-
Notifications
You must be signed in to change notification settings - Fork 131
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Shim 15.7 for ChromeOS Flex (with crdyboot) #332
Comments
Great job! Although I have some suggestions. The shims have the same The mainline kernel 5.10 does not have NX support, which Microsoft requires, although considering there was already an exception for the older shim, I suppose Microsoft won't mind this one. |
We do not need to concern ourselves with grub and kernel NX for reviewing because that can be worked on independently. Bumping the SBAT level for NX is wrong. It's not a security issue and doesn't change anything. Firmware that needs NX enforces NX based on the flag. |
Oh I just got curious and having had a quick look at the crdyboot, it seems the kernel is not validated using the shim but using an embedded key in the crdyboot using a separate vboot library and that does not seem acceptable to me, stuff running before ExitBootServices() should always be verified by the shim or the UEFI firmware. |
Thanks for taking a look. Can you say more about what your specific concern is with having crdyboot verify the kernel? From a cryptographic perspective everything should still be fully verified; shim verifies crdyboot (which includes the embedded pubkey), and crdyboot verifies the data in the kernel partition and the rootfs. |
We're trying hard to standardize revocation mechanisms with sbat, cert mule, centralized sbat updates, and we should really get sbat for the kernel too, it seems counter constructive to the effort to allow essentially a separate shim mechanism to exist in parallel. |
Would this concern be eased by adding support to crdyboot for checking the kernel's SBAT against the It probably wouldn't make sense to add that just yet, since as you say the kernel doesn't have a |
@nicholasbishop can you update the submission to 15.8? While with 15.8 we allow signing systemd-boot, there currently no standardized way on how we should handle custom bootloaders. Maybe @steve-mcintyre can give more information on how we should move forward with this. |
Confirm the following are included in your repo, checking each box:
What is the link to your tag in a repo cloned from rhboot/shim-review?
https://chromium.googlesource.com/chromiumos/shim-review/+/refs/tags/google-shim-20230418
Note: unlike our previous submissions, this one uses crdyboot rather than grub as the second-stage bootloader. More info in the submission readme.
What is the SHA256 hash of your final SHIM binary?
What is the link to your previous shim review request (if any, otherwise N/A)?
#300
The text was updated successfully, but these errors were encountered: