-
-
Notifications
You must be signed in to change notification settings - Fork 185
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Deploy cryptsetup-reencrypt in Heads to permit QubesOS image deployment in organization #463
Comments
To make cryptsetup-reencrypt available in heads:
|
Reencrypting possible after wiping out slot 1 used by TPMTOTP released key ( |
|
Result report:
|
|
Was this resolved by merging #464 or is there more to be done? |
#475 a whiptail menu permitting to reencrypt drive is still missing. |
Included in #511 |
fixed in #551 |
Technical specifics discussion here and here for rationale discussion which led to this.
Resumé:
QubesOS, Heads and Purism tried to collaborate to easily deploy QubesOS on trustworthy hardware. To do so, Purism and QubesOS created an OEM install disk that delayed OS installation after the user encrypted his disk.
The approach didn't take off, and from what I understand, that OEM install approach got dropped. @marmarek suggested that cryptsetup-reencrypt could be used but that approach was not really considered. Heads could reencrypt OEM/organization's installation offline. I'm testing that approach.
@kakaroto @kylerankin : Could you document what didn't take off with the OEM disk approach?
The text was updated successfully, but these errors were encountered: