blob: bc94809276d3f2fb4abacf0491dc1a11e48aa6a0 [file] [log] [blame] [view] [edit]
Make sure you have provided the following information:
- [ ] link to your code branch cloned from rhboot/shim-review in the form user/repo@tag
- [ ] completed README.md file with the necessary information
- [ ] shim.efi to be signed
- [ ] public portion of your certificate(s) embedded in shim (the file passed to VENDOR_CERT_FILE)
- [ ] binaries, for which hashes are added do vendor_db ( if you use vendor_db and have hashes allow-listed )
- [ ] any extra patches to shim via your own git tree or as files
- [ ] any extra patches to grub via your own git tree or as files
- [ ] build logs
- [ ] a Dockerfile to reproduce the build of the provided shim EFI binaries
###### What organization or people are asking to have this signed:
`[your text here]`
###### What product or service is this for:
`[your text here]`
###### Please create your shim binaries starting with the 15.4 shim release tar file:
###### https://github.com/rhboot/shim/releases/download/15.4/shim-15.4.tar.bz2
###### This matches https://github.com/rhboot/shim/releases/tag/15.4 and contains
###### the appropriate gnu-efi source.
###### Please confirm this as the origin your shim.
`[your text here]`
###### What's the justification that this really does need to be signed for the whole world to be able to boot it:
`[your text here]`
###### How do you manage and protect the keys used in your SHIM?
`[your text here]`
###### Do you use EV certificates as embedded certificates in the SHIM?
`[your text here]`
###### If you use new vendor_db functionality, are any hashes allow-listed, and if yes: for what binaries ?
`[your text here]`
###### Is kernel upstream commit 75b0cea7bf307f362057cc778efe89af4c615354 present in your kernel, if you boot chain includes a Linux kernel ?
`[your text here]`
###### if SHIM is loading GRUB2 bootloader, are CVEs CVE-2020-14372,
###### CVE-2020-25632, CVE-2020-25647, CVE-2020-27749, CVE-2020-27779,
###### CVE-2021-20225, CVE-2021-20233, CVE-2020-10713, CVE-2020-14308,
###### CVE-2020-14309, CVE-2020-14310, CVE-2020-14311, CVE-2020-15705,
###### ( July 2020 grub2 CVE list + March 2021 grub2 CVE list )
###### and if you are shipping the shim_lock module CVE-2021-3418
###### fixed ?
`[your text here]`
###### "Please specifically confirm that you add a vendor specific SBAT entry for SBAT header in each binary that supports SBAT metadata
###### ( grub2, fwupd, fwupdate, shim + all child shim binaries )" to shim review doc ?
###### Please provide exact SBAT entries for all SBAT binaries you are booting or planning to boot directly through shim
`[your text here]`
##### Were your old SHIM hashes provided to Microsoft ?
`[your text here]`
##### Did you change your certificate strategy, so that affected by CVE-2020-14372, CVE-2020-25632, CVE-2020-25647, CVE-2020-27749,
##### CVE-2020-27779, CVE-2021-20225, CVE-2021-20233, CVE-2020-10713,
##### CVE-2020-14308, CVE-2020-14309, CVE-2020-14310, CVE-2020-14311, CVE-2020-15705 ( July 2020 grub2 CVE list + March 2021 grub2 CVE list )
##### grub2 bootloaders can not be verified ?
`[your text here]`
##### What exact implementation of Secureboot in grub2 ( if this is your bootloader ) you have ?
##### * Upstream grub2 shim_lock verifier or * Downstream RHEL/Fedora/Debian/Canonical like implementation ?
`[your text here]`
###### What is the origin and full version number of your bootloader (GRUB or other)?
`[your text here]`
###### If your SHIM launches any other components, please provide further details on what is launched
`[your text here]`
###### If your GRUB2 launches any other binaries that are not Linux kernel in SecureBoot mode,
###### please provide further details on what is launched and how it enforces Secureboot lockdown
`[your text here]`
###### If you are re-using a previously used (CA) certificate, you
###### will need to add the hashes of the previous GRUB2 binaries
###### exposed to the CVEs to vendor_dbx in shim in order to prevent
###### GRUB2 from being able to chainload those older GRUB2 binaries. If
###### you are changing to a new (CA) certificate, this does not
###### apply. Please describe your strategy.
`[your text here]`
###### How do the launched components prevent execution of unauthenticated code?
`[your text here]`
###### Does your SHIM load any loaders that support loading unsigned kernels (e.g. GRUB)?
`[your text here]`
###### What kernel are you using? Which patches does it includes to enforce Secure Boot?
`[your text here]`
###### What changes were made since your SHIM was last signed?
`[your text here]`
###### What is the SHA256 hash of your final SHIM binary?
`[your text here]`