I need a bit of a refresher. I am trying to remember how I acquired the armory-boot.sec to begin with.
I set my into mxs_dcp: Trusted State detected a couple of years ago.
I remember following all the steps in secure boot to create the hab keys. I burned the fuses.
I updated my linux distro a couple of days ago and all I needed to do was run
signify -S -s ~/hab_keys/armory-boot.sec -m armory-boot.conf -x armory-boot.conf.sig
it asks for the .sec file's password and done.
Made sure the sha256 match, and everything is working hondy dorrie.
I have all this stuff backed up just in case. So at this point its all routine.
If I were to lose the .sec file (but still have the hab files) how could create a new one?
Also, is this the proper way to secure the system. I have a mild feeling that I'm not doing this properly. Is the password asked by signify the same used during the creation of the hab keys?
Do I not need to sign the linux image itself for it to be "accepted"?
Signing the .conf is essentially just saying 'ok if the hash in here matches the images hash, we're good to go'
So all the trust falls on the .conf and its corresponding .sig?
Btw I absolutely love this tiny beast. Are there any plans for an upgraded unit in the future?
Thanks so much for all your hard work,
nsk