Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: provide an option to enforce SecureBoot for TPM enrollment #9005

Merged
merged 1 commit into from
Jul 12, 2024

Conversation

smira
Copy link
Member

@smira smira commented Jul 11, 2024

Fixes #8995

There is no security impact, as the actual SecureBoot state/configuration is measured into the PCR 7 and the disk encryption key unsealing is tied to this value.

This is more to provide a way to avoid accidentally encrypting to the TPM while SecureBoot is not enabled.

}

if efi.GetSetupMode() {
return nil, nil, fmt.Errorf("failed to enroll the TPM2 key, as the system is in setup mode")
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

i'm confused on the error message

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

SecureBoot enabled, but setup mode is enabled?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

ahh now makes sense, since this has nothing to do with tpm2 enrollment, we could say not continuing due to secureboot enforcement check

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

yes, thanks, I will update the message as well

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

updated now

Fixes siderolabs#8995

There is no security impact, as the actual SecureBoot
state/configuration is measured into the PCR 7 and the disk encryption
key unsealing is tied to this value.

This is more to provide a way to avoid accidentally encrypting to the
TPM while SecureBoot is not enabled.

Signed-off-by: Andrey Smirnov <andrey.smirnov@siderolabs.com>
@smira
Copy link
Member Author

smira commented Jul 12, 2024

/m

@talos-bot talos-bot merged commit cf5effa into siderolabs:main Jul 12, 2024
49 checks passed
smira added a commit to smira/talos that referenced this pull request Jul 17, 2024
Follow up for siderolabs#9005

Signed-off-by: Andrey Smirnov <andrey.smirnov@siderolabs.com>
smira added a commit to smira/talos that referenced this pull request Jul 17, 2024
Follow up for siderolabs#9005

Signed-off-by: Andrey Smirnov <andrey.smirnov@siderolabs.com>
@smira smira mentioned this pull request Aug 5, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
Status: Backported
Status: Backported
Development

Successfully merging this pull request may close these issues.

TPM Encryption does not fail if secureboot is not enabled
3 participants