-
Notifications
You must be signed in to change notification settings - Fork 10
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add option to do a secrets apps reset for the nk3 similar to: nitropy nk3 secret reset #42
Comments
This leads to a additional commandline argument:
This will:
|
End user reported issue liked to this just now https://matrix.to/#/!RNcjJXCGHiyxXCHpKv:matrix.org/$suNZxaOPK-1hUSNccluJABlNvEZTIPt_S1V2orNJsbw?via=matrix.org&via=nitro.chat&via=tchncs.de |
Ideally, Otherwise as can be seen under linuxboot/heads@07f3710, it requires an additional step which would be PIN change, but we don't have a PIN here, since we just reset :) I still think, as said under #36 (comment) that changing PIN is not really important to Heads use case since we reset. What is important is setting a secret app PIN at moment of oem factory reset/re-ownership. Need:
|
ok, so now that things are implemented you bring up the idea to change the requirements ? there should be a new command:
This will:
Further we will drop the implementation and requirement described in this issue ? Please close this issue, if it is not needed anymore it was created due to your request(s). |
This comment was marked as off-topic.
This comment was marked as off-topic.
is my previous description of the feature you requested as you would like to have it? |
@sosthene-nitrokey already acknowledged at #46 (comment) PR are for implementation details. Requirements are: don't break nk2 compatibility, dint cause regression, don't reinvent the wheel. Otherwise open issues/PR with your technology consumers (under heads) for anything nk3 changes/changed/plans to change so we work things together. Q: change a pin that is not set by default per reset? Hmm. Don't reinvent the wheel. Don't break things. Don't add Non-existing PIN, don't set PIN silently on first use with user input. Don't discard PIN provided by user and rely solely on physical attestation to break remote attestation promises. If unsure, ask. Make things right. Thank you. I'm nicer when I'm not on a deadline. When broken things fall into my pile and I ask for more then 8 months prior of answer after a deadline, I bite. You would too, it's just that you are the producer here, not the consumer. Play the mind game of reverse roles and check how that must feel. Don't reiterate. |
Why silently fail? why not only work for nk3? Anyway, PoC under https://github.com/linuxboot/heads/pull/1850/files#diff-bec315d56e315e18809e58210db23903cfa07559d297a1910f2c3151f6e6e97dR141-R149 only applying to nk3. But yes, @daringer. This would make it compliant to nk3 with GPG Admin PIN being set prior of use under Heads use case, not silently setting it on first use with typo as of today... Are we clear now? |
I would love to read a clear "yes" or "no", if I am asking a closed (yes/no) question. |
@daringer : reset should put a default pin, as gpg Admin PIN did per gpg. That would be 12345678. As per prior of nk3. This pin should be Secure App PIN, not have a non existing admin/user PIN to not mislead users, UX, and flood support requests because non-sensical and.. not existing. The clear yes that you are asking is: We code but don't think here. I can only repeat myself. This is tiring.
TLDR : yes... Last time: #39 (comment)
|
See #41 for more detail
this should work with user presence (as the nitropy version) so no nk3 firmware change is need.
bigger discussion ticket regarding this is #36
The text was updated successfully, but these errors were encountered: