I am working on getting anti-evil-maid with a separate usb stick setup. While I am sure the guide makes perfect sense to an admin, for a new user, it is a bit daunting. Using a lenovo t420 (it was only laptop on list with 100% support listed for everything qubes uses right now - vt-x, vt-d, tpm, bios support, etc) -- hope it was a good qubes buying decision.
For instance: 2) Install and Verify TPM support under your OS/Dom0. No explanation is given on 'HOW' to do this, google has not been my friend.
1) Enable TPM in BIOS.
2) Install and Verify TPM support under your OS/Dom0.
a) Install anti-evil-maid packages (in Dom0 on Qubes). It will install all the required dependencies and tools.
b) Start the TrouSerS daemon (this should also load tpm driver into kernel):
# /etc/init.d/tcsd start
... or (in case of systems that use systemd):
# systemctl start tcsd
$ sudo qubes-dom0-update anti-evil-maid
b) Enable and start the TrouSerS daemon (this should also load tpm driver into kernel):
$ sudo systemctl enable tcsd
$ sudo systemctl start tcsd
c) Verify the kernel support for TPM: # find /sys/devices -name pcrs # cat <path_to_pcrs> well at least this is good news, I get the output expected You should have installed the following packages to perform the setup: - anti-evil-maid-dracut - anti-evil-maid I'm guessing that happened when I installed anti-evil-maid into Dom0 above?
b) Find a USB stick, create a boot partition, set bootable flag, don't format with any fs. Use fdisk or parted. NOTE: when using a GPT partition table (rather than msdos), then you should create an additional BIOS boot partition, where the rest of the GRUB code will be kept -- please see this page for more info: http://www.gnu.org/software/grub/manual/html_node/BIOS-installation.html Wow, where to even begin..... this is really hard to grasp the first time. Having used google for this, I get the impression that I should be using GPT instead of msdos. --really want to follow best practice
However, finding a guide for a new user to follow has been another challenge. At the moment I am completely lost. I don't see a need to continue past this for this email as I am stuck. *Are there any 'newbie friendly' docs/vids on setting up anti-evil-maid for new users that anyone can suggest - a full anti-evil-maid install video tutorial would be amazing if it exists thanks everyone.
On Fri, Dec 5, 2014 at 11:31 PM, cprise <cpr...@gmail.com> wrote:On 12/05/14 16:39, gaffne...@gmail.com wrote: I am working on getting anti-evil-maid with a separate usb stick setup. While I am sure the guide makes perfect sense to an admin, for a new user, it is a bit daunting. Using a lenovo t420 (it was only laptop on list with 100% support listed for everything qubes uses right now - vt-x, vt-d, tpm, bios support, etc) -- hope it was a good qubes buying decision. Hi gaffney, Its probably a good deal since no doubt you are buying it used. However, consulting with the mailing list first would have been a good idea because TPM is one area where the HCL seems inaccurate. The HCL script hasn't been testing for a TPM so that info wasn't making it into the HCL in many cases. I also noticed this is the case for my T430s (TPM works fine but no note in the HCL).https://groups.google.com/forum/#!msg/qubes-users/452tkVCzvOw/_dQ8DXaDzp0J * AEM still suffers from the tboot-induced memory allocation problem. Is this still a problem? Is this a common problem on all AEM installations?
I don't know if TPM compatibility is something that a program can easily test.Maybe we can provide the needed packages by default, to probe with the TrouSerS daemon and fetch and analyze the logs with qubes-hcl-script? TrouSerS ERROR: Could not find a device to open! and the appropriate log message, when a TPM device is found.
systemctl start tcsd
sleep 5
tpm_version | grep "Communication failure"
tpm_selftest >>HCL_report
[...]
Is there the possibility, to hold the /boot during normal operation inside the encrypted file system and provision USB-Sticks and the unencrypted boot-partition from there? Can the /boot from USB-Stick or boot-partition be unmounted, without problems, so that the underlying /boot appears? During initialization: /boot@/dev/sda1 or partition on USB-Stick After qubes_dom0-root has been decrypted: /boot@qubes_dom0-root So all update operations are performed inside the encrypted volume, and several boot-media can be created from there. After an update process the provisioning for the boot-devices is started, and asks for inserting boot-media and mounts the defined partitions (/dev/disk/by-) to a tmp location and updates the boot-partitions. #/etc/aem.conf /dev/sda1 /tmp/boot0 mbr noaem /dev/disk/by-label/aemboot /tmp/boot1 mbr aem /dev/disk/by-partlabel/usbstick1 /tmp/boot2 gpt aem Best Regards. Hakisho Nukama