Re: [qubes-devel] Encrypted /boot using GRUB LUKS module (workaround for anti-evil maid tpm 1.2 limitation)

2020-01-20 Thread Ralph Alexander Bariz
PS: a few thought to evila maid protection well, if you think thats a good idea... I'd probably take it as a nice side project having following acceptance criterias: * systems kernel is located on encrypted partition, decrypted either by grub luks module or by a preload kernel which then boots

[qubes-devel] sys-usb and usb hid devices

2020-01-20 Thread Ralph Alexander Bariz
Hi, When setting up sys-usb and still using usb hid devices, I noted: * setting gets written to xen.cfg on efi partition... right? isn't this an invitation for an easy to do evil maid attack combined with a compromised usb device? If at least it would be part of initramfs so it is not that

Re: [qubes-devel] Encrypted /boot using GRUB LUKS module (workaround for anti-evil maid tpm 1.2 limitation)

2020-01-20 Thread Ralph Alexander Bariz
Hi, After reflecting about my needs and your answer I did it that way. Well almost. Since I want to have sys-usb vm I had to bend efi partition beeing an image file located in root. (Installed with efi on USB, after installation before restart switching to console, dding the efi partition to