lanzaboote/docs/QUICK_START.md

237 lines
7.4 KiB
Markdown
Raw Normal View History

2023-01-08 08:11:16 -06:00
# Quick Start: NixOS Secure Boot
2023-01-08 08:11:16 -06:00
This document attempts to guide users into setting up UEFI Secure Boot
for their NixOS system using a custom key chain. The audience are
experienced NixOS users.
2023-01-08 08:11:16 -06:00
This guide has been tested on a Lenovo Thinkpad and is expected to
work on other Thinkpads without change. On other systems, certain
steps may be different.
2023-01-08 08:11:16 -06:00
## ⚠ Disclaimers ⚠
2023-01-08 08:11:16 -06:00
Secure Boot for NixOS is still in development and has some sharp
edges. There may be cases where you end up with a system that does not
boot.
2023-01-08 08:11:16 -06:00
**We only recommend this to NixOS users that are comfortable using
recovery tools to restore their system or have a backup ready.**
2023-01-08 08:11:16 -06:00
## Requirements
2023-01-08 08:11:16 -06:00
To be able to setup Secure Boot on your device, NixOS needs to be
installed in UEFI mode and
[`systemd-boot`](https://www.freedesktop.org/wiki/Software/systemd/systemd-boot/)
must be used as a boot loader.
2023-01-08 08:11:16 -06:00
These prerequisites can be checked via `bootctl status`:
2023-01-08 08:11:16 -06:00
```console
$ bootctl status
System:
Firmware: UEFI 2.70 (Lenovo 0.4720)
Secure Boot: disabled (disabled)
TPM2 Support: yes
Boot into FW: supported
Current Boot Loader:
Product: systemd-boot 251.7
...
```
2023-01-08 08:11:16 -06:00
In the `bootctl` output, the firmware needs to be `UEFI` and the
current boot loader needs to be `systemd-boot`. If this is the case,
you are all set to continue.
2023-01-08 08:11:16 -06:00
## Part 1: Preparing Your System
2023-01-08 08:11:16 -06:00
In the first part, we will prepare everything on the software side of
things. At the end of this part, you will have your own Secure Boot
keys and a NixOS that has signed boot binaries.
2023-01-08 08:11:16 -06:00
### Finding the UEFI System Partition (ESP)
2023-01-08 08:11:16 -06:00
The UEFI boot process revolves around a special partition on the
disk. This partition is called _ESP_, the (U)EFI System
Partition. This partition is by convention mounted at `/boot` on NixOS
and the rest of this document assumes this.
2023-01-08 08:11:16 -06:00
You can verify that `/boot` is the ESP by looking for `ESP:` in
`bootctl status` output.
2023-01-08 08:11:16 -06:00
### Creating Your Keys
2023-01-08 08:11:16 -06:00
To create Secure Boot keys, we use `sbctl`, a popular Secure Boot Key
Manager. `sbctl` is available in
[Nixpkgs](https://github.com/NixOS/nixpkgs) as `pkgs.sbctl`.
2023-01-08 08:11:16 -06:00
Once you have installed sbctl (or entered a Nix shell), creating your
Secure Boot keys requires this command:
```console
2023-01-08 08:11:16 -06:00
$ sudo sbctl create-keys
[sudo] password for julian:
Created Owner UUID 8ec4b2c3-dc7f-4362-b9a3-0cc17e5a34cd
Creating secure boot keys...✓
Secure boot keys created!
```
2023-01-08 08:11:16 -06:00
This takes a couple of seconds. When it is done, your Secure Boot keys
are located in `/etc/secureboot`. `sbctl` sets the permissions of the
secret key so that only root can read it.
2023-01-08 08:11:16 -06:00
### Switching to bootspec
2023-01-19 13:36:23 -06:00
`lzbt` currently doesn't handle
2023-01-08 08:11:16 -06:00
non-[bootspec](https://github.com/grahamc/rfcs/blob/bootspec/rfcs/0125-bootspec.md)
generations well
([#55](https://github.com/nix-community/lanzaboote/issues/55)). As
such, we need to switch to bootspec and get rid of all previous
generations before we can continue.
2023-01-08 08:11:16 -06:00
Bootspec is currently available as preview in nixpkgs unstable. To
enable bootspec, set `boot.bootspec.enable = true;` in your system
configuration, rebuild and reboot.
2023-01-08 08:11:16 -06:00
When everything is working, you can garbage collect your old
non-bootspec generations: `nix-collect-garbage -d`.
2023-01-08 08:11:16 -06:00
🔪 **Sharp edge:** 🔪 This will leave old boot entries lying around in
the ESP. `systemd-boot` will display these during boot. This can be
confusing during boot. **After you made a backup of your ESP**, you
may delete these entries in `/boot/loader/entries`.
2023-01-08 08:11:16 -06:00
### Configuring NixOS (with Flakes)
2023-01-08 08:11:16 -06:00
Below is a fragment of a NixOS configuration that enables the Secure
Boot stack.
2023-01-08 08:11:16 -06:00
```nix
nixosConfigurations = {
yourHost = nixpkgs.lib.nixosSystem {
system = "x86_64-linux";
2023-01-08 08:11:16 -06:00
modules = [
# ... other modules ...
2023-01-08 08:11:16 -06:00
lanzaboote.nixosModules.lanzaboote
2023-01-08 08:11:16 -06:00
({ config, pkgs, lib, ... }: {
# This should already be here from switching to bootspec earlier.
# It's not required anymore, but also doesn't do any harm.
boot.bootspec.enable = true;
2023-01-08 08:11:16 -06:00
environment.systemPackages = [
# For debugging and troubleshooting Secure Boot.
pkgs.sbctl
];
2023-01-21 03:27:34 -06:00
# Lanzaboote currently replaces the systemd-boot module.
2023-01-08 08:11:16 -06:00
# This setting is usually set to true in configuration.nix
# generated at installation time. So we force it to false
# for now.
boot.loader.systemd-boot.enable = lib.mkForce false;
2023-01-08 08:11:16 -06:00
boot.lanzaboote = {
enable = true;
pkiBundle = "/etc/secureboot";
};
})
];
};
```
2023-01-08 08:11:16 -06:00
After you rebuild your system, check `sbctl verify` output:
```console
$ sudo sbctl verify
Verifying file database and EFI images in /boot...
✓ /boot/EFI/BOOT/BOOTX64.EFI is signed
✓ /boot/EFI/Linux/nixos-generation-355.efi is signed
✓ /boot/EFI/Linux/nixos-generation-356.efi is signed
✓ /boot/EFI/nixos/0n01vj3mq06pc31i2yhxndvhv4kwl2vp-linux-6.1.3-bzImage.efi is signed
✓ /boot/EFI/systemd/systemd-bootx64.efi is signed
```
2023-01-08 08:11:16 -06:00
🔪 **Sharp edge:** 🔪 In case something is **not** signed in the
`sbctl verify` output, you have hit a bug
([#39](https://github.com/nix-community/lanzaboote/issues/39)). You
**have to fix this** to avoid ending up with an unbootable system
([#58](https://github.com/nix-community/lanzaboote/issues/58)). The
way to solve this is **deleting** the unsigned files indicated by
`sbctl` and switching to the configuration again. This will copy and
sign the missing files.
## Part 2: Enabling Secure Boot
Now that NixOS is ready for Secure Boot, we will setup the
firmware. At the end of this section, Secure Boot will be enabled on
your system and your firmware will only boot binaries that are signed
with your keys.
These instructions are specific to Thinkpads and may need to be
adapted on other systems.
### Entering Secure Boot Setup Mode
2023-01-08 08:11:16 -06:00
The UEFI firmware allows enrolling Secure Boot keys when it is in
_Setup Mode_.
2023-01-08 08:11:16 -06:00
On a Thinkpad enter the BIOS menu using the "Reboot into Firmware"
entry in the systemd-boot boot menu. Once you are in the BIOS menu:
1. Select the "Security" tab.
2. Select the "Secure Boot" entry.
3. Set "Secure Boot" to enabled.
4. Select "Reset to Setup Mode".
5. Select "Clear All Secure Boot Keys".
When you are done, press F10 to save and exit.
You can see these steps as a video [here](https://www.youtube.com/watch?v=aLuCAh7UzzQ).
### Enrolling Keys
Once you've booted your system into NixOS again, you have to enroll
your keys to activate Secure Boot. We include Microsoft keys here to
avoid boot issues.
```console
$ sudo sbctl enroll-keys --microsoft
Enrolling keys to EFI variables...
With vendor keys from microsoft...✓
Enrolled keys to the EFI variables!
```
2023-01-08 08:11:16 -06:00
You can now reboot your system. After you've booted, Secure Boot is
activated:
```console
$ bootctl status
System:
Firmware: UEFI 2.70 (Lenovo 0.4720)
Firmware Arch: x64
Secure Boot: enabled (user)
TPM2 Support: yes
Boot into FW: supported
```
2023-01-08 08:11:16 -06:00
That's all! 🥳
## Disabling Secure Boot and Lanzaboote
When you want to get back to a system without the Secure Boot stack,
**first** disable Secure Boot in your firmware settings. Then you can
disable the Lanzaboote related settings in the NixOS configuration and
rebuild.
2023-01-08 08:11:16 -06:00
You may need to clean up the `EFI/Linux` directory in the ESP manually
to get rid of stale boot entries. **Please backup your ESP, before you
delete any files** in case something goes wrong.
2023-01-08 08:11:16 -06:00
## Alternatives
2023-01-08 08:11:16 -06:00
The [ArchLinux wiki](https://wiki.archlinux.org/title/Unified_Extensible_Firmware_Interface/Secure_Boot)
contains alternatives to handling your keys, in case `sbctl` is not
flexible enough.