A live buildroot based Linux distribution designed for managing secrets offline.
Go to file
Lance Vick cbb5c7d80a
use latest toolchain
2023-02-10 16:25:39 -08:00
audits Updated cure53 audit with corrected authors list 2021-11-04 15:23:16 -07:00
config Add fs utils 2023-02-10 18:11:13 -05:00
release add signature 2023-01-02 23:46:31 -05:00
src use latest toolchain 2023-02-10 16:25:39 -08:00
.dockerignore Create .dockerignore, symlinked from .gitignore 2021-06-20 18:39:14 -04:00
.gitattributes Update .gitattributes syntax for git LFS to work with arbitrary releases 2023-02-10 18:10:56 -05:00
.gitignore Refactor to use distrust/toolchain project. 2023-01-30 15:17:54 -08:00
.gitmodules Refactor to use distrust/toolchain project. 2023-01-30 15:17:54 -08:00
LICENSE.md add MIT license 2021-02-25 12:24:46 -08:00
Makefile Refactor to use distrust/toolchain project. 2023-01-30 15:17:54 -08:00
README.md update readme with vanilla heads/pureboot setup steps 2023-01-02 16:47:09 -08:00

README.md

AirgapOS

https://github.com/distrust-foundation/airgap

About

A live buildroot based Liux distribution designed for managing secrets offline.

Built for those of us that want to be -really- sure our most important secrets are managed in a clean environment with an "air gap" between us and the internet with high integrity on the supply chain of the firmware and OS used.

Uses

  • Generate GPG keychain
  • Store/Restore gpg keychain to security token such as a Yubikey or Nitrokey
  • Signing cryptocurrency transactions
  • Generate/backup BIP39 universal cryptocurrency wallet seed
  • Store/Restore BIP39 seed to a hardware wallet such as a Trezor or Ledger

Features

  • Determinsitic iso generation for multi-party code->binary verification
  • Small footprint (< 100MB)
  • Immutable and Diskless: runs from initramfs
  • Network support and most drivers removed to minimize exfiltration vectors

Requirements

Software

  • docker 18+

Hardware

  • Recommended: PC running coreboot-heads
    • Allows for signed builds, and verification of signed sd card payloads
    • Ensure any Wifi/Disk/Bluetooth/Audio devices are disabled/removed
  • Supported remote attestation key (Librem Key, Nitrokey, etc)
  • Supported GPG smartcard device (Yubikey, Ledger, Trezor, Librem Key, etc)
  • Blank flash drive
  • Blank SD card

Build

Build a new release

```
make VERSION=1.0.0rc1 release
```

Reproduce an existing release

```
make VERSION=1.0.0rc1 attest
```

Sign an existing release

```
make VERSION=1.0.0rc1 sign
```

Setup

Assumes target is running Pureboot or Coreboot/heads

  1. Boot to shell: Options -> Recovery Shell
  2. Mount SD card
    mount-usb
    mount -o remount,rw /media
    
  3. Insert chosen GPG Smartcard device
  4. Initialize smartcard
    gpg --card-status
    
  5. Sign target iso
    cd /media
    gpg --armor --detach-sign airgap.iso
    
  6. Unmount
    cd
    umount /media
    sync
    
  7. Reboot

Usage

  1. Insert remote attestation device
  2. Power on, and verify successful remote attestation
  3. Boot to airgap via: Options -> Boot Options -> USB Boot

Development

Build develop image

make

Boot image in qemu

make vm

Enter shell in build environment

make shell