commit | 48ba0041977ac44023aeb72c8ccddb94e4512a43 | [log] [tgz] |
---|---|---|
author | Nicholas Bishop <nicholasbishop@google.com> | Wed Apr 12 20:21:35 2023 |
committer | Chromeos LUCI <chromeos-scoped@luci-project-accounts.iam.gserviceaccount.com> | Thu Apr 13 22:45:22 2023 |
tree | 3aff78de2912a92774fdde81703368cd5223f487 | |
parent | 457d2f975593913800900d25f1f5fa0b09118066 [diff] |
Set second-stage bootloader to crdyboot BUG=b:192464477 TEST=make build-no-cache TEST=Modify secure_boot_test to copy in the updated Dockerfile TEST=secure_boot_test sign <disk> TEST=secure_boot_test vm TEST=secure_boot_test vm --ia32 Change-Id: I0e7bc7943a307a146a6f649f92559e0ce87afeac Reviewed-on: https://chromium-review.googlesource.com/c/chromiumos/shim-review/+/4420627 Tested-by: Nicholas Bishop <nicholasbishop@google.com> Commit-Queue: Nicholas Bishop <nicholasbishop@google.com> Reviewed-by: Ted Brandston <tbrandston@google.com> Reviewed-by: Jeffery Miller <jefferymiller@google.com>
ChromeOS (reven board)
ChromeOS is a Linux distribution. We want to enable (and encourage) our user base to boot ChromeOS (reven) with secure boot enabled.
Reusing another distro's shim would require reusing their grub and kernel as well. We do not use grub, and we need to build our own kernel, so this would not work.
(Key should be signed by the other security contacts, pushed to a keyserver like keyserver.ubuntu.com, and preferably have signatures that are reasonably well known in the Linux community.)
(Key should be signed by the other security contacts, pushed to a keyserver like keyserver.ubuntu.com, and preferably have signatures that are reasonably well known in the Linux community.)
Please create your shim binaries starting with the 15.7 shim release tar file: https://github.com/rhboot/shim/releases/download/15.7/shim-15.7.tar.bz2
This matches https://github.com/rhboot/shim/releases/tag/15.7 and contains the appropriate gnu-efi source.
We confirm that our shim binaries are built from the referenced tarball.
https://github.com/rhboot/shim/tree/15.7
N/A
CVE-2020-14372
CVE-2020-25632
CVE-2020-25647
CVE-2020-27749
CVE-2020-27779
CVE-2021-20225
CVE-2021-20233
CVE-2020-10713
CVE-2020-14308
CVE-2020-14309
CVE-2020-14310
CVE-2020-14311
CVE-2020-15705
CVE-2021-3418 (if you are shipping the shim_lock module)
CVE-2021-3695
CVE-2021-3696
CVE-2021-3697
CVE-2022-28733
CVE-2022-28734
CVE-2022-28735
CVE-2022-28736
CVE-2022-28737
CVE-2022-2601
CVE-2022-3775
N/A
N/A
Pre-SBAT shim builds have been sent to Microsoft for revocation. Our current cert has not been used to sign anything pre-SBAT.
Yes, all three commits are in the chromeos-5.10
branch our kernel is built from: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/refs/heads/chromeos-5.10
Our kernel is built from the chromeos-5.10
branch: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/refs/heads/chromeos-5.10
This is the same kernel branch as all other ChromeOS devices that are on the 5.10 kernel. The chromeos-5.10
branch frequently merges the latest changes from the 5.10 stable kernel. There are a significant number of backports and ChromeOS-specific patches, too many to list here. ChromeOS-specific patches can be identified by the CHROMIUM:
prefix in the commit message.
We do not use this functionality.
N/A: we already switched to a new certificate for our Shim 15.4 submission: https://github.com/rhboot/shim-review/issues/204
The Dockerfile
in this repository will reproduce our shim build. As a convenience, make build-no-cache
will do a clean build.
This should include logs for creating the buildroots, applying patches, doing the build, creating the archives, etc.
fe3be90c56aa829949ad716126eaab3dfeb610fc216209cd6ab0ae0eac5eccb3 shimia32.efi 9983bd0887430bf6f86b99bb0595eeb2cfa2da09c2baef7803880092c45bde66 shimx64.efi
The keys used in this shim are generated and stored in an HSM. They are then encrypted for export to a signing fleet for usage in build signing by our CI pipeline, where they remain encrypted at rest. Only 4 trusted individuals in the org have access to the signing fleet machines, enforced by ACL and 2FA.
No.
sbat,1,SBAT Version,sbat,1,https://github.com/rhboot/shim/blob/main/SBAT.md shim,3,UEFI shim,shim,1,https://github.com/rhboot/shim shim.chromeos,2,ChromeOS,shim,15.7,https://chromium.googlesource.com/chromiumos/shim-review
sbat,1,SBAT Version,sbat,1,https://github.com/rhboot/shim/blob/main/SBAT.md crdyboot,1,Google,crdyboot,1.0.0,https://chromium.googlesource.com/crdyboot
N/A
Crdyboot 1.0.0
N/A
N/A
Our shim will only launch our signed crdyboot build, which in turn will only launch our signed kernel. The kernel is configured to enable lockdown.
No
Our kernel is based on 5.10 and enforces lockdown. Source repo: https://chromium.googlesource.com/chromiumos/third_party/kernel/+/refs/heads/chromeos-5.10
N/A