You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/user-docs/install_aem.md
+40-34Lines changed: 40 additions & 34 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,14 +1,14 @@
1
1
# Installing TrenchBoot AEM in Qubes OS
2
2
3
-
This document shows how to install Anti Evil Maid from packages produced by
4
-
3mdeb as part of [TrenchBoot as Anti Evil Maid project](https://docs.dasharo.com/projects/trenchboot-aem-v2/).
5
-
If you wish to build the components yourself, please refer to documentation for
6
-
developers instead.
3
+
This document shows how to install Anti Evil Maid from packages produced by 3mdeb
4
+
as part of [TrenchBoot as Anti Evil Maid project](https://docs.dasharo.com/projects/trenchboot-aem-v2/).
5
+
If you wish to build the components yourself, please refer to documentation for developers instead.
7
6
8
-
## Installation
7
+
Before you begin, it would save installation time by clearing the TPM of your device before proceeding, otherwise you will need
8
+
to reboot your computer at [the provisioning](##Provisioning) step below. Remember: enable Intel TXT after resetting your TPM.
9
9
10
-
To install, you have to first add a new repository and import a public part of
11
-
a key that was used to sign RPM packages.
10
+
To install TrenchBoot AME you will need to add a new repository, import a public part of
11
+
a key that was used to sign RPM packages, download and install the appropriate packages, configure a new `.bin` file in the `/boot/` directory and then configure AEM. The entire process should take roughly 20 minutes to complete.
The key specified in the file must be downloaded and imported to RPM:
27
+
The specified key must be downloaded and imported to RPM:
28
28
29
29
```bash
30
30
qvm-run --pass-io sys-net \
@@ -33,16 +33,16 @@ qvm-run --pass-io sys-net \
33
33
sudo rpm --import RPM-GPG-KEY-tb-aem
34
34
```
35
35
36
-
Now it should be possible to download and install packages from AEM repository.
37
-
38
36
### Intel systems dependencies
39
37
40
-
If your device has an Intel CPU, download [official package from Intel](https://cdrdv2.intel.com/v1/dl/getContent/630744)
41
-
and extract ACM appropriate for your platform to `/boot/`.
38
+
If your device has an Intel CPU, download [the official package from Intel](https://cdrdv2.intel.com/v1/dl/getContent/630744).
39
+
Select the correct ACM .bin corresponding to your CPU (using the .PDF included in the zip as a guide) and move the `.bin` into the dom0 `/boot/` directory
42
40
43
-
### Installing prerequisite packages
41
+
Helpful commands:
42
+
`unzip <zip.acrhive.name>`- to unzip the Intel .zip archive.
43
+
`mv <ACM.bin> /boot/` - to move the correct ACM to `/boot`.
44
44
45
-
#### Qubes repository dependencies
45
+
###Installing prerequisite packages
46
46
47
47
Start by installing prerequisite packages. Those are not part of newly added
For convenience, the packages can be saved to an environment variable:
62
+
For convenience, the packages can be saved to an environment variable, by simply typing into the dom0 terminal, or copying a text file from a disposable qube:
63
63
64
64
```shell
65
65
packages=(
@@ -112,14 +112,17 @@ packages+=(
112
112
#### Installing
113
113
114
114
Install the packages (first command reinstalls existing packages in case the
115
-
same version numbers exist on official Qubes repositories, second one only
116
-
adds new packages):
115
+
same version numbers exist in official Qubes repositories, second one only
116
+
adds new packages). If the first command fails, it means that there are no conflicting packages with the same version number in official Qubes repositories:
All packages are in place. Before we can proceed with provisioning AEM, the TPM
198
-
must be cleared in the BIOS. Some platforms may require disabling Intel Trusted
199
-
Execution Technology (TXT) in order to clear TPM. After you clear the TPM,
200
-
remember to enable Intel TXT back, otherwise AEM will not work. Once TPM is
201
-
cleared, perform the TPM setup:
200
+
All packages are now installed.
201
+
202
+
Before we can proceed with provisioning AEM, the TPM must be cleared in the BIOS (i.e. TPM Authentication Reset). Some platforms may require disabling Intel Trusted
203
+
Execution Technology (TXT) in order to clear the TPM.
204
+
205
+
If you failed to clear the TPM as noted at the beginning of the guide, you will be shown a message like this:
206
+
207
+

208
+
209
+
In that case, try clearing the TPM in your BIOS and run the command again. After you clear the TPM, remember to enable Intel TXT back, otherwise AEM will not work.
210
+
211
+
Once the TPM is cleared, perform the TPM setup:
202
212
203
213
```bash
204
214
sudo anti-evil-maid-tpm-setup
205
215
```
206
216
207
217

208
218
209
-
You will be prompted to set the SRK password, it is a password to access TPM’s
210
-
nonvolatile storage where the AEM secrets will be sealed. If you failed to
211
-
clear the TPM, you will be shown a message like this:
219
+
You will be prompted to set the SRK password. The SRK password enables access the TPM’s
220
+
nonvolatile storage where the AEM secrets will be sealed.
212
221
213
-

214
-
215
-
In that case, try clearing the TPM in your BIOS and run the command again.
216
-
217
-
Now all that's left is proper installation of AEM. There are different options,
218
-
refer to `anti-evil-maid-install -h` for examples. In the simplest case, AEM is
222
+
Now all that's left is proper installation of AEM. (Note: There are different options,
223
+
refer to `anti-evil-maid-install -h` for examples.) In the simplest case, AEM is
219
224
installed on boot partition (not disk, i.e. `sda1` instead of `sda` etc.) of
220
225
Qubes OS. Run this command to find out where your boot partition is installed:
0 commit comments