public inbox for u-boot@lists.denx.de
 help / color / mirror / Atom feed
* EFI Secure boot default keys
@ 2023-06-28 16:26 Neil Jones
  2023-06-29  1:01 ` AKASHI Takahiro
  0 siblings, 1 reply; 8+ messages in thread
From: Neil Jones @ 2023-06-28 16:26 UTC (permalink / raw)
  To: u-boot@lists.denx.de

Please can someone describe the format of the file needed for the default / built-in EFI secure boot keys (ubootefi.var)

The only docs I have found suggest its best to enroll the keys from within u-boot onto some removable media, then copy this off and use this as the default, this is not very helpful and doesn't work for me:

=> fatload mmc 0:1 ${loadaddr} PK.aut
2053 bytes read in 18 ms (111.3 KiB/s)
=> setenv -e -nv -bs -rt -at -i ${loadaddr}:$filesize PK
setenv - set environment variables

Usage:
setenv setenv [-f] name value ...
    - [forcibly] set environment variable 'name' to 'value ...'
setenv [-f] name
    - [forcibly] delete environment variable 'name'

my setenv doesn't support all the extra switches ? This is with 2022.04, all other EFI options seem to be in this release and I can boot unsigned EFI images ok.

Cheers,

Neil




^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: EFI Secure boot default keys
  2023-06-28 16:26 EFI Secure boot default keys Neil Jones
@ 2023-06-29  1:01 ` AKASHI Takahiro
  2023-07-05 13:24   ` Neil Jones
  0 siblings, 1 reply; 8+ messages in thread
From: AKASHI Takahiro @ 2023-06-29  1:01 UTC (permalink / raw)
  To: Neil Jones; +Cc: u-boot@lists.denx.de

On Wed, Jun 28, 2023 at 04:26:58PM +0000, Neil Jones wrote:
> Please can someone describe the format of the file needed for the default / built-in EFI secure boot keys (ubootefi.var)
> 
> The only docs I have found suggest its best to enroll the keys from within u-boot onto some removable media, then copy this off and use this as the default, this is not very helpful and doesn't work for me:
> 
> => fatload mmc 0:1 ${loadaddr} PK.aut
> 2053 bytes read in 18 ms (111.3 KiB/s)
> => setenv -e -nv -bs -rt -at -i ${loadaddr}:$filesize PK
> setenv - set environment variables
> 
> Usage:
> setenv setenv [-f] name value ...
>     - [forcibly] set environment variable 'name' to 'value ...'
> setenv [-f] name
>     - [forcibly] delete environment variable 'name'
> 
> my setenv doesn't support all the extra switches ? This is with 2022.04, all other EFI options seem to be in this release and I can boot unsigned EFI images ok.

Please turn on CONFIG_CMD_NVEDIT_EFI when building your U-Boot.

This option was disabled by the commit:
        commit 3b728f8728fa (tag: efi-2020-01-rc1)
        Author: Heinrich Schuchardt <xypron.glpk@gmx.de>
        Date:   Sun Oct 6 15:44:22 2019 +0200

            cmd: disable CMD_NVEDIT_EFI by default

The binary size of efi has grown much since in the past, though.

-Takahiro Akashi

> Cheers,
> 
> Neil
> 
> 
> 

^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: EFI Secure boot default keys
  2023-06-29  1:01 ` AKASHI Takahiro
@ 2023-07-05 13:24   ` Neil Jones
  2023-07-06  1:38     ` AKASHI Takahiro
  0 siblings, 1 reply; 8+ messages in thread
From: Neil Jones @ 2023-07-05 13:24 UTC (permalink / raw)
  To: AKASHI Takahiro; +Cc: u-boot@lists.denx.de

>> Please can someone describe the format of the file needed for the default / built-in EFI secure boot keys (ubootefi.var)
>>
>> The only docs I have found suggest its best to enroll the keys from within u-boot onto some removable media, then copy this off and use this as the default, this is not very helpful and doesn't work for me:
>>
>> => fatload mmc 0:1 ${loadaddr} PK.aut
>> 2053 bytes read in 18 ms (111.3 KiB/s)
>> => setenv -e -nv -bs -rt -at -i ${loadaddr}:$filesize PK
>> setenv - set environment variables
>>
>> Usage:
>> setenv setenv [-f] name value ...
>>     - [forcibly] set environment variable 'name' to 'value ...'
>> setenv [-f] name
>>     - [forcibly] delete environment variable 'name'
>>
>> my setenv doesn't support all the extra switches ? This is with 2022.04, all other EFI options seem to be in this release and I can boot unsigned EFI images ok.
>
>Please turn on CONFIG_CMD_NVEDIT_EFI when building your U-Boot.
>
>This option was disabled by the commit:
>        commit 3b728f8728fa (tag: efi-2020-01-rc1)
>        Author: Heinrich Schuchardt <xypron.glpk@gmx.de>
>        Date:   Sun Oct 6 15:44:22 2019 +0200
>
>        cmd: disable CMD_NVEDIT_EFI by default
>
>The binary size of efi has grown much since in the past, though.
>
>-Takahiro Akashi

Thanks, I have secure boot working now. A tool to generate the ubootefi.var offline or even just a description of the file format would be very useful. I have noticed one issue when using ubootefi.var on mmc, when I switch boot order it wipes out the keys and I have to re-enrol them:

=> fatls mmc 0:1
     3040   ubootefi.var

 1 file(s), 0 dir(s)

=> efidebug boot order 2 1
=> fatls mmc 0:1
      440   ubootefi.var

(Size drops from 3040 to 440 bytes and keys have gone)





________________________________
From: AKASHI Takahiro <takahiro.akashi@linaro.org>
Sent: 29 June 2023 02:01
To: Neil Jones <neil.jones@blaize.com>
Cc: u-boot@lists.denx.de <u-boot@lists.denx.de>
Subject: Re: EFI Secure boot default keys

On Wed, Jun 28, 2023 at 04:26:58PM +0000, Neil Jones wrote:
> Please can someone describe the format of the file needed for the default / built-in EFI secure boot keys (ubootefi.var)
>
> The only docs I have found suggest its best to enroll the keys from within u-boot onto some removable media, then copy this off and use this as the default, this is not very helpful and doesn't work for me:
>
> => fatload mmc 0:1 ${loadaddr} PK.aut
> 2053 bytes read in 18 ms (111.3 KiB/s)
> => setenv -e -nv -bs -rt -at -i ${loadaddr}:$filesize PK
> setenv - set environment variables
>
> Usage:
> setenv setenv [-f] name value ...
>     - [forcibly] set environment variable 'name' to 'value ...'
> setenv [-f] name
>     - [forcibly] delete environment variable 'name'
>
> my setenv doesn't support all the extra switches ? This is with 2022.04, all other EFI options seem to be in this release and I can boot unsigned EFI images ok.

Please turn on CONFIG_CMD_NVEDIT_EFI when building your U-Boot.

This option was disabled by the commit:
        commit 3b728f8728fa (tag: efi-2020-01-rc1)
        Author: Heinrich Schuchardt <xypron.glpk@gmx.de>
        Date:   Sun Oct 6 15:44:22 2019 +0200

            cmd: disable CMD_NVEDIT_EFI by default

The binary size of efi has grown much since in the past, though.

-Takahiro Akashi

> Cheers,
>
> Neil
>
>
>

^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: EFI Secure boot default keys
  2023-07-05 13:24   ` Neil Jones
@ 2023-07-06  1:38     ` AKASHI Takahiro
  2023-07-06  8:23       ` Neil Jones
  2023-07-06 18:02       ` Heinrich Schuchardt
  0 siblings, 2 replies; 8+ messages in thread
From: AKASHI Takahiro @ 2023-07-06  1:38 UTC (permalink / raw)
  To: Neil Jones; +Cc: xypron.glpk, u-boot@lists.denx.de

Hi,

On Wed, Jul 05, 2023 at 01:24:32PM +0000, Neil Jones wrote:
> >> Please can someone describe the format of the file needed for the default / built-in EFI secure boot keys (ubootefi.var)
> >>
> >> The only docs I have found suggest its best to enroll the keys from within u-boot onto some removable media, then copy this off and use this as the default, this is not very helpful and doesn't work for me:
> >>
> >> => fatload mmc 0:1 ${loadaddr} PK.aut
> >> 2053 bytes read in 18 ms (111.3 KiB/s)
> >> => setenv -e -nv -bs -rt -at -i ${loadaddr}:$filesize PK
> >> setenv - set environment variables
> >>
> >> Usage:
> >> setenv setenv [-f] name value ...
> >>     - [forcibly] set environment variable 'name' to 'value ...'
> >> setenv [-f] name
> >>     - [forcibly] delete environment variable 'name'
> >>
> >> my setenv doesn't support all the extra switches ? This is with 2022.04, all other EFI options seem to be in this release and I can boot unsigned EFI images ok.
> >
> >Please turn on CONFIG_CMD_NVEDIT_EFI when building your U-Boot.
> >
> >This option was disabled by the commit:
> >        commit 3b728f8728fa (tag: efi-2020-01-rc1)
> >        Author: Heinrich Schuchardt <xypron.glpk@gmx.de>
> >        Date:   Sun Oct 6 15:44:22 2019 +0200
> >
> >        cmd: disable CMD_NVEDIT_EFI by default
> >
> >The binary size of efi has grown much since in the past, though.
> >
> >-Takahiro Akashi
> 
> Thanks, I have secure boot working now. A tool to generate the ubootefi.var offline or even just a description of the file format would be very useful.

Thank you for the suggestion. While I'd like to defer to Heinrich,
the C definition of the file format can be found as struct efi_var_file
in include/efi_variable.h

> I have noticed one issue when using ubootefi.var on mmc, when I switch boot order it wipes out the keys and I have to re-enrol them:
> 
> => fatls mmc 0:1
>      3040   ubootefi.var
> 
>  1 file(s), 0 dir(s)

I'm not sure that secure boot related variables have been loaded
at this point.
Anyhow, please try to enable CONFIG_EFI_VARIABLES_PRESEED with
EFI_VAR_FILE_NAME set. Otherwise, those variables will never be
restored.
(This is another topic that are not described in doc/develop/uefi.)

Thanks,
-Takahiro Akashi

> => efidebug boot order 2 1
> => fatls mmc 0:1
>       440   ubootefi.var
> 
> (Size drops from 3040 to 440 bytes and keys have gone)
> 
> 
> 
> 
> 
> ________________________________
> From: AKASHI Takahiro <takahiro.akashi@linaro.org>
> Sent: 29 June 2023 02:01
> To: Neil Jones <neil.jones@blaize.com>
> Cc: u-boot@lists.denx.de <u-boot@lists.denx.de>
> Subject: Re: EFI Secure boot default keys
> 
> On Wed, Jun 28, 2023 at 04:26:58PM +0000, Neil Jones wrote:
> > Please can someone describe the format of the file needed for the default / built-in EFI secure boot keys (ubootefi.var)
> >
> > The only docs I have found suggest its best to enroll the keys from within u-boot onto some removable media, then copy this off and use this as the default, this is not very helpful and doesn't work for me:
> >
> > => fatload mmc 0:1 ${loadaddr} PK.aut
> > 2053 bytes read in 18 ms (111.3 KiB/s)
> > => setenv -e -nv -bs -rt -at -i ${loadaddr}:$filesize PK
> > setenv - set environment variables
> >
> > Usage:
> > setenv setenv [-f] name value ...
> >     - [forcibly] set environment variable 'name' to 'value ...'
> > setenv [-f] name
> >     - [forcibly] delete environment variable 'name'
> >
> > my setenv doesn't support all the extra switches ? This is with 2022.04, all other EFI options seem to be in this release and I can boot unsigned EFI images ok.
> 
> Please turn on CONFIG_CMD_NVEDIT_EFI when building your U-Boot.
> 
> This option was disabled by the commit:
>         commit 3b728f8728fa (tag: efi-2020-01-rc1)
>         Author: Heinrich Schuchardt <xypron.glpk@gmx.de>
>         Date:   Sun Oct 6 15:44:22 2019 +0200
> 
>             cmd: disable CMD_NVEDIT_EFI by default
> 
> The binary size of efi has grown much since in the past, though.
> 
> -Takahiro Akashi
> 
> > Cheers,
> >
> > Neil
> >
> >
> >

^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: EFI Secure boot default keys
  2023-07-06  1:38     ` AKASHI Takahiro
@ 2023-07-06  8:23       ` Neil Jones
  2023-07-06  9:25         ` AKASHI Takahiro
  2023-07-06 18:02       ` Heinrich Schuchardt
  1 sibling, 1 reply; 8+ messages in thread
From: Neil Jones @ 2023-07-06  8:23 UTC (permalink / raw)
  To: AKASHI Takahiro; +Cc: xypron.glpk@gmx.de, u-boot@lists.denx.de

>> >> Please can someone describe the format of the file needed for the default / built-in EFI secure boot keys (ubootefi.var)
>> >>
>> >> The only docs I have found suggest its best to enroll the keys from within u-boot onto some removable media, then copy this off and use this as the default, this is not very helpful and doesn't work for me:
>> >>
>> >> => fatload mmc 0:1 ${loadaddr} PK.aut
>> >> 2053 bytes read in 18 ms (111.3 KiB/s)
>> >> => setenv -e -nv -bs -rt -at -i ${loadaddr}:$filesize PK
>> >> setenv - set environment variables
>> >>
>> >> Usage:
>> >> setenv setenv [-f] name value ...
>> >>     - [forcibly] set environment variable 'name' to 'value ...'
>> >> setenv [-f] name
>> >>     - [forcibly] delete environment variable 'name'
>> >>
>> >> my setenv doesn't support all the extra switches ? This is with 2022.04, all other EFI options seem to be in this release and I can boot unsigned EFI images ok.
>> >
>> >Please turn on CONFIG_CMD_NVEDIT_EFI when building your U-Boot.
>> >
>> >This option was disabled by the commit:
>> >        commit 3b728f8728fa (tag: efi-2020-01-rc1)
>> >        Author: Heinrich Schuchardt <xypron.glpk@gmx.de>
>> >        Date:   Sun Oct 6 15:44:22 2019 +0200
>> >
>> >        cmd: disable CMD_NVEDIT_EFI by default
>> >
>> >The binary size of efi has grown much since in the past, though.
>> >
>> >-Takahiro Akashi
>> 
>> Thanks, I have secure boot working now. A tool to generate the ubootefi.var offline or even just a description of the file format would be very useful.
>
>Thank you for the suggestion. While I'd like to defer to Heinrich,
>the C definition of the file format can be found as struct efi_var_file
>in include/efi_variable.h
>

Thanks!

>> I have noticed one issue when using ubootefi.var on mmc, when I switch boot order it wipes out the keys and I have to re-enrol them:
>> 
>> => fatls mmc 0:1
>>      3040   ubootefi.var
>> 
>>  1 file(s), 0 dir(s)
>
>I'm not sure that secure boot related variables have been loaded
>at this point.

This is during initial generation / enrollment of the variables

>Anyhow, please try to enable CONFIG_EFI_VARIABLES_PRESEED with
>EFI_VAR_FILE_NAME set. Otherwise, those variables will never be
>restored.
>(This is another topic that are not described in doc/develop/uefi.)

I have CONFIG_EFI_VARIABLES_PRESEED working, but while generating the file ubootefi.var for the first time (without CONFIG_EFI_VARIABLES_PRESEED set) you have to follow a specific order, or the file gets overwritten eg:

Working:

efidebug boot order 1 2
efidebug boot add -b 1 Signed mmc 0:1 /ImageSig.efi
efidebug boot add -b 2 UnSigned mmc 0:1 /Image
fatload mmc 0:1 ${loadaddr} PK.aut 
setenv -e -nv -bs -rt -at -i ${loadaddr}:$filesize PK
fatload mmc 0:1 ${loadaddr} KEK.aut                  
setenv -e -nv -bs -rt -at -i ${loadaddr}:$filesize KEK
fatload mmc 0:1 ${loadaddr} DB.aut                    
setenv -e -nv -bs -rt -at -i ${loadaddr}:$filesize db 


Failing:

setenv -e -nv -bs -rt -at -i ${loadaddr}:$filesize PK
fatload mmc 0:1 ${loadaddr} KEK.aut                  
setenv -e -nv -bs -rt -at -i ${loadaddr}:$filesize KEK
fatload mmc 0:1 ${loadaddr} DB.aut                    
setenv -e -nv -bs -rt -at -i ${loadaddr}:$filesize db 
efidebug boot order 1 2   ### This command overwrites the keys just loaded

Cheers,

Neil

>
>Thanks,
>-Takahiro Akashi
>
>> => efidebug boot order 2 1
>> => fatls mmc 0:1
>>       440   ubootefi.var
>> 
>> (Size drops from 3040 to 440 bytes and keys have gone)
 
> ________________________________
> From: AKASHI Takahiro <takahiro.akashi@linaro.org>
> Sent: 29 June 2023 02:01
> To: Neil Jones <neil.jones@blaize.com>
> Cc: u-boot@lists.denx.de <u-boot@lists.denx.de>
> Subject: Re: EFI Secure boot default keys
> 
> On Wed, Jun 28, 2023 at 04:26:58PM +0000, Neil Jones wrote:
> > Please can someone describe the format of the file needed for the default / built-in EFI secure boot keys (ubootefi.var)
> >
> > The only docs I have found suggest its best to enroll the keys from within u-boot onto some removable media, then copy this off and use this as the default, this is not very helpful and doesn't work for me:
> >
> > => fatload mmc 0:1 ${loadaddr} PK.aut
> > 2053 bytes read in 18 ms (111.3 KiB/s)
> > => setenv -e -nv -bs -rt -at -i ${loadaddr}:$filesize PK
> > setenv - set environment variables
> >
> > Usage:
> > setenv setenv [-f] name value ...
> >     - [forcibly] set environment variable 'name' to 'value ...'
> > setenv [-f] name
> >     - [forcibly] delete environment variable 'name'
> >
> > my setenv doesn't support all the extra switches ? This is with 2022.04, all other EFI options seem to be in this release and I can boot unsigned EFI images ok.
> 
> Please turn on CONFIG_CMD_NVEDIT_EFI when building your U-Boot.
> 
> This option was disabled by the commit:
>         commit 3b728f8728fa (tag: efi-2020-01-rc1)
>         Author: Heinrich Schuchardt <xypron.glpk@gmx.de>
>         Date:   Sun Oct 6 15:44:22 2019 +0200
> 
>             cmd: disable CMD_NVEDIT_EFI by default
> 
> The binary size of efi has grown much since in the past, though.
> 
> -Takahiro Akashi
> 
> > Cheers,
> >
> > Neil
> >
> >
> >

^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: EFI Secure boot default keys
  2023-07-06  8:23       ` Neil Jones
@ 2023-07-06  9:25         ` AKASHI Takahiro
  2023-07-06 15:22           ` Heinrich Schuchardt
  0 siblings, 1 reply; 8+ messages in thread
From: AKASHI Takahiro @ 2023-07-06  9:25 UTC (permalink / raw)
  To: Neil Jones; +Cc: xypron.glpk@gmx.de, u-boot@lists.denx.de

On Thu, Jul 06, 2023 at 08:23:06AM +0000, Neil Jones wrote:
> >> >> Please can someone describe the format of the file needed for the default / built-in EFI secure boot keys (ubootefi.var)
> >> >>
> >> >> The only docs I have found suggest its best to enroll the keys from within u-boot onto some removable media, then copy this off and use this as the default, this is not very helpful and doesn't work for me:
> >> >>
> >> >> => fatload mmc 0:1 ${loadaddr} PK.aut
> >> >> 2053 bytes read in 18 ms (111.3 KiB/s)
> >> >> => setenv -e -nv -bs -rt -at -i ${loadaddr}:$filesize PK
> >> >> setenv - set environment variables
> >> >>
> >> >> Usage:
> >> >> setenv setenv [-f] name value ...
> >> >>     - [forcibly] set environment variable 'name' to 'value ...'
> >> >> setenv [-f] name
> >> >>     - [forcibly] delete environment variable 'name'
> >> >>
> >> >> my setenv doesn't support all the extra switches ? This is with 2022.04, all other EFI options seem to be in this release and I can boot unsigned EFI images ok.
> >> >
> >> >Please turn on CONFIG_CMD_NVEDIT_EFI when building your U-Boot.
> >> >
> >> >This option was disabled by the commit:
> >> >        commit 3b728f8728fa (tag: efi-2020-01-rc1)
> >> >        Author: Heinrich Schuchardt <xypron.glpk@gmx.de>
> >> >        Date:   Sun Oct 6 15:44:22 2019 +0200
> >> >
> >> >        cmd: disable CMD_NVEDIT_EFI by default
> >> >
> >> >The binary size of efi has grown much since in the past, though.
> >> >
> >> >-Takahiro Akashi
> >> 
> >> Thanks, I have secure boot working now. A tool to generate the ubootefi.var offline or even just a description of the file format would be very useful.
> >
> >Thank you for the suggestion. While I'd like to defer to Heinrich,
> >the C definition of the file format can be found as struct efi_var_file
> >in include/efi_variable.h
> >
> 
> Thanks!
> 
> >> I have noticed one issue when using ubootefi.var on mmc, when I switch boot order it wipes out the keys and I have to re-enrol them:
> >> 
> >> => fatls mmc 0:1
> >>      3040   ubootefi.var
> >> 
> >>  1 file(s), 0 dir(s)
> >
> >I'm not sure that secure boot related variables have been loaded
> >at this point.
> 
> This is during initial generation / enrollment of the variables
> 
> >Anyhow, please try to enable CONFIG_EFI_VARIABLES_PRESEED with
> >EFI_VAR_FILE_NAME set. Otherwise, those variables will never be
> >restored.
> >(This is another topic that are not described in doc/develop/uefi.)
> 
> I have CONFIG_EFI_VARIABLES_PRESEED working, but while generating the file ubootefi.var for the first time (without CONFIG_EFI_VARIABLES_PRESEED set) you have to follow a specific order, or the file gets overwritten eg:
> 
> Working:
> 
> efidebug boot order 1 2
> efidebug boot add -b 1 Signed mmc 0:1 /ImageSig.efi
> efidebug boot add -b 2 UnSigned mmc 0:1 /Image
> fatload mmc 0:1 ${loadaddr} PK.aut 
> setenv -e -nv -bs -rt -at -i ${loadaddr}:$filesize PK
> fatload mmc 0:1 ${loadaddr} KEK.aut                  
> setenv -e -nv -bs -rt -at -i ${loadaddr}:$filesize KEK
> fatload mmc 0:1 ${loadaddr} DB.aut                    
> setenv -e -nv -bs -rt -at -i ${loadaddr}:$filesize db 
> 
> 
> Failing:
> 
> setenv -e -nv -bs -rt -at -i ${loadaddr}:$filesize PK
> fatload mmc 0:1 ${loadaddr} KEK.aut                  
> setenv -e -nv -bs -rt -at -i ${loadaddr}:$filesize KEK
> fatload mmc 0:1 ${loadaddr} DB.aut                    
> setenv -e -nv -bs -rt -at -i ${loadaddr}:$filesize db 
> efidebug boot order 1 2   ### This command overwrites the keys just loaded

Are you sure that "env print -e" shows all the variables including
PK, KEK and db at this point?

Since I don't have enough time to examine this issue, can you please
try to trace efi_var_collect() in efi_var_file.c which is responsible
for enumerating all the non-volatile variables to be saved at each
SET_VARIABLE api call?

-Takahiro Akashi

> Cheers,
> 
> Neil
> 
> >
> >Thanks,
> >-Takahiro Akashi
> >
> >> => efidebug boot order 2 1
> >> => fatls mmc 0:1
> >>       440   ubootefi.var
> >> 
> >> (Size drops from 3040 to 440 bytes and keys have gone)
>  
> > ________________________________
> > From: AKASHI Takahiro <takahiro.akashi@linaro.org>
> > Sent: 29 June 2023 02:01
> > To: Neil Jones <neil.jones@blaize.com>
> > Cc: u-boot@lists.denx.de <u-boot@lists.denx.de>
> > Subject: Re: EFI Secure boot default keys
> > 
> > On Wed, Jun 28, 2023 at 04:26:58PM +0000, Neil Jones wrote:
> > > Please can someone describe the format of the file needed for the default / built-in EFI secure boot keys (ubootefi.var)
> > >
> > > The only docs I have found suggest its best to enroll the keys from within u-boot onto some removable media, then copy this off and use this as the default, this is not very helpful and doesn't work for me:
> > >
> > > => fatload mmc 0:1 ${loadaddr} PK.aut
> > > 2053 bytes read in 18 ms (111.3 KiB/s)
> > > => setenv -e -nv -bs -rt -at -i ${loadaddr}:$filesize PK
> > > setenv - set environment variables
> > >
> > > Usage:
> > > setenv setenv [-f] name value ...
> > >     - [forcibly] set environment variable 'name' to 'value ...'
> > > setenv [-f] name
> > >     - [forcibly] delete environment variable 'name'
> > >
> > > my setenv doesn't support all the extra switches ? This is with 2022.04, all other EFI options seem to be in this release and I can boot unsigned EFI images ok.
> > 
> > Please turn on CONFIG_CMD_NVEDIT_EFI when building your U-Boot.
> > 
> > This option was disabled by the commit:
> >         commit 3b728f8728fa (tag: efi-2020-01-rc1)
> >         Author: Heinrich Schuchardt <xypron.glpk@gmx.de>
> >         Date:   Sun Oct 6 15:44:22 2019 +0200
> > 
> >             cmd: disable CMD_NVEDIT_EFI by default
> > 
> > The binary size of efi has grown much since in the past, though.
> > 
> > -Takahiro Akashi
> > 
> > > Cheers,
> > >
> > > Neil
> > >
> > >
> > >

^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: EFI Secure boot default keys
  2023-07-06  9:25         ` AKASHI Takahiro
@ 2023-07-06 15:22           ` Heinrich Schuchardt
  0 siblings, 0 replies; 8+ messages in thread
From: Heinrich Schuchardt @ 2023-07-06 15:22 UTC (permalink / raw)
  To: Neil Jones; +Cc: AKASHI Takahiro, u-boot@lists.denx.de

On 06.07.23 11:25, AKASHI Takahiro wrote:
> On Thu, Jul 06, 2023 at 08:23:06AM +0000, Neil Jones wrote:
>>>>>> Please can someone describe the format of the file needed for the default / built-in EFI secure boot keys (ubootefi.var)
>>>>>>
>>>>>> The only docs I have found suggest its best to enroll the keys from within u-boot onto some removable media, then copy this off and use this as the default, this is not very helpful and doesn't work for me:
>>>>>>
>>>>>> => fatload mmc 0:1 ${loadaddr} PK.aut
>>>>>> 2053 bytes read in 18 ms (111.3 KiB/s)
>>>>>> => setenv -e -nv -bs -rt -at -i ${loadaddr}:$filesize PK
>>>>>> setenv - set environment variables
>>>>>>
>>>>>> Usage:
>>>>>> setenv setenv [-f] name value ...
>>>>>>       - [forcibly] set environment variable 'name' to 'value ...'
>>>>>> setenv [-f] name
>>>>>>       - [forcibly] delete environment variable 'name'
>>>>>>
>>>>>> my setenv doesn't support all the extra switches ? This is with 2022.04, all other EFI options seem to be in this release and I can boot unsigned EFI images ok.
>>>>>
>>>>> Please turn on CONFIG_CMD_NVEDIT_EFI when building your U-Boot.
>>>>>
>>>>> This option was disabled by the commit:
>>>>>          commit 3b728f8728fa (tag: efi-2020-01-rc1)
>>>>>          Author: Heinrich Schuchardt <xypron.glpk@gmx.de>
>>>>>          Date:   Sun Oct 6 15:44:22 2019 +0200
>>>>>
>>>>>          cmd: disable CMD_NVEDIT_EFI by default
>>>>>
>>>>> The binary size of efi has grown much since in the past, though.
>>>>>
>>>>> -Takahiro Akashi
>>>>
>>>> Thanks, I have secure boot working now. A tool to generate the ubootefi.var offline or even just a description of the file format would be very useful.
>>>
>>> Thank you for the suggestion. While I'd like to defer to Heinrich,
>>> the C definition of the file format can be found as struct efi_var_file
>>> in include/efi_variable.h
>>>
>>
>> Thanks!
>>
>>>> I have noticed one issue when using ubootefi.var on mmc, when I switch boot order it wipes out the keys and I have to re-enrol them:
>>>>
>>>> => fatls mmc 0:1
>>>>        3040   ubootefi.var
>>>>
>>>>    1 file(s), 0 dir(s)
>>>
>>> I'm not sure that secure boot related variables have been loaded
>>> at this point.
>>
>> This is during initial generation / enrollment of the variables

Hello Neil,

If you want to use secure boot, please either use
CONFIG_EFI_VARIABLES_PRESEED or CONFIG_EFI_MM_COMM_TEE.

U-Boot will never load the security database from file.

Without CONFIG_EFI_MM_COMM_TEE=y setting up the security database via
setenv -e is only usable for one time testing. After reboot the security
database will be gone (or fallback to the preseed for
CONFIG_EFI_VARIABLES_PRESEED=y).

