Page MenuHomeFreeBSD

Implement Secure Boot in loader.
AbandonedPublic

Authored by kd on Jan 9 2019, 6:16 PM.
Tags
None
Referenced Files
Unknown Object (File)
Thu, Dec 12, 11:27 AM
Unknown Object (File)
Thu, Dec 5, 6:32 AM
Unknown Object (File)
Fri, Nov 29, 9:24 AM
Unknown Object (File)
Nov 24 2024, 10:59 PM
Unknown Object (File)
Nov 12 2024, 12:20 AM
Unknown Object (File)
Nov 10 2024, 12:13 PM
Unknown Object (File)
Nov 3 2024, 4:35 PM
Unknown Object (File)
Nov 3 2024, 4:35 PM

Details

Reviewers
trasz
cem
sjg
mw
wma
Group Reviewers
secteam
Summary

This patch adds signature verification routines to the loader. It uses the newly added secureboot library. The trusted/revoked certificates are obtained from UEFI db/dbx variables. Support for authorized timestampts stored in dbt are not implemented. Headers with definitions of UEFI standardized structures were copied from edk2

Diff Detail

Lint
Lint Skipped
Unit
Tests Skipped

Event Timeline

kd created this object with visibility "Custom Policy".
kd changed the visibility from "Custom Policy" to "Public (No Login Required)".

There is potentially a lot of overlap with D16335 libsecureboot could be a better name for that than libve.
It would be good to leverage both.

For example D16335 contains an api which can verify hash of file as side effect of reading (reduces boot overhead),
it isn't used yet due to the considerable churn on loader module reading logic.
Also D16335 can work without UEFI - but the combination would be better.

Phab is a horrible way to conduct a discussion though - perhaps an email exchange would be useful.