Skip to content

Commit

Permalink
Update Upgrading.md : signing, zip file upgrade etc
Browse files Browse the repository at this point in the history
Add some corrective notes on secrets needed when reowning states.

Add notes on 
- zip download availability after which commit
- automatic renewal of TPM DUK upon resealing of TOTP/HOTP secret, guiding the user into doing it in prior of booting in previously boot option: signing, sealing DUK and rebooting.
  • Loading branch information
tlaurion authored Nov 30, 2023
1 parent 3ff8bf5 commit cffdc0d
Showing 1 changed file with 10 additions and 5 deletions.
15 changes: 10 additions & 5 deletions Installing-and-Configuring/Upgrading.md
Original file line number Diff line number Diff line change
Expand Up @@ -163,13 +163,18 @@ Reboot and verify that the new firmware is running. Don't be scared if you have
- If you migrated from Legacy to Maximized builds (no migration of settings), you will
be prompted on next reboot by the same prompts following an initial flash. That is:
- To inject your public key or do OEM Factory Reset/Re-Ownership
- The Factory Reset/Re-Ownership option will guide you into re-owning all security components
including resetting USB Security dongle, injecting public key in ROM and signing /boot.
- Then on next reboot, you will be prompted to generate new TOTP/HOTP token. Normal, since none
of the previous measurements are valid anymore (GPG Admin PIN and TPM Ownership passphrase required)
- Injecting the public key will reflash the firmware with your public key fused in.
- The Factory Reset/Re-Ownership option will guide you into re-owning all security components including resetting USB Security dongle, injecting public key in ROM and signing /boot.
- Then on next reboot, you will be prompted to generate new TOTP/HOTP token/Reset TPM. Normal, since none of the previous measurements are valid anymore (GPG Admin PIN and TPM Ownership passphrase required)
- Reset TPM if you ever get TPM counter increments errors (new TPM Owner passphrase will be requested.)
- Choose HOTP/TOTP otherwise (TPM Owner password will be prompted in TPM2 case + GPG Admin PIN in case of HOTP board)
- Sign /boot content (GPG User PIN required)
- Select a new boot default through Boot Options (GPG User PIN required to sign the new default)
- Optionally set a TPM Disk Unlock Key (Disk Recovery Key passphrase and GPG User PIN required)

- If you upgraded your firmware by choosing the retain settings options for a same board configuration
- The same steps above will be required, outside of the public key injection/Re-Ownership.


Notes:
- Since commit https://github.com/linuxboot/heads/commit/6873df60c1c965ac812a49d9d245f338d8a3b128 : users using Heads with that commit or more recent as current firmware can upgrade with zip files. Those automatically verify rom integrity and if valid continue with flashing the rom contained in the zip file.
- Since commit https://github.com/linuxboot/heads/commit/133da0e48e2996674f60f186c520cfad0d4848d0: users having a TPM Disk Unlock Key (DUK) defined previously will be guided to reseal a new passphrase when resealing TOTP/HOTP and to needed magic automatically. Enjoy.

0 comments on commit cffdc0d

Please sign in to comment.