Install blujust
This commit is contained in:
95
files/base/usr/libexec/luks-disable-tpm2-autounlock
Executable file
95
files/base/usr/libexec/luks-disable-tpm2-autounlock
Executable file
@@ -0,0 +1,95 @@
|
|||||||
|
#!/usr/bin/bash
|
||||||
|
|
||||||
|
# Copyright 2025 Universal Blue
|
||||||
|
# Copyright 2025 The BlueBuild Authors
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software distributed under the License is
|
||||||
|
# distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and limitations under the License.
|
||||||
|
|
||||||
|
## disable auto-unlock LUKS2 encrypted root on Fedora/Silverblue/maybe others
|
||||||
|
set -euo pipefail
|
||||||
|
|
||||||
|
[ "$UID" -eq 0 ] || { echo "This script must be run as root."; exit 1;}
|
||||||
|
|
||||||
|
echo "This script utilizes systemd-cryptenroll for removing tpm2 auto-unlock."
|
||||||
|
echo "You can review systemd-cryptenroll's manpage for more information."
|
||||||
|
echo "This will modify your system and disable TPM2 auto-unlock of your LUKS partition!"
|
||||||
|
read -p "Are you sure are good with this and want to disable TPM2 auto-unlock? (y/N): " -n 1 -r
|
||||||
|
echo
|
||||||
|
if [[ ! $REPLY =~ ^[Yy]$ ]]; then
|
||||||
|
[[ "$0" = "${BASH_SOURCE[0]}" ]] && exit 1 || return 1 # handle exits from shell or function but don't exit interactive shell
|
||||||
|
fi
|
||||||
|
|
||||||
|
## Inspect Kernel Cmdline for rd.luks.uuid
|
||||||
|
RD_LUKS_UUID="$(xargs -n1 -a /proc/cmdline | grep rd.luks.uuid | cut -d = -f 2)"
|
||||||
|
|
||||||
|
# Check to make sure cmdline rd.luks.uuid exists
|
||||||
|
if [[ -z ${RD_LUKS_UUID:-} ]]; then
|
||||||
|
printf "LUKS device not defined on Kernel Commandline.\n"
|
||||||
|
printf "This is not supported by this script.\n"
|
||||||
|
printf "Exiting...\n"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Check to make sure that the specified cmdline uuid exists.
|
||||||
|
if ! grep -q "${RD_LUKS_UUID}" <<< "$(lsblk)" ; then
|
||||||
|
printf "LUKS device not listed in block devices.\n"
|
||||||
|
printf "Exiting...\n"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Cut off the luks-
|
||||||
|
LUKS_PREFIX="luks-"
|
||||||
|
if grep -q ^${LUKS_PREFIX} <<< "${RD_LUKS_UUID}"; then
|
||||||
|
DISK_UUID=${RD_LUKS_UUID#"$LUKS_PREFIX"}
|
||||||
|
else
|
||||||
|
echo "LUKS UUID format mismatch."
|
||||||
|
echo "Exiting..."
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Specify Crypt Disk by-uuid
|
||||||
|
CRYPT_DISK="/dev/disk/by-uuid/$DISK_UUID"
|
||||||
|
|
||||||
|
# Check to make sure crypt disk exists
|
||||||
|
if [[ ! -L "$CRYPT_DISK" ]]; then
|
||||||
|
printf "LUKS device not listed in block devices.\n"
|
||||||
|
printf "Exiting...\n"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
## Restore the crypttab
|
||||||
|
cp -a /etc/crypttab /etc/crypttab.working-before-disable-tpm2
|
||||||
|
if [ -f /etc/crypttab.known-good ]; then
|
||||||
|
echo "Restoring /etc/crypttab.known-good to original /etc/crypttab"
|
||||||
|
mv /etc/crypttab.known-good /etc/crypttab
|
||||||
|
fi
|
||||||
|
|
||||||
|
## Wipe luks slot
|
||||||
|
if cryptsetup luksDump "$CRYPT_DISK" | grep systemd-tpm2 > /dev/null; then
|
||||||
|
echo "Wiping systemd-tpm2 from LUKS on $CRYPT_DISK"
|
||||||
|
systemd-cryptenroll --wipe-slot=tpm2 "$CRYPT_DISK"
|
||||||
|
else
|
||||||
|
echo "No systemd-tpm2 found in LUKS to wipe"
|
||||||
|
fi
|
||||||
|
|
||||||
|
## Disable initramfs
|
||||||
|
if rpm-ostree initramfs | grep tpm2 > /dev/null; then
|
||||||
|
echo "WARNING: if you configured initramfs for anything other than TPM2, this wipes that too..."
|
||||||
|
echo "here's a printout:"
|
||||||
|
rpm-ostree initramfs
|
||||||
|
echo
|
||||||
|
echo "Disabling rpm-ostree initramfs..."
|
||||||
|
rpm-ostree initramfs --disable
|
||||||
|
else
|
||||||
|
echo "TPM2 is not configured in 'rpm-ostree initramfs'..."
|
||||||
|
fi
|
||||||
|
|
||||||
|
echo "TPM2 auto-unlock disabled..."
|
||||||
122
files/base/usr/libexec/luks-enable-tpm2-autounlock
Executable file
122
files/base/usr/libexec/luks-enable-tpm2-autounlock
Executable file
@@ -0,0 +1,122 @@
|
|||||||
|
#!/usr/bin/bash
|
||||||
|
|
||||||
|
# Copyright 2025 Universal Blue
|
||||||
|
# Copyright 2025 The BlueBuild Authors
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software distributed under the License is
|
||||||
|
# distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and limitations under the License.
|
||||||
|
|
||||||
|
## setup auto-unlock LUKS2 encrypted root on Fedora/Silverblue/maybe others
|
||||||
|
set -eou pipefail
|
||||||
|
|
||||||
|
[ "$UID" -eq 0 ] || { echo "This script must be run as root."; exit 1;}
|
||||||
|
|
||||||
|
echo "WARNING: Do NOT use this if your CPU is vulnerable to faulTPM!"
|
||||||
|
echo "All AMD Zen2 and Zen3 Processors are known to be affected!"
|
||||||
|
echo "All AMD Zen1 processors are also likely affected, with Zen4 unknown!"
|
||||||
|
echo "If you have an AMD CPU, you likely shouldn't use this!"
|
||||||
|
echo "----------------------------------------------------------------------------"
|
||||||
|
echo "This script uses systemd-cryptenroll to enable TPM2 auto-unlock."
|
||||||
|
echo "You can review systemd-cryptenroll's manpage for more information."
|
||||||
|
echo "This script will modify your system."
|
||||||
|
echo "It will enable TPM2 auto-unlock of your LUKS partition for your root device!"
|
||||||
|
echo "It will bind to PCR 7 and 14 which is tied to your secureboot and moklist state."
|
||||||
|
read -p "Are you sure are good with this and want to enable TPM2 auto-unlock? (y/N): " -n 1 -r
|
||||||
|
echo
|
||||||
|
if [[ ! $REPLY =~ ^[Yy]$ ]]; then
|
||||||
|
[[ "$0" = "${BASH_SOURCE[0]}" ]] && exit 1 || return 1 # handle exits from shell or function but don't exit interactive shell
|
||||||
|
fi
|
||||||
|
|
||||||
|
## Inspect Kernel Cmdline for rd.luks.uuid
|
||||||
|
RD_LUKS_UUID="$(xargs -n1 -a /proc/cmdline | grep rd.luks.uuid | cut -d = -f 2)"
|
||||||
|
|
||||||
|
# Check to make sure cmdline rd.luks.uuid exists
|
||||||
|
if [[ -z ${RD_LUKS_UUID:-} ]]; then
|
||||||
|
printf "LUKS device not defined on Kernel Commandline.\n"
|
||||||
|
printf "This is not supported by this script.\n"
|
||||||
|
printf "Exiting...\n"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Check to make sure that the specified cmdline uuid exists.
|
||||||
|
if ! grep -q "${RD_LUKS_UUID}" <<< "$(lsblk)" ; then
|
||||||
|
printf "LUKS device not listed in block devices.\n"
|
||||||
|
printf "Exiting...\n"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Cut off the luks-
|
||||||
|
LUKS_PREFIX="luks-"
|
||||||
|
if grep -q ^${LUKS_PREFIX} <<< "${RD_LUKS_UUID}"; then
|
||||||
|
DISK_UUID=${RD_LUKS_UUID#"$LUKS_PREFIX"}
|
||||||
|
else
|
||||||
|
echo "LUKS UUID format mismatch."
|
||||||
|
echo "Exiting..."
