-
Notifications
You must be signed in to change notification settings - Fork 131
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
shim 15.7 for Certus Software S.R.L. #285
Comments
Change grub2 version 2.06 (upstream) to 2.06-3 (Debian). |
This doesn't sound like you're doing anything requiring customization of the boot stack. Could you just reuse the signed shim+grub2+kernel from another distro (in your case, probably Debian's)? |
We can not use a kernel signed from another distro because we require our custom kernel config. In our custom kernel config we enabled drivers for some very old storage controllers that I have not found in other distros that we considered for reusing. |
Can you be more specific? What drivers/controllers? |
The need for kernel customization is caused by: A. The need for hardware support All Certus Erasure products are required to boot and run on a very broad range of hardware, both old and very new alike. The support for the old hardware is usually missing from the most of the existing boot stacks and it requires to be added. The newest hardware is usually added but with consistent delays. The below list contains a few examples of what is needed and it is not included on Debian distro's kernel: A.1. Storage
A.2. Peripherals
A.3. TPM
A.4. Network
B. The need for AUFS support We have also a dependency on AUFS. We've planned to migrate to OVERLAYFS in the future, but for the moment we need to manage what we have and the modern distros doesn't support this anymore. Also, being the first review, I created a new tag in which I updated shim to 15.7 and grub to 2.06-5. |
https://github.com/cssrl/shim-review/tree/CertusSoftware-shim-x64-20221220 |
https://github.com/cssrl/shim-review/tree/CertusSoftware-shim-x64-20230119 |
Hi Robbie (@frozencemetery), |
Please note #307 (it's not mentioned in your README) |
|
|
Apologies for keeping you waiting, catching up on backlog now... |
Contact verification mails sent |
|
Review of Certus CertusSoftware-shim-x64-20230216OK
Issues / queries / outstanding
|
Quote: "founts forestalling gobbledygook Kodiak hackney tows clayier juiciness poultry ovoids". |
Indeed the README.md file was not updated, but now it is. Thanks!
I've changed the value in the README.md file. Thanks.
The upstream kernel sources are used and the below lockdown patches from Debian.
There are also AUFS patches applied (https://github.com/sfjro/aufs-standalone).
The list of GRUB modules was borrowed from Slackware, a while back. If you consider that there is any issue with the existing or missing module, we are open to address it. Thanks. |
@steve-mcintyre What further actions are necessary for approval? Thank you for your assistance. |
Review of
|
@THS-on Thanks for the review.
Done. Thanks!
I confirm that the kernel option
Updated to the 2.06-13+deb12u1 release (with all patches) and upstream SBAT level 4.
The kernel module signing facility option |
|
I'm not an authorized reviewer, I'm just trying to help and learn. sha256:
Build is reproducible, sha256 is confirmed. Obj Alignment:shimx64.efi
Alignement is ok. DllCharacteristics:shimx64.efi
NX_COMPAT is enabled. Sections:shimx64.efi
Code section is not writable: OK SBAT:shimx64.efi
SBAT seems ok to me. Certificate:
Certificate it's not a CA, but it's an EV certificate signed by DigiCert. |
@eduardacatrinei, apologies for the late reply. I'll try to write a review by the end of this week - making your application top priority, as you've been waiting for a very long time. @steve-mcintyre, pinging you here to confirm the successful contact verification. |
Review done, checksum matches, seems alright! @THS-on, I just now noticed that Steve added thumbs up emoji reactions to both replies with shim words for contact verification. In this case, what's the thing we should do now? In the meantime I was thinking about further improvements to the process, to prevent this kind of situation from happening. Something like if a contact verification has been initiated, the official reviewer who initiated it has one week to respond - otherwise another reviewer takes the initiative. I may add this soon to the thread with proposals, but right here I'd like to already accept this application without further waiting - the people behind it have been waiting for a very long time. |
Thanks, everyone! If the only remaining step is contact verification, we're ready to redo that without any issues. |
Since there's been no activity for over a week, I'll send the verification emails again. Say what you want, but I'd rather double-check that everything is correct*, than treat uncertainties as absolute truths. Especially considering my potential lack of knowledge of certain cultural differences and my personal situation, which makes me extra careful. The lack of sleep and the amount of responsibilities do this to me. Furthermore, we recently got a newsflash, that the whole bootchain shall be NX-compatible for the shim binary to have the proper bit set, therefore what I'd recommend is to just recompile the binary without the NX support patch, put the appropriate changes to the README, as well as edit the opening post of this GitHub issue (new repository tag and shim binary checksum), and ping me, so I can quickly rebuild it myself and accept the application after such a long time. Yes, I know how frustrating this might be - I'll try my best to review the updated application ASAP. * I should write a guide, how to accomplish this too, but let's just say that I confirmed the public keys from 2 independent sources with 2 independent Internet connections/IP addresses. |
Verification emails sent - attempt no. 2. |
Thanks @aronowski. Below is the content of the second attempt email verification. |
discrediting Cray reprobate wigs prognosticate noblest nurseryman |
@eduardacatrinei, @cssrl-amp, thank you! Contact verification successful. Once the updated application is present, ping me and I'll review it with high priority. After all, it should be just about the new binary and therefore quick and easy. In regard to the current NX bit situation, I wrote some proposals here, so that people would be aware of, what's happening and the message being as straightforward as possible in the future. |
@aronowski Thank you for your time! |
Review done, checksum matches, new binary seems OK - no NX support, since the whole chain is not fully NX-compatible, i.e. compliant with the requirements (the Microsoft exception) mentioned in PR #359. Accepting. Thank you for your patience. I'll try my best to make the process more optimal in the future. |
Thank you! We have received the signed shim from Microsoft. |
Confirm the following are included in your repo, checking each box:
What is the link to your tag in a repo cloned from rhboot/shim-review?
https://github.com/cssrl/shim-review/tree/CertusSoftware-shim-x64-20231218
What is the SHA256 hash of your final SHIM binary?
d0178270f72fc6070fe1e19cc1d66b65c1386fdc6bb7c80fa094cee3a3532db7 shimx64.efi
What is the link to your previous shim review request (if any, otherwise N/A)?
N/A
The text was updated successfully, but these errors were encountered: