Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Verification does not use input PK/KEK #33

Open
Legrandin opened this issue Mar 24, 2021 · 4 comments
Open

Verification does not use input PK/KEK #33

Legrandin opened this issue Mar 24, 2021 · 4 comments

Comments

@Legrandin
Copy link

The current verification step downloads the Fedora 27 kernel and checks if it executes when Secure Boot is on.
Such kernel is signed with a Red Hat KEK (CN = "Fedora Secure Boot Signer").

Instead, the test should check that a kernel signed with the input key (whose certificate is passed with --oem-string) runs, because the purpose of EnrollDefaultKeys.efi is to set PK and the first KEK with the user's key.

As a matter of fact, I am a bit surprised that the Fedora 27 kernel (signed by Red Hat) boots at all.
That should not be happening, right? For the record, I am using EnrollDefaultKeys.efi from Fedora 33.

@Legrandin
Copy link
Author

To be clear, the EnrollDefaultKeys.efi I am using does expect the user PK/KEK cert in SMBIOS. If you don't pass it, it fails with:

OUT: b'error: OEM String with app prefix 4E32566D-8E9E-4F52-81D3-5BB9715F9727 not found: Not Found\r\n'

@nlgranger
Copy link

@Legrandin did you find a workaround for this?

@Legrandin
Copy link
Author

No, I did not.
I recall I gave up on qemu-ovmf-secureboot.

@nlgranger
Copy link

Too bad but thanks for letting me know.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants