-
Notifications
You must be signed in to change notification settings - Fork 0
Rebuild TemplateVM with updated signing key #20
Comments
freedomofpress/securedrop-builder#250 has been merged, but the packages aren't live yet. We'll need to have |
Taking a look at this today. We now have the 0.1.5 keyring package available in prod: https://apt.freedom.press/pool/main/s/securedrop-keyring/securedrop-keyring_0.1.5%2Bbuster_all.deb In order to make a build, we'll need a prod-signed tag on this repo. I plan to create one of those, but first, I'll simply test the build logic, using the 0.2.2 tag from 2020-07. There are two more recent test-only tags:
which I may delete as part of this work. Or, I can push an individually-signed tag on top, as long as it points to the most recent commit on main branch. |
Dug up some notes by @emkll in internal chat, posting here for posterity: Earlier today I managed to build a dom0 template using the existing logic, but there was a small issue with the keyring that will require an update to the build-workstation-template script. I confirmed the template build is working with Fedora 33, though requires a manual step 🎉 I have created a branch in https://github.com/freedomofpress/qubes-template-securedrop-workstation/tree/test-build updating the signature to my personal signing subkey (not the main fingerprint ID) and pushed a corresponding test tag in https://github.com/freedomofpress/qubes-template-securedrop-workstation/releases/tag/20210520-test The (signed) tag must point to the last commit on the branch, and logic should change to include the new key (and have the next "production" tag be the new signing key FP. Once the securedrop-keyring package is updated, you can rebuild the template. make template will fail early on, because for some reason, there's a keyring for the qubes builder, and a keyring for template-securedrop-workstation (I am not sure why, this is new and requires investigation). After the make template failure, i just followed the commands that were in the build-workstation-template to add and trust my primary public key:
After running the other commands manually:
The template should be successfully built in |
Was able to build a new RPM today. The comments above on the keyring changes were extremely helpful. Pushed WIP here: https://github.com/freedomofpress/qubes-template-securedrop-workstation/tree/test-build-keyring For now, preserved separate changes in https://github.com/freedomofpress/qubes-template-securedrop-workstation/tree/test-build, since a signed tag is required as part of the build logic. Next steps:
|
Pushed a prod-signed tag: https://github.com/freedomofpress/qubes-template-securedrop-workstation/releases/tag/0.2.3 Note that this is signed with the current/old key, i.e. 22245C81E3BAEB4138B36061310F561200F4AD77. The tag will still verify up until the expiry date of 2021-06-30, so it's suitable for immediate rebuild of the template. Once we have an RPM available on yum-test, and later promoted to prod, we can circle back to update the template yet again, removing the expired key, and retag with the new key. |
Post-merge of freedomofpress/securedrop-yum-test#26, I attempted to:
and unfortunately ran into problems. While the provisioning completed, and the updater ran without error, DispVMs would fail to open applications. I tested at last JPEG and XLSX files, same behavior: DispVM starts, no window is drawn, DispVM halts. These are the steps I used to configure the staging install:
I haven't spent any time investigating the nature of the failure, so I'll start on that now. I did perform two full runs of the above test plan, and the results were the same each time. @creviera could you try to reproduce this behavior, following the steps above? |
Returned to this step today:
And I'm pleased to report positive results. The concerns raised yesterday around DispVM breakage were addressed separately in #705, and we've confirmed that those observations were unrelated to the new template being tested. Marking that step as complete, and I'll prepare a prod-signed artifact for yum.securedrop.org. |
@creviera will aim to work on the remaining task during this sprint:
|
This work was completed in freedomofpress/securedrop-workstation#715 |
As part of the planned keyring rotation (freedomofpress/securedrop#5923), we need to update the signing key used in this template to the new key and fingerprint, and build an updated template.
Sub-tasks
The text was updated successfully, but these errors were encountered: