Enabling lanzaboote on initial installation #397
Labels
No labels
bug
dependency
documentation
duplicate
enhancement
good first issue
help wanted
invalid
question
review-next
security
stub
tool
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: raito/lanzaboote#397
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Hello! I've been using this successfully for a few months, and I'd like to generalize its usage.
Readme specifies:
f5a3a7dff4/docs/QUICK_START.md (L33-L35)
I'd like to be able to apply a configuration with lanzaboote enabled as I run
nixos-install
, and not have to manually temporarily disable it from my config during the installation, then re-enable it after the installation.Could you please expand on the limitations that prevent from running
sbctl create-keys
prior to installation, then applying the initial configuration with lanzaboote enabled right away?Thanks!
You can create your own ISO with your keys in it and a signed kernel. Then, you would only need to import the keys into the machine and copy the keys from the ISO to the installation.
Hey, thanks for your answer.
I didn't mean that I wanted secure boot to be enabled prior to installation. I meant that the guide seems to express that applying a configuration that has lanzaboote enabled instead of systemd boot during initial
nixos-install
wouldn't work, and I was wondering why creating keys in/mnt/etc/secureboot
prior to installation wouldn't work (or if it would, why the guide seems to suggest otherwise).Thanks!
I think this is a misunderstanding of the guide, as I'm pretty sure I installed lanzaboote directly. As the module just replaces systemd-boot, in theory if it has everything in place it should work.
Hi there,
sbctl create-keys
is frowned upon in activation because this is a side effect that creates private keys and private key creation in an activation script is a bit icky.Nonetheless, as long as you copied the keys from another location, you can immediately use lanzaboote on the first nixos-install. Lanzaboote will not enforce Secure Boot if Secure Boot is disabled, as soon as you enroll the keys, Secure Boot will be enabled and your bootables will be signed according to the right keys, so it should work out fine in the end.
The guide is a bit conservative to avoid bad experiences, but it could indeed benefit from some clarification.
This is the whole point of #384. This subject is kinda controversial with the maintainers/developers of the repository as seen in the comments of the PR.
As far as I'm concerned I'm fine with needing to run one or two extra commands as part of my install. That is already scripted anyway for all partitioning, encryption, git clone, hardware config generation, etc.
So I don't mind that it doesn't run
sbctl create-keys
, I can just add that to my script. I'm mostly just scared that it's specified that I should apply a different config with systemd-boot instead before first boot, do the install, and only then apply with lanzaboote enabled, and that seemed annoying because it means I need to apply an intermediate config during install, so I was wondering if perhaps there's something in the nixos install script that applies systemd-uboot-specific configs upon install when enabled, and that wouldn't work with lanzaboote or something along those lines.At this point I'm rather reassured by https://github.com/nix-community/lanzaboote/issues/397#issuecomment-2423698765 but I haven't tested it yet.
I can assure you it works. I already did that.
Thanks! Then this issue only tracks documentation update that this works I guess.
I did
sudo sbctl create-keys -e /mnt/var/lib/sbctl --disable-landlock
but
sudo nixos-install -v --flake /mnt/etc/nixos#nook
fails with:which localizes the issue to this call:
2e425f3da6/rust/tool/systemd/src/install.rs (L267)
which sounds like
<lanzaboote_binary> install --public_key <something that doesn't exist>
was called.Ok, so it turns out:
pkiBundle = "/etc/secureboot";
(should be"/var/lib/sbctl"
by new standard)create-keys -e /mnt/var/lib/sbctl/keys
(note the/keys
on the end) as per2e425f3da6/nix/modules/lanzaboote.nix (L44-L56)
Hope this helps someone.
Funnily enough after everything worked out I didn't get a boot entry added to the EFI flash so I can't actually try booting yet, but I have to go to bed now.