While you can perform this final phase in the offline VM created in the previous step, we recommend cloning the offline VM for each specific VotingWorks application to save time. By cloning the offline VM, you only need to perform the application specific configuration since they share the same base application code.
In the following steps, the vxadmin VM will be referenced. In future tests or builds, these steps can be repeated for each different VotingWorks application: vxcentralscan, vxscan, and vxmark.
To clone the offline VM, run the following command on the build machine:
This command creates a byte-for-byte clone of the offline VM, along with all settings, including network functionality disabled at the VM level.
Open virt-manager (if not already open):
Double-click the vxadmin VM
Press the Start button ▶️
Once the VM has initialized, log in with username: vx and password: votingworks
To ensure the console displays correctly, select the “View” menu option, then “Resize to VM”
In the vxadmin VM terminal:
You will be guided through several questions.
After the script finishes, the VM will reboot. You will see a white screen displaying “Card Reader Not Detected”. In the VM menu, select Virtual Machine → Shut Down → Shut Down. Close the VM window once shutdown is complete.
You will now need to perform the Secure Boot Signing process with VotingWorks. Once that process is completed, the VM is signed for use with Secure Boot.
At this point, you are ready to install the image. You can find those instructions in Installing an Image via vx-iso.
To finalize an image for production use, it is necessary to implement Secure Boot. This process requires the use of sensitive keys and a passphrase that should only ever be known to and used by VotingWorks. Since the Trusted Build process is performed by a third-party vendor (SLI), a process to securely sign the image without compromising the keys or passphrase is needed. This document describes that process.
Once SLI has created a Trusted Build image, the image and its VM definition (an xml file) must be securely provided to VotingWorks. To transfer the image and definition, SLI will upload to a shared S3 bucket only accessible to SLI and VotingWorks. This access will be controlled via IAM permission policies.
NOTE: For documentation purposes, we will use a Trusted Build image named vxadmin. Replace that with the appropriate image name, as necessary.
Once SLI has configured their S3 access and created a Trusted Build image, they will need to upload the image and its configuration file. Additionally, hashes of each file will be generated so SLI and VotingWorks can confirm files were not modified during the upload or download phases.
On the SLI build machine:
Once the SLI upload has completed, VotingWorks will download and verify the hash values of all files. On the VotingWorks secure build machine, while SLI observes:
Once the VotingWorks download has completed and verified and the VM has been successfully defined, normal Secure Boot processes can be followed, while SLI observes.
Once the Secure Boot configuration has been completed, VotingWorks will retrieve the image signature from the admin menu. This hash will be provided to SLI/EAC for official verification of the image.
Now that the image has been securely signed, VotingWorks will upload the signed image for SLI to later download. While SLI observes, VotingWorks will run the following command on the secure build machine:
Once this step has completed, SLI can download the files at their convenience. On the SLI build machine:
Once SLI has completed the download and hashes are validated, the compressed image and signature can be provided to EAC for use by election officials. At any point after submission to EAC, election officials can verify the image hash via the vx-iso tool.