel/debug
2018-09-05 12:37:00 +02:00
2018-08-28 09:25:03 +02:00
## Create
2018-09-14 10:24:53 +02:00
### Prepare the Image
2018-10-24 14:40:18 +02:00
For reproducible squashfs builds use https://github.com/squashfskit/squashfskit. Clone it in the
2020-02-11 10:50:54 +01:00
main VerityBook directory and build it.
2018-10-24 14:40:18 +02:00
2020-03-13 09:39:40 +01:00
```console
2020-03-13 10:23:01 +01:00
$ mkdir dist
2018-08-28 09:25:03 +02:00
$ sudo ./prepare-root.sh \
--pkglist pkglist.txt \
--excludelist excludelist.txt \
2020-02-11 10:50:54 +01:00
--name VerityBook \
2018-09-14 16:29:42 +02:00
--logo logo.bmp \
--reposd <REPOSDIR> \
2020-03-13 10:23:01 +01:00
--releasever 31
--baseoutdir $(realpath dist)
2018-08-28 09:25:03 +02:00
```
2018-09-14 10:24:53 +02:00
This will create the following files and directories:
2020-03-13 10:23:01 +01:00
- `VerityBook` - keep this directory around for updates
2018-10-24 14:40:18 +02:00
(includes needed passwd/group history and rpmdb)
2020-03-13 10:23:01 +01:00
- `dist/VerityBook-<HASH>.img` - the root image
- `dist/VerityBook-31.<datetime>.json` - metadata of the image
- `dist/VerityBook-latest.json` - a symlink to the latest version
2018-09-05 13:23:07 +02:00
2018-09-14 10:24:53 +02:00
## Sign the release
Get [efitools](https://github.com/haraldh/efitools.git). Compile and create your keys.
2020-02-11 10:50:54 +01:00
Copy ```LockDown.efi``` ```DB.key``` ```DB.crt``` from efitools to the veritybook directory.
2018-09-14 10:24:53 +02:00
2020-02-11 10:50:54 +01:00
Rename ```DB.key``` ```DB.crt``` to ```VerityBook.key``` and ```VerityBook.crt```
2018-10-24 14:40:18 +02:00
2020-02-11 10:50:54 +01:00
Optionally copy ```Shell.efi``` (might be ```/usr/share/edk2/ovmf/Shell.efi```) to the veritybook directory.
2018-09-14 10:24:53 +02:00
2020-03-13 09:39:40 +01:00
```console
2020-03-13 10:48:25 +01:00
$ sudo ./mkrelease.sh dist/VerityBook-latest.json
2018-09-14 10:24:53 +02:00
```
2020-03-13 10:48:25 +01:00
This will create the following files and directories:
- `dist/VerityBook-<HASH>-efi.tgz` - signed efi binaries
- `dist/VerityBook-31.<datetime>.json.sig` - signature of the metadata
2020-03-13 09:39:40 +01:00
if you want to make deltas:
```console
$ sudo ./mkdelta.sh ${CHECKPOINT:+--checkpoint} dist/VerityBook-latest.json
```
If `CHECKPOINT` is set, it will remove old images.
2018-09-14 10:24:53 +02:00
then upload to your update server:
2020-03-13 09:39:40 +01:00
```console
2020-03-13 10:50:56 +01:00
$ rsync -Pavorz dist/ <DESTINATION>/
2018-09-14 10:24:53 +02:00
```
2018-08-28 09:25:03 +02:00
## QEMU disk image
2020-03-13 09:39:40 +01:00
```console
2020-02-11 10:50:54 +01:00
$ sudo ./mkimage.sh <IMGDIR> image.raw
2018-08-28 09:25:03 +02:00
```
2018-09-14 10:24:53 +02:00
or with the json file:
2020-03-13 09:39:40 +01:00
```console
2020-02-11 10:50:54 +01:00
$ sudo ./mkimage.sh VerityBook-latest.json image.raw
2018-09-14 10:24:53 +02:00
```
2018-08-28 09:25:03 +02:00
## USB stick
2020-03-13 09:39:40 +01:00
```console
2018-09-05 12:37:00 +02:00
$ sudo ./mkimage.sh <IMGDIR> /dev/disk/by-path/pci-…-usb…
2018-08-28 09:25:03 +02:00
```
2018-09-14 10:24:53 +02:00
or with the json file:
2020-03-13 09:39:40 +01:00
```console
2020-02-11 10:50:54 +01:00
$ sudo ./mkimage.sh VerityBook-latest.json /dev/disk/by-path/pci-…-usb…
2018-09-14 10:24:53 +02:00
```
2018-08-28 09:25:03 +02:00
## Install from USB stick
2018-09-05 14:10:49 +02:00
**Warning**: This will wipe the entire target disk
2018-09-05 14:08:50 +02:00
2018-09-14 10:24:53 +02:00
### Preparation
2018-08-28 09:25:03 +02:00
- Enter BIOS
2018-09-05 12:57:41 +02:00
* turn on UEFI boot
* turn on TPM2
2018-09-14 10:24:53 +02:00
* set a BIOS admin password
2018-08-28 09:25:03 +02:00
- Enter BIOS boot menu
- Select USB stick
- Login (user: admin, pw: admin)
- Start gnome-terminal
2018-09-14 10:24:53 +02:00
### Installation
If you can encrypt your disk via the BIOS, do so.
If you cannot:
- use the option ```--crypttpm2```, if you have a TPM2 chip
- use the option ```--crypt``` otherwise
2020-03-13 09:39:40 +01:00
```console
2020-02-11 10:50:54 +01:00
$ sudo veritybook-clonedisk <options> <usb stick device> <harddisk device>
2018-10-19 14:32:39 +02:00
```
2018-09-14 10:24:53 +02:00
### Post
2018-08-28 09:25:03 +02:00
- reboot
- remove stick
2018-09-05 12:55:22 +02:00
2018-09-14 10:24:53 +02:00
The first boot takes longer as the system tries to bind the LUKS to the TPM2 on the machine.
It also populates ```/var``` with the missing directories.
2018-09-05 13:50:57 +02:00
You can always clear the data partition via:
2020-03-13 09:39:40 +01:00
```console
2018-09-14 10:24:53 +02:00
# wipefs --all --force /dev/<disk partition 5>
2018-09-05 13:50:57 +02:00
```
and then either make a xfs
2020-03-13 09:39:40 +01:00
```console
2018-09-14 10:24:53 +02:00
# mkfs.xfs -L data /dev/<disk partition 5>
2018-09-05 13:50:57 +02:00
```
2018-09-14 10:24:53 +02:00
or LUKS
2020-03-13 09:39:40 +01:00
```console
2018-09-14 10:24:53 +02:00
# echo -n "zero key" | cryptsetup luksFormat --type luks2 /dev/<disk partition 4> /dev/stdin
# echo -n "zero key" | cryptsetup luksFormat --type luks2 /dev/<disk partition 5> /dev/stdin
2018-09-05 13:50:57 +02:00
```
2018-09-14 10:24:53 +02:00
On the media created with mkimage.sh, this is partition number *3*.
2018-09-05 13:50:57 +02:00
2018-09-05 12:55:22 +02:00
## Post Boot
### Persistent journal
2020-03-13 09:39:40 +01:00
```console
2018-09-05 12:55:22 +02:00
$ sudo mkdir /var/log/journal
```
2018-09-05 15:16:47 +02:00
### LUKS
2018-09-14 10:24:53 +02:00
Set a new LUKS password, if you installed with ```--crypt``` or ```--crypttpm2```.
The initial password is ```zero key```.
## Updating
2020-03-13 09:39:40 +01:00
```console
2020-02-11 10:50:54 +01:00
# systemd-inhibit veritybook-update <UPDATE-URL>
2018-09-14 10:24:53 +02:00
```
## Secure Boot
**Warning**: This will wipe all the secure boot keys.
Make sure the BIOS contains an option to restore the default keys.
- Enter BIOS
* turn on Secure Boot
* turn on Setup Mode
- Boot from stick with Shell.efi and LockDown.efi
- Execute LockDown.efi
- reset
2020-02-11 10:50:54 +01:00
- Secure Boot into signed VerityBook release