Hi
I don't think we currently have a documented way to revoke old kernels
for secure boot. Are there known plans by other distributions? Or
should we just force the inclusion of SBAT and use it as intended?
Regards,
Bastian
--
... The prejudices people feel about each other disappear when they get
to know each other.
-- Kirk, "Elaan of Troyius", stardate 4372.5
At the moment the best options are:
- rotate online signing key
- build new shim with old signing key in vendorx (revoked ESL)
- build new kernels with old signing key built-in revoked keyring
This is to ensure that old shim & old kernel can boot or kexec new kernels. To ensure new shim cannot boot old kernels.
To ensure that new kernels cannot kexec old kernels.
This is revocation strategy used by Canonical Kernel Team for Ubuntu
Kernels.
There is no sbat for kernels yet (and/or nobody has yet started to use sbat for kernels).
At the moment the best options are:
- rotate online signing key
- build new shim with old signing key in vendorx (revoked ESL)
- build new kernels with old signing key built-in revoked keyring
This is to ensure that old shim & old kernel can boot or kexec new kernels. >To ensure new shim cannot boot old kernels.
To ensure that new kernels cannot kexec old kernels.
This is revocation strategy used by Canonical Kernel Team for Ubuntu Kernels.
There is no sbat for kernels yet (and/or nobody has yet started to use sbat for
kernels).
On Wed, Dec 13, 2023 at 10:18:40PM +0000, Dimitri John Ledkov wrote:
There is no sbat for kernels yet (and/or nobody has yet started to use sbat forIt's a difficult thing to do, especially in light of significant
kernels).
pushback from upstream developers.
On Thu, Dec 14, 2023 at 03:09:51PM +0000, Steve McIntyre wrote:
It's a difficult thing to do, especially in light of significant
pushback from upstream developers.
Sysop: | Keyop |
---|---|
Location: | Huddersfield, West Yorkshire, UK |
Users: | 498 |
Nodes: | 16 (2 / 14) |
Uptime: | 60:38:39 |
Calls: | 9,812 |
Files: | 13,754 |
Messages: | 6,191,180 |