-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
unlock passphrase doesn't work with Qubes kernel 6.6.2 #30
Comments
Nitrokey disables TPM Disk unlock key in their board configurations as can be seen https://github.com/Nitrokey/heads/blob/nitropad-release-v2.2/boards%2Fnitropad-nv41%2Fnitropad-nv41.config#L50 |
Hmm... that's odd because I managed to get it set up with |
Testing this as part of PR linuxboot#1541 Works on default install of Q4.2 RC5 on x230-maximized. |
If it works over NK 2.2, its a bug :) |
Ok so @duncancmt you are right, something is wrong with newer kernel/initrd (failing 6.6.2 vs working 6.5.10) First, journactl logs from dom0: TPM_DUK_fail_6.6.2-1.log
@marmarek: Any idea? |
Discussion will continue from this comment linuxboot#1545 (comment) on. (NOT HERE) |
Note that upstream issue has been opened at QubesOS/qubes-issues#8763 |
Fixed. See details QubesOS/qubes-issues#8763 and associated https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-098-2023.txt @daringer you can close. |
This is copied over from linuxboot#1545
Please identify some basic details to help process the report
A. Provide Hardware Details
1. What board are you using (see list of boards here)?
Novacustom NV41 (Nitrokey branded)
2. Does your computer have a dGPU or is it iGPU-only?
3. Who installed Heads on this computer?
4. What PGP key is being used?
5. Are you using the PGP key to provide HOTP verification?
B. Identify how the board was flashed
I deleted this section because I purchased this machine from Nitrokey
C. Identify the rom related to this bug report
1. Did you download or build the rom at issue in this bug report?
2. If you downloaded your rom, where did you get it from?
Please provide the release number or otherwise identify the rom downloaded
Nitrokey heads v2.2
3. If you built your rom, which repository:branch did you use?
4. What version of coreboot did you use in building?
5. In building the rom where did you get the blobs?
Please describe the problem
Describe the bug
I did a dom0 update in Qubes and now the disk unlock passphrase doesn't work anymore. Kernel 6.5.8 works fine, but kernel 6.6.2 won't boot with the unlock passphrase, only the recovery passphrase. I presume something changed with dracut or the kernel boot process preventing concatenated cpios from overriding each other, but I have no idea how I would begin to go about debugging that.
To Reproduce
Steps to reproduce the behavior:
/etc/crypttab
has not been patched and that/secret.key
is missingExpected behavior
Booting Qubes with the disk unlock passphrase does not prompt for the recovery passphrase. Also I would expect
/etc/crypttab
to be patched and/secret.key
to be present in the initramfs if/when it drops into the OS recovery shell.I apologize in advance if this should've gone in the Qubes forum.
The text was updated successfully, but these errors were encountered: