[arch-general] Secure Boot Support
kristof
saposcat at myopera.com
Mon Dec 10 12:50:47 EST 2012
On Mon, 10 Dec 2012 08:26:58 -0800, kristof <saposcat at myopera.com> wrote:
> Oh, and some UEFI implementations don't actually allow users to add keys
> to the database; only remove them. The workaround to this is to delete
> all keys in the database, which would cause the computer to boot into
> "setup-mode", where a user could manually start repopulating the key
> database. However, this would cause the computer to not be able to boot,
> er, Windows. Some people would like to boot Windows.
Apologies for triple posting (that might be bad form) but I just checked
my firmware again and I cannot find an option to add keys; only delete all
keys in the database or reset to factory settings. I'd rather not try the
former option because I don't know if I'll be able to get my Windows key
back, but I do suspect that I would be able to add the 'Arch Linux' key
once I threw out the entire database that I have. I also tried using an
unsigned Gummiboot just now on secure boot; my firmware still allows me to
manually specify a .efi file to trust, and Gummiboot indeed loads, but
vmlinuz still won't load as it's not trusted by the firmware.
The point of this is that UEFI implementations are all different (I guess
manufacturers just want to be special snowflakes) and utilizing the shim
makes documentation and implementation a lot easier and a lot more
unified. The MOK database is the same for all distributions that choose to
use the shim. It'll be the same on every computer with Arch installed (if
Arch uses the shim). Adding a key will be an easy process to document. I
understand the qualms against using anything Microsoft signed (I don't
like it either) but the source of the shim is available at
http://www.codon.org.uk/~mjg59/shim-signed/shim-0.2.tar.bz2, and it's a
trivial task to verify that Microsoft hasn't tampered with the binary.
There's no arbitrary trust given to foreign entities. The highest
authority of trust remains with the distribution packagers, because
they're the ones who sign everything, and its their key(s) that ends up on
the installation media.
...if anyone else who has a securely bootable UEFI mainboard would like to
comment on whether or not they can add keys to the firmware, I'd
appreciate it if they said so.
More information about the arch-general
mailing list