Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[efi][secureboot] Not able to boot livecd with secureboot enabled #1712

Closed
Itxaka opened this issue Aug 10, 2023 · 4 comments
Closed

[efi][secureboot] Not able to boot livecd with secureboot enabled #1712

Itxaka opened this issue Aug 10, 2023 · 4 comments
Labels
bug Something isn't working

Comments

@Itxaka
Copy link
Member

Itxaka commented Aug 10, 2023

Kairos version:
master

CPU architecture, OS, and Version:
x86

Describe the bug
We used to be able to boot with secureboot enabled due to using the shim and the grub.efi signed from opensuse. This seem to be no longer the case:

image

To Reproduce
Create iso, boot with uefi+secureboot

Expected behavior
Can boot with secureboot

Logs

Additional context

@Itxaka Itxaka added the bug Something isn't working label Aug 10, 2023
@Itxaka
Copy link
Member Author

Itxaka commented Aug 16, 2023

not sure whats going on. from opensuse:15.5 the shim doesnt pass validation:

b5b8f58fa9c9:/ # sbverify --list /usr/share/efi/x86_64/shim.efi 
warning: data remaining[827296 vs 953800]: gaps between PE/COFF sections?
signature 1
image signature issuers:
 - /C=US/ST=Washington/L=Redmond/O=Microsoft Corporation/CN=Microsoft Corporation UEFI CA 2011
image signature certificates:
 - subject: /C=US/ST=Washington/L=Redmond/O=Microsoft Corporation/CN=Microsoft Windows UEFI Driver Publisher
   issuer:  /C=US/ST=Washington/L=Redmond/O=Microsoft Corporation/CN=Microsoft Corporation UEFI CA 2011
 - subject: /C=US/ST=Washington/L=Redmond/O=Microsoft Corporation/CN=Microsoft Corporation UEFI CA 2011
   issuer:  /C=US/ST=Washington/L=Redmond/O=Microsoft Corporation/CN=Microsoft Corporation Third Party Marketplace Root
signature 2
image signature issuers:
 - /CN=SUSE Linux Enterprise Secure Boot CA/C=DE/L=Nuremberg/O=SUSE Linux Products GmbH/OU=Build Team/emailAddress=build@suse.de
image signature certificates:
 - subject: /CN=SUSE Linux Enterprise Secure Boot Signkey/C=DE/L=Nuremberg/O=SUSE Linux Products GmbH/OU=Build Team/emailAddress=build@suse.de
   issuer:  /CN=SUSE Linux Enterprise Secure Boot CA/C=DE/L=Nuremberg/O=SUSE Linux Products GmbH/OU=Build Team/emailAddress=build@suse.de

b5b8f58fa9c9:/ # sbverify /usr/share/efi/x86_64/shim.efi 
warning: data remaining[827296 vs 953800]: gaps between PE/COFF sections?
Signature verification failed

But on tumbleweed, it does pass the validation, even if it contains the same certificates...

8f2be8e651ed:/ # sbverify --list /usr/share/efi/x86_64/shim.efi 
warning: data remaining[808656 vs 934024]: gaps between PE/COFF sections?
signature 1
image signature issuers:
 - /C=US/ST=Washington/L=Redmond/O=Microsoft Corporation/CN=Microsoft Corporation UEFI CA 2011
image signature certificates:
 - subject: /C=US/ST=Washington/L=Redmond/O=Microsoft Corporation/CN=Microsoft Windows UEFI Driver Publisher
   issuer:  /C=US/ST=Washington/L=Redmond/O=Microsoft Corporation/CN=Microsoft Corporation UEFI CA 2011
 - subject: /C=US/ST=Washington/L=Redmond/O=Microsoft Corporation/CN=Microsoft Corporation UEFI CA 2011
   issuer:  /C=US/ST=Washington/L=Redmond/O=Microsoft Corporation/CN=Microsoft Corporation Third Party Marketplace Root
signature 2
image signature issuers:
 - /CN=openSUSE Secure Boot CA/C=DE/L=Nuremberg/O=openSUSE Project/emailAddress=build@opensuse.org
image signature certificates:
 - subject: /CN=openSUSE Secure Boot Signkey/C=DE/L=Nuremberg/O=openSUSE Project/emailAddress=build@opensuse.org
   issuer:  /CN=openSUSE Secure Boot CA/C=DE/L=Nuremberg/O=openSUSE Project/emailAddress=build@opensuse.org
8f2be8e651ed:/ # sbverify /usr/share/efi/x86_64/shim.efi 
warning: data remaining[808656 vs 934024]: gaps between PE/COFF sections?
Signature verification OK

@Itxaka
Copy link
Member Author

Itxaka commented Aug 16, 2023

Building the efi livecd artifacts from tumbleweed should work, plus this is what we do already for the normal system efi artifacts, so makes no sense to have them from different base images:

kairos-io/packages#376

@Itxaka
Copy link
Member Author

Itxaka commented Aug 16, 2023

Requires: kairos-io/osbuilder#90
Requires: #1727

Results in proper secureboot booting + proper efi booting + proper bios booting and removing extra files from kairos:
image

@Itxaka
Copy link
Member Author

Itxaka commented Aug 17, 2023

patches merged to master and tested.

@Itxaka Itxaka closed this as completed Aug 17, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working
Projects
Archived in project
Development

No branches or pull requests

1 participant