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
SET_PIN_ARG=""
|
||||||
|
read -p "Would you like to set a PIN? (y/N): " -n 1 -r
|
||||||
|
echo
|
||||||
|
if [[ $REPLY =~ ^[Yy]$ ]]; then
|
||||||
|
SET_PIN_ARG=" --tpm2-with-pin=yes "
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Specify Crypt Disk by-uuid
|
||||||
|
CRYPT_DISK="/dev/disk/by-uuid/$DISK_UUID"
|
||||||
|
|
||||||
|
# Check to make sure crypt disk exists
|
||||||
|
if [[ ! -L "$CRYPT_DISK" ]]; then
|
||||||
|
printf "LUKS device not listed in block devices.\n"
|
||||||
|
printf "Exiting...\n"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
if cryptsetup luksDump "$CRYPT_DISK" | grep systemd-tpm2 > /dev/null; then
|
||||||
|
KEYSLOT=$(cryptsetup luksDump "$CRYPT_DISK" | sed -n '/systemd-tpm2$/,/Keyslot:/p' | grep Keyslot|awk '{print $2}')
|
||||||
|
echo "TPM2 already present in LUKS keyslot $KEYSLOT of $CRYPT_DISK."
|
||||||
|
read -p "Wipe it and re-enroll? (y/N): " -n 1 -r
|
||||||
|
echo
|
||||||
|
if [[ $REPLY =~ ^[Yy]$ ]]; then
|
||||||
|
systemd-cryptenroll --wipe-slot=tpm2 "$CRYPT_DISK"
|
||||||
|
else
|
||||||
|
echo
|
||||||
|
echo "Either clear the existing TPM2 keyslot before retrying, else choose 'y' next time."
|
||||||
|
echo "Exiting..."
|
||||||
|
[[ "$0" = "${BASH_SOURCE[0]}" ]] && exit 1 || return 1
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
|
||||||
|
## Run crypt enroll
|
||||||
|
echo "Enrolling TPM2 unlock requires your existing LUKS2 unlock password"
|
||||||
|
systemd-cryptenroll --tpm2-device=auto --tpm2-pcrs=7+14 $SET_PIN_ARG "$CRYPT_DISK"
|
||||||
|
|
||||||
|
|
||||||
|
if lsinitrd 2>&1 | grep -q tpm2-tss > /dev/null; then
|
||||||
|
## add tpm2-tss to initramfs
|
||||||
|
if rpm-ostree initramfs | grep tpm2 > /dev/null; then
|
||||||
|
echo "TPM2 already present in rpm-ostree initramfs config."
|
||||||
|
rpm-ostree initramfs
|
||||||
|
echo "Re-running initramfs to pickup changes above."
|
||||||
|
fi
|
||||||
|
rpm-ostree initramfs --enable --arg=--force-add --arg=tpm2-tss
|
||||||
|
else
|
||||||
|
## initramfs already containts tpm2-tss
|
||||||
|
echo "TPM2 already present in initramfs."
|
||||||
|
fi
|
||||||
|
|
||||||
|
## Now reboot
|
||||||
|
echo
|
||||||
|
echo "TPM2 LUKS auto-unlock configured. Reboot now."
|
||||||
|
|
||||||
|
|
||||||
|
# References:
|
||||||
|
# https://www.reddit.com/r/Fedora/comments/uo4ufq/any_way_to_get_systemdcryptenroll_working_on/
|
||||||
|
# https://0pointer.net/blog/unlocking-luks2-volumes-with-tpm2-fido2-pkcs11-security-hardware-on-systemd-248.html
|
||||||
31
files/justfiles/30-secureboot.just
Normal file
31
files/justfiles/30-secureboot.just
Normal file
@@ -0,0 +1,31 @@
|
|||||||
|
# Copyright 2025 Universal Blue
|
||||||
|
# Copyright 2025 The BlueBuild Authors
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software distributed under the License is
|
||||||
|
# distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and limitations under the License.
|
||||||
|
|
||||||
|
# Enroll Nvidia driver & KMOD signing key for secure boot - Enter password "wunker" if prompted
|
||||||
|
enroll-secure-boot-key:
|
||||||
|
#!/usr/bin/bash
|
||||||
|
ENROLLMENT_PASSWORD="wunker"
|
||||||
|
SECUREBOOT_KEY=/etc/pki/akmods/certs/akmods-wunker-bunker.der
|
||||||
|
sudo mokutil --timeout -1
|
||||||
|
echo -e "$ENROLLMENT_PASSWORD\n$ENROLLMENT_PASSWORD" | sudo mokutil --import "$SECUREBOOT_KEY"
|
||||||
|
echo 'At next reboot, the mokutil UEFI menu UI will be displayed (*QWERTY* keyboard input and navigation).\nThen, select "Enroll MOK", and input "wunker" as the password'
|
||||||
|
|
||||||
|
# Enable automatic LUKS unlock via TPM
|
||||||
|
setup-luks-tpm-unlock:
|
||||||
|
#!/usr/bin/bash
|
||||||
|
sudo /usr/libexec/luks-enable-tpm2-autounlock
|
||||||
|
|
||||||
|
# Disable automatic LUKS unlock via TPM
|
||||||
|
remove-luks-tpm-unlock:
|
||||||
|
#!/usr/bin/bash
|
||||||
|
sudo /usr/libexec/luks-disable-tpm2-autounlock
|
||||||
@@ -13,6 +13,13 @@ modules:
|
|||||||
enabled:
|
enabled:
|
||||||
- bootc-fetch-apply-updates.timer
|
- bootc-fetch-apply-updates.timer
|
||||||
|
|
||||||
|
- type: justfiles
|
||||||
|
source: ghcr.io/blue-build/modules:pr-498
|
||||||
|
validate: true
|
||||||
|
install: true
|
||||||
|
include:
|
||||||
|
- 30-secureboot.just
|
||||||
|
|
||||||
- type: dnf
|
- type: dnf
|
||||||
repos:
|
repos:
|
||||||
cleanup: true
|
cleanup: true
|
||||||
@@ -23,8 +30,6 @@ modules:
|
|||||||
install:
|
install:
|
||||||
packages:
|
packages:
|
||||||
- bootc
|
- bootc
|
||||||
- ublue-os-just
|
|
||||||
- ublue-os-luks
|
|
||||||
- ublue-os-udev-rules
|
- ublue-os-udev-rules
|
||||||
- fedora-repos-archive
|
- fedora-repos-archive
|
||||||
- zstd
|
- zstd
|
||||||
@@ -135,11 +140,5 @@ modules:
|
|||||||
- curl -sSLo ${CSFG} https://raw.githubusercontent.com/coreos/fedora-coreos-config/refs/heads/stable/overlay.d/05core/usr/lib/systemd/system-generators/coreos-sulogin-force-generator
|
- curl -sSLo ${CSFG} https://raw.githubusercontent.com/coreos/fedora-coreos-config/refs/heads/stable/overlay.d/05core/usr/lib/systemd/system-generators/coreos-sulogin-force-generator
|
||||||
- chmod +x ${CSFG}
|
- chmod +x ${CSFG}
|
||||||
|
|
||||||
# Adjust ublue just recipes
|
|
||||||
- sed -i 's|rpm-ostreed-automatic\.timer|bootc-fetch-apply-updates.timer|g' /usr/share/ublue-os/just/10-update.just
|
|
||||||
- sed -i 's|update_command "rpm-ostree update"|update_command "sudo bootc upgrade"|g' /usr/share/ublue-os/just/10-update.just
|
|
||||||
- sed -i 's|/etc/pki/akmods/certs/akmods-ublue\.der|/etc/pki/akmods/certs/akmods-wunker-bunker.der|g' /usr/share/ublue-os/just/00-default.just
|
|
||||||
- sed -i 's|"universalblue"|"wunker"|g' /usr/share/ublue-os/just/00-default.just
|
|
||||||
|
|
||||||
# Add SUDO_ASKPASS as a global environment
|
# Add SUDO_ASKPASS as a global environment
|
||||||
- echo "SUDO_ASKPASS=/usr/libexec/openssh/ssh-askpass" >> /etc/environment
|
- echo "SUDO_ASKPASS=/usr/libexec/openssh/ssh-askpass" >> /etc/environment
|
||||||
|
|||||||
Reference in New Issue
Block a user