Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

baramundi-shim-20210203 #130

Closed
8 tasks done
ghost opened this issue Feb 3, 2021 · 7 comments
Closed
8 tasks done

baramundi-shim-20210203 #130

ghost opened this issue Feb 3, 2021 · 7 comments
Labels
incomplete This submission is missing required bits new vendor This is a new vendor superseded Vendor has added a new review which makes this obsolete

Comments

@ghost
Copy link

ghost commented Feb 3, 2021

Make sure you have provided the following information:

What organization or people are asking to have this signed:

baramundi software AG

What product or service is this for:

baramundi Management Suite

What is the origin and full version number of your shim?

https://github.com/baramundisoftware/shim/tree/baramundi-shim-08

What's the justification that this really does need to be signed for the whole world to be able to boot it:

The SHIM bootloader starts a grub2 which decides if it should boot the local installed windows operating system or netboot a windows PE image.
This is necessary to support remote operating system installation on clients in the LAN.
With a signed SHIM bootloader we are able to support clients with enabled secure boot feature.

How do you manage and protect the keys used in your SHIM?

Private key is stored in hardware module with controlled access.

Do you use EV certificates as embedded certificates in the SHIM?

Yes

If you use new vendor_db functionality, are any hashes whitelisted, and if yes: for what binaries ?

No

Is kernel upstream commit 75b0cea7bf307f362057cc778efe89af4c615354 present in your kernel, if you boot chain includes a linux kernel ?

No Linux kernel is used.

if SHIM is loading grub2 bootloader, is CVE CVE-2020-10713 fixed ?
Did you change your certificate strategy, so that affected by CVE CVE-2020-10713 grub2 bootloaders can not be verified ?
What is the origin and full version number of your bootloader (GRUB or other)?
If your SHIM launches any other components, please provide further details on what is launched

Our shim only launches the mentioned grub 2.04

How do the launched components prevent execution of unauthenticated code?
  • with standard grub 2.04 functionality, we prevent to start any unsigned bootloader
Does your SHIM load any loaders that support loading unsigned kernels (e.g. GRUB)?
  • No
What kernel are you using? Which patches does it includes to enforce Secure Boot?
  • We launch Windows and Windows PE loader and kernel
What changes were made since your SHIM was last signed?

This is the first submission

What is the hash of your final SHIM binary?
  • shim_x64 MD5 hash: c0a928af63609a4c9ada8a297f027028
  • shim_x86 MD5 hash: 537899f7377ff2486bd0527bd0418230
@julian-klode
Copy link
Collaborator

julian-klode commented Feb 3, 2021

I suggest you just use the pre-built grub from Ubuntu (since you're basing on that), there's no need here for having your own signing keys since you just chainload windows.

Note that in any case, signing is suspended at the moment until at least SBAT work is complete (#120)

@ghost
Copy link
Author

ghost commented Feb 4, 2021

Thank you for your remark.

We have implemented and integrated a grub module to be able to control the boot process from a central server. We compile the grub with all necessary modules into one binary, which includes our own module, therefore we cannot use the default ubuntu grub2 bootloader.

If you have further questions we are happy to answer them.

We are aware, that the signing is currently suspended, thank you.

@julian-klode
Copy link
Collaborator

julian-klode commented Feb 4, 2021

Well, then, you have pointed at the unmodified Ubuntu source code tree. Point to the actual grub tree. Implying that you use unmodified ones and not pointing us at the real tree is bad taste.

@julian-klode
Copy link
Collaborator

FWIW, I don't understand the use of grub here, you have two things to chainload, it'd be far easier to write a custom EFI binary and get it signed by MS directly than to go a shim+grub approach.

@ghost
Copy link

ghost commented Feb 8, 2021

Hello again and thanks for responding that fast.
You're right, our modifications on grub2 are marginal, but writing an own EFI binary now would cost us way more time for a similar result. Currently the source code for our modified grub2 bootloader isn't on github. We follow our policy and give it to anyone who requests it by CD or the like. According to your suggestion, we added a hint, that we extended the grub2.
Is it possible to provide the modified grub2 source code for you without publishing it on github?

@martinezjavier
Copy link
Contributor

@baramundi-fsauer please update this request to use the shim 15.4 release. Or close this issue and file a new one based on that version.

@julian-klode julian-klode added the incomplete This submission is missing required bits label Apr 16, 2021
@steve-mcintyre steve-mcintyre added the new vendor This is a new vendor label Apr 20, 2021
@steve-mcintyre
Copy link
Collaborator

@baramundi-fsauer sorry you've had a bad experience here. Especially in the last few months we've had a massive amount of work to do on shim upstream. That has cumlminated in latest 15.4 release, and even then there are a few recommended patches on top (see #165). We're catching up on a lot of reviews now.

As others have said, builds based on older shim versions will not meet the requirements for signing any more so I'm afraid you'll have to move forwards to 15.4. I'm therefore closing this review now - please open a new one when you have a 15.4 build ready.

I'm trying to steer shim development discussions into being more open, and we have a mailing list now: https://lists.einval.com/cgi-bin/mailman/listinfo/efi

@frozencemetery frozencemetery added the superseded Vendor has added a new review which makes this obsolete label Oct 11, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
incomplete This submission is missing required bits new vendor This is a new vendor superseded Vendor has added a new review which makes this obsolete
Projects
None yet
Development

No branches or pull requests

4 participants