-
Notifications
You must be signed in to change notification settings - Fork 131
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Shim 15.8 for Cisco #411
Comments
I'm not an official reviewer, but I just want to help reduce the work load of official reviewers.
|
Hello reviewers @steve-mcintyre @aronowski, it would be really helpful if you could kindly review our submission for the shim review. Our last two shim review submission #354 and #126 got closed before being approved and we have been trying to get the shim review completed for a while. A lot of teams at Cisco are dependent on this shim and we would really appreciate if you could kindly review our submission. |
On 2024.05.15 12:18:44, vasudevluthra wrote:
Hello reviewers @steve-mcintyre @aronowski, it would be really helpful if you
could kindly review our submission for the shim review.
Yes, but we do have limited resources ourselves. It would also be really helpful
if we got some help in this matter as well. There are some applications, where
it would come in handy for people to do some community work and help us review
these.
Our last two shim review submission #354 and #126 got closed before being
approved and we have been trying to get the shim review completed for a while.
I know that feeling. I myself have been trying for about 2 years.
A lot of teams at Cisco are dependent on this shim and we would really
appreciate if you could kindly review our submission.
Should I help and write an application to convince the managers, that investing
a certain amount of the current budget will help in the long term?
…
--
Reply to this email directly or view it on GitHub:
#411 (comment)
You are receiving this because you were mentioned.
Message ID: ***@***.***>
|
Review of
|
There's still a worry about using keys larger than 2048 bits of RSA; older firmware versions on older machines may not work. We're hoping to get some testing done to give us better data here. For now, we have to allow 2048-bit RSA. |
Hello reviewers @THS-on and @steve-mcintyre, thank you for reviewing our submission. Based on your comments, we have made changes to the Dockerfile to use the release tarball instead of the git branch. The updated tag is https://github.com/cisco/sto-uefi-secure-bootloader/releases/tag/cisco-shim-x86_64-20240613 , I have also updated the tag in the checklist for this issue. In addition, to address your questions,
@aronowski We have started some conversations internally with the goal to be more involved in contributing to the shim community. |
Hi @vasudevluthra thank you for the updates and answering the questions. Because you don't use ephemeral key signing for the Linux kernel can provide an answer to from above:
|
Hi @THS-on thank you for your comment. We use our own embedded cert in the kernel to verify our signatures. The kernel can be delivered with new embedded keys as needed that do not allow loading older modules. |
@vasudevluthra thanks for the clarification. Ideally you would switch the cert every time, but I think its fine for now. @steve-mcintyre what do you think? |
Review of
|
@vasudevluthra just one question, what do you mean by Can you rub objcopy on the efi and paste here the SBAT entries from your grub*.efi? |
Hi @SherifNagy, thank you for your review. We only rebuild the kernels with additional hardening, which requires us to sign with our own key. We do resign GRUB with the same key but we have no need to rebuild GRUB. This is the SBAT entry for the grub: |
Checking the existing reviews, I think this looks good. Accepted! |
Thanks a lot for the review and acceptance @steve-mcintyre! We really appreciate it. |
@vasudevluthra did you get a signed Shim back? |
closing, as there hasn't been a response for over a month |
Hi @THS-on my apologies for the delay in my response. Yes, we did get a signed shim back. Really appreciate your support in the process! |
Confirm the following are included in your repo, checking each box:
N/A
N/A
N/A
What is the link to your tag in a repo cloned from rhboot/shim-review?
https://github.com/cisco/sto-uefi-secure-bootloader/releases/tag/cisco-shim-x86_64-20240415
Updated tag after modifying Dockerfile to use release tarball instead of git branch
https://github.com/cisco/sto-uefi-secure-bootloader/releases/tag/cisco-shim-x86_64-20240613
What is the SHA256 hash of your final SHIM binary?
SHA2-256(shimx64.efi)= 7d8bce770e56b615ba2b7021f56611fdb50948ebac4693fb0952e89d3c9e0258
What is the link to your previous shim review request (if any, otherwise N/A)?
#354
#126
#37 (accepted)
If no security contacts have changed since verification, what is the link to your request, where they've been verified (if any, otherwise N/A)?
#354 (comment)
The text was updated successfully, but these errors were encountered: