-
Notifications
You must be signed in to change notification settings - Fork 131
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Shim 15.4 for MIRACLE LINUX 8 #189
Comments
Would have liked to hear something about who you are and what you are building. |
Oh I didn't recognize it. Who we are: For one example, we are sponsoring to CIP(Civil Platform Infrastructure) for long term support in OS area. What we are building: Distrowatch(Sorry these information are very old): |
I think that 'ML' as product specifier in the SBAT entries is too short. |
'miracle' or 'miraclelinux' is better for SBAT? |
Both names should be ok. |
Hi, I have changed SBAT entry, and rebuilded shim-unsigend-x64. New SHA256 hashes of SHIM binary are here.
New SBAT entries are here. For shim:
For grub2(planning):
Anyone can confirm SBAT section in shim from actual binary following commands;
|
Things to follow up on:
|
Please also preserve the |
OK, I have recognized this. We will change SBAT section in grub2 source.
And one more thing, is this need for only grub2? |
@steve-mcintyre
Yes, very long.
I have putted actual SRPM of kernel. ( Actually, this is same as RHEL8 in source-code level except debranding.
Derived from RHEL8's
OK. |
I have updated SRPM of grub2 which includes new New grub2's SBAT content will be below:
Have I now answered all the questions that pointed out? |
Hi, we are waiting to accept our shim. |
@julian-klode |
I have sent you emails with lists of words (different for each person) to validate the email addresses and GPG keys. Please paste the values here, or reply via email to prove control of both address and GPG key. (I actually had to send each email twice as I accidentally sent the same list to both) |
We'd prefer if we had a public docker image to start the build from, the tarball is somewhat problematic to review with. |
Thank you very much!
webbasierten Talentes gewöhnlichen Flügeln abstreichenden erbringende |
I recived your email.
umrüstbarem schnorre Mitverursachern redefiniertem Flussdiagramms |
I see, I have changed strategy to start from CentOS's public docker image. miraclelinux@02e2678 shim reproducibility is also OK. |
tSU-RooT verified. Hey, @Yasuhiro-Nakamura I sent you a second email a few minutes after that one with other words, as I accidentally reused the same words, could you let me know those? |
What was being reviewed? ml8-shim-15.4-20210629 currently points at the following commit:
E-Mail verification: One outstanding.
These hashes do not match the issue description which lists
But it does match the README.md Source code+Patches: This looks OK. It misses a ton of patches from #165, but there are no security concerns. Answers: OK ** Certificate **
** SBAT ** The SBAT component is Have any grubs been signed with the certificate that still had an SBAT component of ** grub, kernel ** RHEL rebuild. **Conclusion ** Work is needed to either switch to a CA key, or a non-CA key with a usual expiry of 1-5 years. This will also address any concerns about whether this certificate accepts grubs with the "old" |
leidvolle prüderes großflächigeren höherwertigen angefasst Nebraska |
Those look good. emails are all verified now. Once the certificate issue is addressed, we can continue, but maybe we should close this one and open a new submission to keep the queue cleaner if that takes a while. |
Closing per #189 (comment) . Please reference this issue when you open a new submission (or reopen this one - I don't remember if github allows that). |
We opened a new submission at #266 that solves certificate issue and update to shim-15.6. |
Make sure you have provided the following information:
Link to our code branch for review: miraclelinux/shim-review@ml8-shim-15.4-20210629
What organization or people are asking to have this signed:
Cybertrust Japan Co., Ltd.
What product or service is this for:
MIRACLE LINUX 8
Please create your shim binaries starting with the 15.4 shim release tar file:
https://github.com/rhboot/shim/releases/download/15.4/shim-15.4.tar.bz2
This matches https://github.com/rhboot/shim/releases/tag/15.4 and contains
the appropriate gnu-efi source.
Please confirm this as the origin your shim.
Source is starting from upstream 15.4 release, tarball matches with upstream release at level of sha256sum.
https://github.com/miraclelinux/shim-review/raw/ml8-shim-15.4-20210629/shim-15.4.tar.bz2
What's the justification that this really does need to be signed for the whole world to be able to boot it:
We have received request from our customer that they wants to enable SecureBoot for OEM computer without indivisual signature from hardware vendor specially.
How do you manage and protect the keys used in your SHIM?
Our private key is stored in HSM(Yubikey), this will be only available while speicific package build.(e.g. shim, grub2, kernel, fwupd)
Do you use EV certificates as embedded certificates in the SHIM?
Yes.
If you use new vendor_db functionality, are any hashes allow-listed, and if yes: for what binaries ?
Not applied.
We don't use vendor_db functionality at present.
Is kernel upstream commit 75b0cea7bf307f362057cc778efe89af4c615354 present in your kernel, if you boot chain includes a Linux kernel ?
This commits(75b0cea7bf307f362057cc778efe89af4c615354) is included for 5.8 version.
Our kernel is based on linux kernel version 4.18.0.
Strictly speaking,
75b0cea7bf307f362057cc778efe89af4c615354
is not applied for this reason.But nearly fixes are included for our kernel from origin of RHEL.
if SHIM is loading GRUB2 bootloader, are CVEs CVE-2020-14372,
CVE-2020-25632, CVE-2020-25647, CVE-2020-27749, CVE-2020-27779,
CVE-2021-20225, CVE-2021-20233, CVE-2020-10713, CVE-2020-14308,
CVE-2020-14309, CVE-2020-14310, CVE-2020-14311, CVE-2020-15705,
( July 2020 grub2 CVE list + March 2021 grub2 CVE list )
and if you are shipping the shim_lock module CVE-2021-3418
fixed ?
Yes, these grub2 CVEs were fixed.
"Please specifically confirm that you add a vendor specific SBAT entry for SBAT header in each binary that supports SBAT metadata
( grub2, fwupd, fwupdate, shim + all child shim binaries )" to shim review doc ?
Please provide exact SBAT entries for all SBAT binaries you are booting or planning to boot directly through shim
We are planning below SBAT entries.
For shim:
For grub2:
Were your old SHIM hashes provided to Microsoft ?
No, we haven't.
Did you change your certificate strategy, so that affected by CVE-2020-14372, CVE-2020-25632, CVE-2020-25647, CVE-2020-27749,
CVE-2020-27779, CVE-2021-20225, CVE-2021-20233, CVE-2020-10713,
CVE-2020-14308, CVE-2020-14309, CVE-2020-14310, CVE-2020-14311, CVE-2020-15705 ( July 2020 grub2 CVE list + March 2021 grub2 CVE list )
grub2 bootloaders can not be verified ?
Not applied.
Our previous submission had closed, so we have no old grub2 binary for SecureBoot.
What exact implementation of Secureboot in grub2 ( if this is your bootloader ) you have ?
* Upstream grub2 shim_lock verifier or * Downstream RHEL/Fedora/Debian/Canonical like implementation ?
RHEL-like implementation, we are downstream.
What is the origin and full version number of your bootloader (GRUB or other)?
GRUB2's upstream version is
2.02
https://git.savannah.gnu.org/gitweb/?p=grub.git;a=tag;h=refs/tags/grub-2.02
Full version number will
2.02-99.el8.ML.1
.This is derived from RHEL with our certfications and SBAT CSV.
If your SHIM launches any other components, please provide further details on what is launched
No, only linux kernel.
If your GRUB2 launches any other binaries that are not Linux kernel in SecureBoot mode,
please provide further details on what is launched and how it enforces Secureboot lockdown
Not applied.
If you are re-using a previously used (CA) certificate, you
will need to add the hashes of the previous GRUB2 binaries
exposed to the CVEs to vendor_dbx in shim in order to prevent
GRUB2 from being able to chainload those older GRUB2 binaries. If
you are changing to a new (CA) certificate, this does not
apply. Please describe your strategy.
Not re-using, we have re-newed certificate in this year March.
How do the launched components prevent execution of unauthenticated code?
By SecureBoot ways.
Shim, Grub2, Kernel will prevent unauthenticated code in SecureBoot enabled environment.
Does your SHIM load any loaders that support loading unsigned kernels (e.g. GRUB)?
No.
What kernel are you using? Which patches does it includes to enforce Secure Boot?
Our kernel is derived from RHEL.
What changes were made since your SHIM was last signed?
Our previous submission had closed semi-automatic for BootHole vulnerability.
Therefore, we have no last signed SHIM.
What is the SHA256 hash of your final SHIM binary?
The text was updated successfully, but these errors were encountered: