Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Created installation script for secure (?) installation on Kubuntu #34

Open
bast1aan opened this issue May 5, 2024 · 0 comments
Open

Comments

@bast1aan
Copy link

bast1aan commented May 5, 2024

Hi!

Thank you for this great tool!
FYI, to help people around me to deploy and use this tool, and add some of my strong opinions on how the TPM and key signing in Linux should be safe, I created following script to install your tool:
bast1aan/scripts@fbbe14f

This summarizes as:

  • install tpm-fido on the system as a GUID binary on the group _tpmfido and only executable by members of the tpmfido group.
  • let only _tpmfido have extra access to the /dev/uhid and /dev/tpmrm* devices by means of ACLs in udev rules. This makes that only the tpm-fido binary has access to those devices, and not the entire user that could somehow hypothetically circumvent the pinentry consent by executing another altered binary.
  • also add a small GUI widget that shows as long as tpm-fido is running. This works better when having multiple users running on the same device (in my case, a private and a corporate user), because without it happens easily that a pinentry popups on the wrong user.
  • When I tested this install script on a clean default Kubuntu 24.04 install, it turns out that Snap prevents the tpm-fido tool from working in the browsers. The file 69-snap-tpm-fido.rules fixes that.

Kind regards, Bastiaan Welmers

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant