No description
Find a file
Fabian Hauser e9cb17e6e9
All checks were successful
CI / build (push) Successful in 6m59s
Add virtiofsd for libvirt folder passthrough
2025-04-01 14:47:32 +03:00
.github/workflows Enable more formatters 2025-03-03 23:50:23 +02:00
.zed Add zed task for switchingthe system config 2025-03-07 15:08:08 +02:00
home-configurations Add initial legacy configuration 2025-02-22 20:40:24 +02:00
home-modules Temporarly remove davinci-resolve 2025-03-20 22:12:31 +02:00
nixos-configurations Add anki 2025-03-04 14:27:25 +02:00
nixos-modules Add virtiofsd for libvirt folder passthrough 2025-04-01 14:47:32 +03:00
packages/dotfiles-enroll-tpm Add documentation and script for secure boot 2025-03-07 15:06:46 +02:00
private@f2b5747476 Add initial legacy configuration 2025-02-22 20:40:24 +02:00
.envrc Add initial legacy configuration 2025-02-22 20:40:24 +02:00
.gitignore Add pre-commit fmt hook 2025-03-04 14:40:29 +02:00
.gitmodules Update private submodule url 2025-03-03 21:21:46 +02:00
flake.lock chore(deps): lock file maintenance 2025-03-28 16:00:12 +01:00
flake.nix Add documentation and script for secure boot 2025-03-07 15:06:46 +02:00
README.md Update README to hint at all installation steps more properly 2025-03-20 23:36:37 +02:00
renovate.json Enable more formatters 2025-03-03 23:50:23 +02:00

Fabian's Dotfiles

System Setup

🐈‍⬛ This is how the process should be, not how it has been done... yet 😉

  1. systemctl reboot --firmware-setup: Activate enrollment of new Secure Boot key in the UEFI
  2. Boot into NixOS Live system
  3. TODOs at this point:
    • sops secrets encryption stuff.
    • LUKS HDD encryption with sops stuff
    • sudo sbctl create-keys with sops stuff.
    • See qo.is docs for inspiration
    • Configure attic cache substitution in nixos installer
  4. nixos-anywhere --copy-host-keys --build-on-remote \
      --generate-hardware-config nixos-facter ./nixos-configurations/$REMOTE_HOST/facter.json
      --extra-files ... \
      --chown ... \
      --disk-encryption-keys ... \
      --flake .#$REMOTE_HOSTNAME
      root@$REMOTE_IP
    
    • TODO:
      • with the secrets from above
      • don't do nixos-anywhere phase reboot (secure boot keys not enrolled yet)
  5. sudo sbctl enroll-keys --microsoft: Enroll our keys in UEFI
    • Keeps microsoft keys - some vendor firmware and Windows dual boot require this.
  6. sudo sbctl verify: Verify Secure Boot signatures.
    • /boot/EFI/nixos/kernel*.efi is not supposed to be signed.
  7. systemctl reboot: Boot into your new, signed system.
  8. bootctl status: Verify that a secure boot worked.
    • If not, activate secure boot and try again: systemctl reboot --firmware-setup
  9. dotfiles-enroll-tpm: Enroll the boot PCR measurement based LUKS unlock:

Secure Boot & TPM Disk Unlock

See lanzaboote documentation for more information on how to enable secure boot.

  • With nixos-rebuild {switch|boot}, new EFI files will be automatically signed.
  • In case your firmware or boot process changes, you need to insert the luks password manually.
    • This should not happen just because of kernel updates (but might with boot param changes.)
    • After a successful boot, you can re-enroll the new secure state with dotfiles-enroll-tpm.