How to change the schematic ID of a Talos node with secure boot enabled? #12132
-
|
I am running a single node Talos (v1.11) test cluster with SecureBoot enabled and TPM encrypted STATE and EPHEMERAL partitions. I am using official images generated from the Talos image factory, that use Siderolabs keys. I wanted to remove a system extension from the install and I just found out (the hard way) that changing the schematic ID of the Talos install causes a secure boot violation. This left the node unable to boot into Talos, and while booting from a flash drive worked, it prevented the TPM from unsealing the keys for the disk encryption... I tried fiddling around with it, but in the end I had to nuke everything and start over, as I couldn't figure out how to recover from this situation. If I understand correctly, this is by design and the documentation states that the UKI signing key and the PCR signing key must preserved, otherwise the node will not be able to boot with the new UKI and unlock the encrypted partitions. However, what i do not understand is how to preserve these keys when upgrading talos or changing the talos schematic ID. My questions are these:
|
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 15 replies
-
|
You just upgrade to another image from the Image Factory with a different schematic (SecureBoot one), they are all signed properly. Talos does A/B on upgrades, so you can boot previous image if you have access to bootloader screen |
Beta Was this translation helpful? Give feedback.
I think there is a misunderstanding here. I was not suggesting there is a bug in the Talos SecureBoot implementation, just stating that it didn't work for me and asked for help in troubleshooting the issue.
In any case, after several more hours of trial and error I have found the issue.
I decided to retry the reproduction steps with the latest available version - v1.11.3 (so far I've been using v1.11.0). I encountered the same issue, but I also noticed this during the upgrade process: