-
Notifications
You must be signed in to change notification settings - Fork 66
VMware by Broadcom Missing PK-signed KEK #369
Description
I write this in my personal capacity and NOT as part of my employment/employer.
The core questions: Does VMware not have PKs for VMs created before ESXi 9? Does Microsoft recommend that VMware customers be installing a Microsoft PK?
I'm very confused by VMware's guidance documented in the below KBs (in particular the second one). I'm sure I can't be the only one.
-
https://knowledge.broadcom.com/external/article/423893/secure-boot-certificate-expirations-and.html
-
https://knowledge.broadcom.com/external/article/423919/manual-update-of-secure-boot-variables-i.html
KB423893 states:
On virtual machines created on ESXi versions earlier than 9.0, the PK is configured with a NULL signature by default due to previous design considerations. In this case, the platform cannot authorize updates to the KEK, which in turn prevents subsequent DB and DBX updates.
and:
There is no automated resolution available at this time. In coordination with Microsoft, Broadcom Engineering Team is actively working towards implementing an automated solution in a future release to update the Platform Key (PK) on the affected VMs which will facilitate the certificate rollout...
KB423919 describes the process to install both the PK and 2023KEK. What I find very peculiar however is that the KB recommends administrators to install PreSignedObjects/PK/Certificate/WindowsOEMDevicesPK.der as the PK, and not some Broadcom-specific PK.
All these facts together, I launch into questions I'm hoping a combination of ESXi9 users, Microsoft staff, and Broadcom staff can help with:
-
Who maintains the private key to the WindowsOEMDevicesPK certificate?
-
What happens if the private key to the WindowsOEMDevicesPK certificate is compromised? What safeguards are in place to prevent this?
-
What are Microsoft's recommendations for using WindowsOEMDevicesPK as a trust anchor/platform key? When should administrators not install trust in that key?
-
Is this type of arrangement (an OEM without a PK on secureboot-capable devices) ... normal? Best practice? Or does VMware stand alone amongst its peers?
-
What PK is present on ESXi9 VMs? Is it the WindowsOEMDevicesPK cert? If not and it's a VMware-specific PK, can that PK be back-ported to VMs on older ESXi versions?
-
What will the "automated solution" look like and when will administrators get it? Automating via Windows (the guest) should be impossible as the KEK2023 update wouldn't be authenticated (signed) by anything. It could be feasible via an ESXi (8 only) update but there's zero indication what that will look like.
-
Whatever this "automated solution" is, will administrators need to take some manual action on their VMs to apply the updates beyond AvailableUpdates (Windows land) or fwupd (Linux land)?
-
If VMware takes the approach of back-porting a PK to ESXi8 (or earlier) systems, will they also sign Microsoft's 2023 KEK and be uploaded to this repository like any other OEM?
Tagging a couple people who I hope might have the expertise to add commentary:
-
@haz-ard-9 - who generously created a PowerShell script to help administrators with installation of the WindowsOEMDevicesPK PK.
-
@plankers - who needs no introduction.