-
Notifications
You must be signed in to change notification settings - Fork 36
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Properly install into a new system #4
Comments
Have you placed the policy file in the EFI partition? |
@valinet Yes, I did. I've followed up on all the steps in the main article except for generating the keys. The real strange thing is that the |
Having a certificate in the certificate store is a different matter than the kernel choosing to load your driver or not, signed or not signed. Windows does not load drivers signed with any certificate, even not self signed certificates. As I said, maybe check if you have put the SiPolicy.p7x in the EFI partition at the right place and in the right EFI partition, if the case. The thing is kind of a hack altogether, but it works once all the pieces click together. For me, usually the tough part is getting the Licensed value in the registry to stick. |
I'm using VMware for testing and I have a snapshot that everything is OK. I even copied the exact
|
I have the same problem as @masoudr, but I have only one environment - own Windows 10 Professional - for testing - and I stuck at the same point, so Licensed is 1, but I cannot enable the service and I get 577 error from Actually there is also a second difference, because when I use the command signtool I have to add /td sha256, because there is an error telling me that /td option is also obligatory. Btw. for me this ssde_query.exe and ssde_info.exe don't work - what is the result of them that I should expect? Btw. 2 - @masoudr you wrote that
how did you check that? |
I just checked the file properties, and in the signature list tab, it should say, "The digital signature is OK." |
Thanks, so I have the same. No idea why it doesn't work :( |
Well, @masoudr I know what I've missed. I didn't set PK in UEFI firmware. Now I tried to do it and replace PK from localhost-pk.der file, but I got an error "Error replacing key. Please make sure that the new key is properly formatted with signature list and serialization headers". Maybe you have the same problem as before you used VM like in the example? |
@agnieszkao, I'm not sure what you missed. But I didn't miss anything. It seems that it is a problem with my OS or something that I don't know. Anyway, I tried it on other systems, and it worked just fine. |
Can you tell me how did you set the PK in your computer? I tried to set it with |
@agnieszkao I've used the VM and used the mentioned method. |
Getting the same issue here. Licensed is 1, ssde_query.exe returns 1, selfsign.p7b is signed and is in /EFI/Microsoft/Boot. ssde.sys signature has an error "A certificate's basic constraint extension has not been observed." and the service cannot load. EDIT: Renaming the p7b file to SiPolicy.p7b fixed the issue, the signature still has an error but the service is loading on boot. |
@RibShark For the VM, I fixed the issue by deleting all pre-existing keys, and it kind of works, on the other hand, I am still unable to use it in a real machine, where I can't just simply delete the old keys. |
Just a heads up for anyone struggling with this; double check that I also had to change I also noticed So TLDR:
OS: Windows 11 Version 23H2 Build 22631.3085 |
Hi,
I've tested the method, and it worked fine when I generated the keys directly using this guide. Then I tried to export all the related keys to a new system:
I imported all the above certificates into the new system. Then I ran the
ssde_enable
and it worked as theHKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\CI\Protected\Licensed
is still 1. Thessde.sys
signature is trusted and valid. But when I want to start its service (sc start ssde
) I get the signature failure error. I am really unsure what the cause of the problem is, but I am pretty sure that the certificate shouldn't be a problem as all the related certificates are installed in the same exact locations. Any help would be appreciated.The text was updated successfully, but these errors were encountered: