←back to thread

253 points pabs3 | 1 comments | | HN request time: 0.001s | source
Show context
RecycledEle ◴[] No.44615326[source]
This is yet another why I do not encrypt.
replies(2): >>44615500 #>>44615502 #
asmor ◴[] No.44615502[source]
Secure boot doesn't encrypt, secure boot only signs.
replies(1): >>44616173 #
carlhjerpe ◴[] No.44616173[source]
But it's very much a part of boot verification to unlock a TPM with your encryption keys on it.
replies(1): >>44616457 #
craftkiller ◴[] No.44616457[source]
You're conflating secure boot with measured/verified boot.
replies(1): >>44616505 #
carlhjerpe ◴[] No.44616505{3}[source]
They don't work in tandem? I enable secureboot with sbctl(securebootctl) and enroll keys in a TPM using the same tool as far as I can remember.

Or is this just some technical detail that in practice is under the same tools and settings?

replies(2): >>44616668 #>>44618672 #
1. craftkiller ◴[] No.44618672{4}[source]
In addition to the great answer by jeroenhd, you also might have encrypted your secure boot signing keys with your TPM. This has the advantage that your signing keys can't be stolen so you know that your bootloader was signed on your specific physical machine. But this is not necessary, you can just store your signing keys on your SSD or anywhere/anyway you want.