Best regards

Heinrich


>>
>>> Anyhow, please try to enable CONFIG_EFI_VARIABLES_PRESEED with
>>> EFI_VAR_FILE_NAME set. Otherwise, those variables will never be
>>> restored.
>>> (This is another topic that are not described in doc/develop/uefi.)
>>
>> I have CONFIG_EFI_VARIABLES_PRESEED working, but while generating the file ubootefi.var for the first time (without CONFIG_EFI_VARIABLES_PRESEED set) you have to follow a specific order, or the file gets overwritten eg:
>>
>> Working:
>>
>> efidebug boot order 1 2
>> efidebug boot add -b 1 Signed mmc 0:1 /ImageSig.efi
>> efidebug boot add -b 2 UnSigned mmc 0:1 /Image
>> fatload mmc 0:1 ${loadaddr} PK.aut
>> setenv -e -nv -bs -rt -at -i ${loadaddr}:$filesize PK
>> fatload mmc 0:1 ${loadaddr} KEK.aut
>> setenv -e -nv -bs -rt -at -i ${loadaddr}:$filesize KEK
>> fatload mmc 0:1 ${loadaddr} DB.aut
>> setenv -e -nv -bs -rt -at -i ${loadaddr}:$filesize db
>>
>>
>> Failing:
>>
>> setenv -e -nv -bs -rt -at -i ${loadaddr}:$filesize PK
>> fatload mmc 0:1 ${loadaddr} KEK.aut
>> setenv -e -nv -bs -rt -at -i ${loadaddr}:$filesize KEK
>> fatload mmc 0:1 ${loadaddr} DB.aut
>> setenv -e -nv -bs -rt -at -i ${loadaddr}:$filesize db
>> efidebug boot order 1 2   ### This command overwrites the keys just loaded
>
> Are you sure that "env print -e" shows all the variables including
> PK, KEK and db at this point?
>
> Since I don't have enough time to examine this issue, can you please
> try to trace efi_var_collect() in efi_var_file.c which is responsible
> for enumerating all the non-volatile variables to be saved at each
> SET_VARIABLE api call?
>
> -Takahiro Akashi
>
>> Cheers,
>>
>> Neil
>>
>>>
>>> Thanks,
>>> -Takahiro Akashi
>>>
>>>> => efidebug boot order 2 1
>>>> => fatls mmc 0:1
>>>>         440   ubootefi.var
>>>>
>>>> (Size drops from 3040 to 440 bytes and keys have gone)
>>
>>> ________________________________
>>> From: AKASHI Takahiro <takahiro.akashi@linaro.org>
>>> Sent: 29 June 2023 02:01
>>> To: Neil Jones <neil.jones@blaize.com>
>>> Cc: u-boot@lists.denx.de <u-boot@lists.denx.de>
>>> Subject: Re: EFI Secure boot default keys
>>>
>>> On Wed, Jun 28, 2023 at 04:26:58PM +0000, Neil Jones wrote:
>>>> Please can someone describe the format of the file needed for the default / built-in EFI secure boot keys (ubootefi.var)
>>>>
>>>> The only docs I have found suggest its best to enroll the keys from within u-boot onto some removable media, then copy this off and use this as the default, this is not very helpful and doesn't work for me:
>>>>
>>>> => fatload mmc 0:1 ${loadaddr} PK.aut
>>>> 2053 bytes read in 18 ms (111.3 KiB/s)
>>>> => setenv -e -nv -bs -rt -at -i ${loadaddr}:$filesize PK
>>>> setenv - set environment variables
>>>>
>>>> Usage:
>>>> setenv setenv [-f] name value ...
>>>>       - [forcibly] set environment variable 'name' to 'value ...'
>>>> setenv [-f] name
>>>>       - [forcibly] delete environment variable 'name'
>>>>
>>>> my setenv doesn't support all the extra switches ? This is with 2022.04, all other EFI options seem to be in this release and I can boot unsigned EFI images ok.
>>>
>>> Please turn on CONFIG_CMD_NVEDIT_EFI when building your U-Boot.
>>>
>>> This option was disabled by the commit:
>>>           commit 3b728f8728fa (tag: efi-2020-01-rc1)
>>>           Author: Heinrich Schuchardt <xypron.glpk@gmx.de>
>>>           Date:   Sun Oct 6 15:44:22 2019 +0200
>>>
>>>               cmd: disable CMD_NVEDIT_EFI by default
>>>
>>> The binary size of efi has grown much since in the past, though.
>>>
>>> -Takahiro Akashi
>>>
>>>> Cheers,
>>>>
>>>> Neil
>>>>
>>>>
>>>>


^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: EFI Secure boot default keys
  2023-07-06  1:38     ` AKASHI Takahiro
  2023-07-06  8:23       ` Neil Jones
@ 2023-07-06 18:02       ` Heinrich Schuchardt
  1 sibling, 0 replies; 8+ messages in thread
From: Heinrich Schuchardt @ 2023-07-06 18:02 UTC (permalink / raw)
  To: Neil Jones; +Cc: AKASHI Takahiro, u-boot@lists.denx.de

>> On Wed, Jun 28, 2023 at 04:26:58PM +0000, Neil Jones wrote:
>>> Please can someone describe the format of the file needed for the default / built-in EFI secure boot keys (ubootefi.var)
>>>
>>> The only docs I have found suggest its best to enroll the keys from within u-boot onto some removable media, then copy this off and use this as the default, this is not very helpful and doesn't work for me:

The file format is described in
https://github.com/ARM-software/ebbr/blob/main/source/chapter5-variable-storage.rst

U-Boot comes with tools/efivar.py to edit ubootefi.var.

Best regards

Heinrich

^ permalink raw reply	[flat|nested] 8+ messages in thread

end of thread, other threads:[~2023-07-06 18:02 UTC | newest]

Thread overview: 8+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2023-06-28 16:26 EFI Secure boot default keys Neil Jones
2023-06-29  1:01 ` AKASHI Takahiro
2023-07-05 13:24   ` Neil Jones
2023-07-06  1:38     ` AKASHI Takahiro
2023-07-06  8:23       ` Neil Jones
2023-07-06  9:25         ` AKASHI Takahiro
2023-07-06 15:22           ` Heinrich Schuchardt
2023-07-06 18:02       ` Heinrich Schuchardt

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox