Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[DOCUMENTATION NEEDED] [REVIEW NEEDED] feat: implement tpm sealed sshd host keys #89

Closed
wants to merge 5 commits into from

Conversation

slonkazoid
Copy link

this allows one to verify cryptographically that the initramfs has NOT been modified, and prevents attackers from doing a MITM attack or inserting a keylogger into the initramfs. the key can not be read without booting the machine, and if you modify the initramfs, the key wont be released.

this implementation is somewhat sloppy, as i just need it for my desktop and server right now. even though it passes the tests, please review thoroughly before merging.

@gsauthof
Copy link
Owner

gsauthof commented Jan 5, 2025

Hm, I don't have any experience with tpm and the sealing of files, thus, I can't review it right now.

Is this something that could live orthogonal to dracut-sshd in a separate dracut module?

@slonkazoid
Copy link
Author

slonkazoid commented Jan 5, 2025 via email

@slonkazoid
Copy link
Author

slonkazoid commented Jan 5, 2025

also, you probably want Wants=network.target in sshd.service @gsauthof

edit: this doesnt work

@slonkazoid
Copy link
Author

alright, i got it working in a separate module, and published it on my forgejo. thank you!

@slonkazoid slonkazoid closed this Jan 5, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants