-
-
Notifications
You must be signed in to change notification settings - Fork 191
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
gpg: no default secret key: No public key (Yubikey 4 nano) #641
Comments
@kamilr Can you give your board configuration? If using a Yubikey, your board config should not state USB security dongles supporting visual attestations are currently: Nitrokey Pro, Nitrokey Storage and Librem Key. Yubikey permits GPG signing of boot configurations, while firmware integrity attestation fully relies on TPM and OTP. If you do not get any HOTP warnings or prompts asking you to enter your Librem Key, then none of the above concerns you. From the above I see that you resolved that part of the problem:
Now: gpg doesn't show any directly known private key, since your public key is bound to your USB security dongle private key, secured inside of your USB security dongle. Let me know if that helps. |
Thank You @tlaurion for Your response.
value. Maybe I need to include this with "n" value or delete: Do I really need to make a custom board configuration? I have Yubikey 4 nano. Am I able to use HOTP functionality in HEADS with it? |
With a Yubikey, you won't have HOTP functionality (visual attestation only for supporting technology models, see above post). @kamilr : So you say 2-Try something simple from the recovery console (
That should pick your default key and detach sign /boot/test with your private key inside of your Yubikey 4 nano. Then cleanup:
|
I bought Yubikey, because it was only pointed in installation guide. On the other hand found that 4th gen has OATH HOTP verification with led light as a "visual attestation". Sad to hear that will not work, I need to change my hardware key. Is it possible to work with HEADS without HOTP and not using "unsafe" mode of loading the kernel/boot partition?
Ad. 1) Only one public key and assosiated A and E, as above. Ad. 2.1) Prints correct information about USB security dongle with Signature, Encryption and Authetication key. |
What Heads settings you used? (Sorry I don't use Heads upstreamed code.) |
@kamilr Please note fingerprint generated and validate that it is there with the l menu option. |
So the scenario was: Options --> GPG Options --> Generate GPG keys manually on a USB security token. However, my Heads is based on the last commit from current master branch with ID 8af849c. |
@kamilr : please get a clean checkout and build again and post screen captures of the observed problem with the exact commands proposed above and their output. If the issue is resolved, please close accordingly. |
@kamilr Please reopen if not fixed upstream |
I am newbie with this Heads. I really try to follow all installation instructions, but I stuck on running Qubes 4.0.1 on X230T. I have a problem like:
What I did was:
shows keys, but
prints nothing.
7) TOTP after clock synchronization works as expected, but using Yubikey from start prints N/A state after some logs of loading kbx and gpg from CBFS and setting new values.
8) Use menu to boot from usb -> install Qubes 4.0.1, with success.
9) After reboot configuration of default boot menu failed. Also typing "m","u" during booting Heads does not work.
10) I can get into Qubes only via unsafe mode.
11) When I try to sign /boot partition with Yubikey inserted the cited problem from begging of this post occurs 3 times.
What Can I do, to have normal system default boot menu with signed /boot partition? What I missed? After all I can help to upgrade installation instructions, but now I am lost. Many thanks for any help.
Regards
The text was updated successfully, but these errors were encountered: