-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Better UEFI Secure Boot handling #119
Comments
The patches @miczyg1 has mentioned were posted here: https://www.mail-archive.com/devel@edk2.groups.io/msg33328.html They introduce additional features, such as:
These changes were discussed here: https://edk2.groups.io/g/rfc/topic/82139806# with some nice design proposal here: https://drive.google.com/file/d/11yNJJ2x8WXYZRg1nZWrr4C4Hq89Izn1D/view These are part of the upstream edk2 since August 2021. So to have them in Dasharo, we probably need to rebase our fork. |
Dashro/edk2 rebase is IMHO very important, question is how much work it is. Also I'm not sure if we have regression testing for our features. Our fork is very old and we should start applying to EDKII the same policy as we have for coreboot. |
It seems it is our latest common commit with
This was probably a base of 9e fork. A next commit in history is:
|
We need approach in which we can stay on top of all most important forks. I guess most of the stuff that coreboot community develops land in MrChromebox fork. Maybe that one is best to follow and meanwhile upstream what we have to Tianocore. Also we should start identify upstream problems and create issues in edk2 bugzilla e.g. there were some issues in RTC area which caused problems on PC Engines apuX. I'm pretty sure it is part of our fork, question if it is fixed upstream. |
When comparing our fork with current So we carry a list of 164 commits on top of the old upstream version from 2019: https://paste.dasharo.com/?612c291c03162f9c#FSb6NMiEjdKaJUEtvrvE1h6CEoFrJpzipeFfBWwNby8L Around half of it is from 9e, but they do not exist on their recent branches anymore. |
One have to figure out if that was rebased or upstreamed, or maybe no longer needed for other reasons. |
We may need to start with cleaning up of our banch. Some notes of the cleanup: https://paste.dasharo.com/?4918a3305168c827#6pLq4zpkFjsURQdAyBEbNm2u8q53RHR1vw4oYbmxz34R (oldest commits on the bottom). |
I have looked (very briefly) on the out-of-tree commits on our branch. Ay least most of them look like already picked in https://github.com/MrChromebox/edk2/commits/uefipayload_202207 or addressed in other way. |
Applied some fixes on what @macpijan prepared here: Dasharo/edk2#29
|
@sulewskiprzemyslaw in long run all those tests should be implemented and tested as part of Dasharo Certification Program to avoid regression. |
@miczyg1 I guess 5 and 6 contradict each other |
No? shimx64.efi is the Microsoft signed shim loader which chainloads grubx64.efi which boots OS. |
@miczyg1 @pietrushnic @macpijan
I'm just trying to know if this issue is DONE (ready to move to CLOSED status)? |
@rafkoch current list of the Secure Boot test cases you could find in the following documentation: https://docs.dasharo.com/unified-test-documentation/dasharo-security/206-secure-boot/. The tests from the scope described by @miczyg1 haven't been added to the backlog. |
UEFI Secure Boot handling is better now indeed, but still not perfect. Also there are problems reported that MOK keys could not be enrolled when using Ventoy, but this might be a different problem. |
|
@miczyg1 @rafkoch we have to split this issues for the things done and not done. More to that there are couple issues mixed here e.g. rebase to newer EDKII. @miczyg1 only you can precisely explain expectations here and mark those which are committed and which have to be developed, since you submitted this problem. |
so, next steps:
|
@rafkoch I just added link to the tests to Dasharo's backlog |
The initial scope of this task/feature request has been done, so IMO can be closed. What can we do next?
|
@miczyg1 so put this 2 ideas to the backlog and give link's to them please. (it will be step 1 frot this list) @sulewskiprzemyslaw so I'm waiting for link to new issue added to backlog. Thx. |
The problem you're addressing (if any)
Currently Dasharo always enrolls a set of default SB keys and enables SB by default. Also the key management in the setup does not seem to be working that well.
Describe the solution you'd like
Rebase to a newer Secure Boot driver from EDK2 which has better support for managing default keys. Also the SB should be disabled by default.
Where is the value to a user, and who might that user be?
Some GPU OptionROMs had problems with Secure Boot, OptionROMs were refused to boot. Better Secure Boot handling should benefit from better experience overall.
Describe alternatives you've considered
None
Additional context
None
The text was updated successfully, but these errors were encountered: