-
Notifications
You must be signed in to change notification settings - Fork 131
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
shim-15.6 for opsi #245
Comments
Our previously accepted shim |
@cyphermox was contact verification previously carried out for opsi? |
No the contact verification was not carried out @frozencemetery |
Thanks, looks like that was #224. I'm sending some words to yinz; please post them here once you receive them. |
The words [email protected] received were
|
the words [email protected] received were
|
Those are the correct words; verified for both. |
Anything we can to to aid with the whole process? |
Looking at this, lots of good stuff:
Some things to follow up on:
|
For the time being, we still use Grub 2.06. |
I can tell you right now that it's very unlikely you'd get a shim signed that can load iPXE. Many grub vendors (Ubuntu, Fedora, openSUSE) have incorporated the patches from openSUSE to enable UEFI network protocols into grub, which gives you HTTPS support (on UEFI platforms). That's a signable secure boot HTTPS boot path. I don't think anybody has asked for that in Debian yet, I certainly haven't pushed it there from Ubuntu yet. I guess I could. I think all grubs support HTTP which is still better than TFTP. Presumably better than HTTPS as it makes it clear where the security boundaries are. With HTTPS it's unclear how much trust is placed in certificates, where they come from, or if they are validated at all. |
Thank you for the info @julian-klode. We will look into this. As said, For now this is just some tinkering and no final decisions have been made. We are still running with grub2 though. |
I have to agree with @julian-klode here. Until people have done a full SB review of the ipxe codebase, I'm afraid it's not an option from the shim-review point of view. If you acknowledge that, we can progress here. Apologies if that sounds harsh, but we're responsible for maintaining the SB security chain for everybody. :-/ |
If there is no option, then yes we acknowledge this fact. We can then progress and we will use grub2 only. We understand that the security chain has to be maintained and secured. |
ok, then I think you're ready to go |
Confirm the following are included in your repo, checking each box:
https://github.com/opsi-org/shim-review/blob/master/README.md
https://github.com/opsi-org/shim-review/blob/master/shimx64.efi
https://github.com/opsi-org/shim-review/blob/master/opsi-uefi-ca.der
no vendor_db in use
https://github.com/opsi-org/shim-review/blob/master/opsi-netboot.patch
no grub patches in use
https://github.com/opsi-org/shim-review/blob/master/build.log
https://github.com/opsi-org/shim-review/blob/master/dockerfile
What is the link to your tag in a repo cloned from rhboot/shim-review?
https://github.com/opsi-org/shim-review/releases/tag/opsi-shim-x86_64-20220624
What is the SHA256 hash of your final SHIM binary?
03d6dab2afd15b969af65e3d33416032382bec6d03ea952e0fc37f82830ac2ee
˝
The text was updated successfully, but these errors were encountered: