README.md: update
This commit is contained in:
parent
b41aa7748c
commit
cb66f23295
11
README.md
11
README.md
|
@ -38,6 +38,8 @@ to the login screen anymore.
|
||||||
A remote attacker modifying /etc can completely change your boot sequence and you cannot be sure of a
|
A remote attacker modifying /etc can completely change your boot sequence and you cannot be sure of a
|
||||||
secure boot to the login screen anymore.
|
secure boot to the login screen anymore.
|
||||||
|
|
||||||
|
All configurable files have been whitelisted and moved to /cfg.
|
||||||
|
|
||||||
## TODO
|
## TODO
|
||||||
- merge mkimage.sh and clonedisk
|
- merge mkimage.sh and clonedisk
|
||||||
- move all quirks from prepare-root.sh to quirks directory
|
- move all quirks from prepare-root.sh to quirks directory
|
||||||
|
@ -48,10 +50,6 @@ secure boot to the login screen anymore.
|
||||||
* UUID for unencrypted xfs
|
* UUID for unencrypted xfs
|
||||||
- ensure /data to be on same disk as root
|
- ensure /data to be on same disk as root
|
||||||
- add "load=<efipath>" to kernel command line via efi stub
|
- add "load=<efipath>" to kernel command line via efi stub
|
||||||
- update mechanism
|
|
||||||
- add proper EFI boot manager entries for A and B
|
|
||||||
- extend efi stub for recovery boot in the old image
|
|
||||||
- signing tools
|
|
||||||
- add admin LUKS key via [public key](https://blog.g3rt.nl/luks-smartcard-or-token.html)
|
- add admin LUKS key via [public key](https://blog.g3rt.nl/luks-smartcard-or-token.html)
|
||||||
- sssd
|
- sssd
|
||||||
- support more clevis pins and mixed pins
|
- support more clevis pins and mixed pins
|
||||||
|
@ -65,7 +63,8 @@ secure boot to the login screen anymore.
|
||||||
- passwd + shadow + group + gshadow decoupled from system in /var
|
- passwd + shadow + group + gshadow decoupled from system in /var
|
||||||
- bind LUKS2 with tpm2 to machine
|
- bind LUKS2 with tpm2 to machine
|
||||||
- swap on LUKS2 with tpm2 (no password for resume from disk??)
|
- swap on LUKS2 with tpm2 (no password for resume from disk??)
|
||||||
- /home and /var on single data partition
|
- /home /cfg and /var on single data partition
|
||||||
|
- Secure Boot
|
||||||
|
|
||||||
## Known Failures
|
## Known Failures
|
||||||
- no kernel command line on DELL ( you need a newer systemd https://github.com/systemd/systemd/pull/10001 )
|
- no kernel command line on DELL ( you need a newer systemd https://github.com/systemd/systemd/pull/10001 )
|
||||||
|
@ -218,4 +217,4 @@ Make sure the BIOS contains an option to restore the default keys.
|
||||||
- Boot from stick with Shell.efi and LockDown.efi
|
- Boot from stick with Shell.efi and LockDown.efi
|
||||||
- Execute LockDown.efi
|
- Execute LockDown.efi
|
||||||
- reset
|
- reset
|
||||||
- Secure Boot into signed FedoraBook release
|
- Secure Boot into signed FedoraBook release
|
||||||
|
|
Loading…
Reference in a new issue