Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Secure Boot Certification #318

Open
fthobe opened this issue Jan 18, 2025 · 2 comments
Open

Secure Boot Certification #318

fthobe opened this issue Jan 18, 2025 · 2 comments

Comments

@fthobe
Copy link
Contributor

fthobe commented Jan 18, 2025

@PartialVolume @Knogle

I would like to throw in a crazy proposal:
#8 is pretty much as old as this repo

I believe that the secure boot certification process is only half as terrible as we all believe.
In the case of shredOS none of the preinstalled packages / drivers will flag any larger security issues.

The 2 man squad of 2Pint Software has done it and I know people at Microsoft, maybe we can just give this a try:
UPDATED: UEFI Signing Requirements (external link to Microsoft)

I might know somebody with experience in this space within the Microsoft BizSpark Program and reach out to get some help.
With some helping hand this might be less complicated than universally assumed because nobody ever goes and asks Microsoft for an audit of the code because it's Microsoft.

There would be some bureaucrazy (pun intended) to do that. Most notably an EV certificate made out on an organization, but I think open collective could be on board for that. Alternatively I know people at the linux foundation.

@jamesaepp
Copy link

Why do this specifically for ShredOS? Has the end-to-end secure boot signing process been documented somewhere (outside of the bureaucrazy at Microsoft)?

There are merits to the idea but I can't help but think it would be better to make this into its own separate process (and more democratic bureaucrazy) to serve as middle-man between the beast of MS and the various FLOSS communities who might enjoy secure boot signing.

@fthobe
Copy link
Contributor Author

fthobe commented Jan 21, 2025

Why do this specifically for ShredOS? Has the end-to-end secure boot signing process been documented somewhere (outside of the bureaucrazy at Microsoft)?

It's on a per product base, so if MS shim it's for shredos and shredos only

There are merits to the idea but I can't help but think it would be better to make this into its own separate process (and more democratic bureaucrazy) to serve as middle-man between the beast of MS and the various FLOSS communities who might enjoy secure boot signing.

The current hang of Floss is to take a valid shim that's either be signed to the distribution (Ubuntu) or cross signed by MS (I believe red hat).

There are possibilities to chain valid shims before the actual shredos shim without requesting a validation. I was just throwing it out here.

@PartialVolume what do you think?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants