From: AKASHI Takahiro <takahiro.akashi@linaro.org>
To: Luca Boccassi <luca.boccassi@gmail.com>
Cc: u-boot@lists.denx.de
Subject: Re: [PATCH] EFI: update the documentation to correctly order loading SB keys
Date: Mon, 28 Nov 2022 12:04:28 +0900 [thread overview]
Message-ID: <20221128030428.GA30007@laputa> (raw)
In-Reply-To: <CAMw=ZnRPnGNiO3anCd0J-xNPpJvehr_zSb1=LkdXf78JdEZvuA@mail.gmail.com>
On Mon, Nov 28, 2022 at 01:27:53AM +0000, Luca Boccassi wrote:
> On Mon, 28 Nov 2022 at 00:45, AKASHI Takahiro
> <takahiro.akashi@linaro.org> wrote:
> >
> > On Fri, Nov 25, 2022 at 01:30:11PM +0000, luca.boccassi@gmail.com wrote:
> > > From: Luca Boccassi <bluca@debian.org>
> > >
> > > Loading the PK locks down the EFI variables, so it needs to be done last.
> >
> > No, it's not (always) correct.
> >
> > > Fix the order in the documentation and add a note.
> > >
> > > Signed-off-by: Luca Boccassi <bluca@debian.org>
> > > ---
> > > doc/develop/uefi/uefi.rst | 12 ++++++++----
> > > 1 file changed, 8 insertions(+), 4 deletions(-)
> > >
> > > diff --git a/doc/develop/uefi/uefi.rst b/doc/develop/uefi/uefi.rst
> > > index e0835beba4..68a0bb6832 100644
> > > --- a/doc/develop/uefi/uefi.rst
> > > +++ b/doc/develop/uefi/uefi.rst
> > > @@ -169,12 +169,16 @@ Sign an image with one of the keys in "db" on your host
> > >
> > > Now in U-Boot install the keys on your board::
> > >
> > > - fatload mmc 0:1 <tmpaddr> PK.auth
> > > - setenv -e -nv -bs -rt -at -i <tmpaddr>:$filesize PK
> > > - fatload mmc 0:1 <tmpaddr> KEK.auth
> > > - setenv -e -nv -bs -rt -at -i <tmpaddr>:$filesize KEK
> > > fatload mmc 0:1 <tmpaddr> db.auth
> > > setenv -e -nv -bs -rt -at -i <tmpaddr>:$filesize db
> > > + fatload mmc 0:1 <tmpaddr> KEK.auth
> > > + setenv -e -nv -bs -rt -at -i <tmpaddr>:$filesize KEK
> > > + fatload mmc 0:1 <tmpaddr> PK.auth
> > > + setenv -e -nv -bs -rt -at -i <tmpaddr>:$filesize PK
> > > +
> > > +Note that loading a key into PK automatically enables Secure Boot, and further
> > > +unsigned updates of secure EFI variables will no longer be allowed, so PK should
> > > +be loaded last.
> >
> > KEK.auth and db.auth are created by sign-efi-sig-list command
> > (with valid keys) and contain authentication headers necessary
> > for signature verification.
> > So the original sequence works perfectly.
>
> In theory. In practice u-boot (both 2022.07 and 2022.10 in qemu)
> refused to allow setting those variables after PK is set, which made
> me waste an unnecessary amount of time. Otherwise I wouldn't have
> bothered sending this...
I re-ran my test_efi_secboot test on v2022.10 with sandbox_defconfig
and didn't see any error.
(Test case 1 verified that we could install PK, KEK and db
in this order.)
If you see this kind of error, it's likely that you have
wrong configuration.
If you're not sure, please describe what you did and saw
in details.
-Takahiro Akashi
> Kind regards,
> Luca Boccassi
prev parent reply other threads:[~2022-11-28 3:04 UTC|newest]
Thread overview: 4+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-11-25 13:30 [PATCH] EFI: update the documentation to correctly order loading SB keys luca.boccassi
2022-11-28 0:45 ` AKASHI Takahiro
2022-11-28 1:27 ` Luca Boccassi
2022-11-28 3:04 ` AKASHI Takahiro [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20221128030428.GA30007@laputa \
--to=takahiro.akashi@linaro.org \
--cc=luca.boccassi@gmail.com \
--cc=u-boot@lists.denx.de \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox