The following warnings occurred:
Warning [2] count(): Parameter must be an array or an object that implements Countable - Line: 807 - File: showthread.php PHP 7.3.15 (Linux)
File Line Function
/showthread.php 807 errorHandler->error





Post Reply 
 
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
UEFI Secureboot with iPXE (selfsigned db,pk keys or shim + company cert signed by M$)
2016-10-19, 13:43
Post: #1
UEFI Secureboot with iPXE (selfsigned db,pk keys or shim + company cert signed by M$)
Hi!

If we assume the following scenario to be true:
"Someone got Micro$oft to sign a ipxe.efi file so we could use ipxe.efi with full secureboot=on support (stock M$ uefi certificates in firmware)."

From within ipxe, we would not be able to start any linux installations the way we're used to, in other words this would not work:
initrd http://192.168.1.100/rhel72/images/pxeboot/initrd.img
chain http://192.168.1.100/rhel72/images/pxeboot/vmlinuz initrd=initrd.img inst.repo=http://192.168.1.100/centos7/

Because these linux kernels are not signed by Microsoft, only Red Hat.
I do understand that by adding our own selfsigned keys to UEFI firmware (db,kek,pk), and sign everything ourself it works as expected (I have that tested to be true, and it works fine).

But could it be possible for iPXE to work together with shim (first stage bootloader), as shim+grub works for Red Hat/Fedora and ubuntu?
If we got Microsoft to sign our own custom shim, with our company cert (VENDOR_CERT_FILE), then iPXE would have to have to do some "shim_lock|verify" function as grub does. Could this work?

(The idea is to just use stock uefi firmware keys, so we don't need to install our own uefi keys in db,kek,pk).

--
Torgeir
Find all posts by this user
Quote this message in a reply
Post Reply 


Messages In This Thread
UEFI Secureboot with iPXE (selfsigned db,pk keys or shim + company cert signed by M$) - Torgeir - 2016-10-19 13:43



User(s) browsing this thread: 1 Guest(s)