-
Notifications
You must be signed in to change notification settings - Fork 86
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
foresight / warning: Microsoft certificates from 2011 will probably be replaced by certs from 2023. #235
Comments
It's a bit more complicated. There are also going to be several new certs so you can use different certs for OpROM and Linux distros and so on. This will be implemented when it becomes relevant. |
I think it's best to get these into sbctl now, rather then later. Or someone is gonna enroll keys with According to systemd/systemd#29104 (review), you're supposed to have old and new key installed both now. |
I missed that memo, can probably take a look at it soon'ish. |
@conrad-heimbold Hey! We saw your issue and we updated the certificates to DER format (just with a .crt extension)! As of right now the only thing the 2023 Windows production CA has signed is a UEFI Testing Application. We're working with our partners to make sure db append actually appends. |
@Flickdm Microsoft Corporation KEK 2K CA 2023 is still base64. |
Thanks for letting me know! I'm bringing it up internally! |
Just checked, the linked KEK is now der encoded as well! |
@Flickdm Thanks for fixing this :) |
Should implement this soon :) |
In the future, the Microsoft certificate:
... if I understand the "Windows Secure Boot Key Creation and Management Guidance", Chapter "1.5 Keys Required for Secure Boot on all PCs" correctly . This is just my assumption, based on the year number (2023) .
The older certificates from 2011 are in raw binary format; the linked newer ones from 2023 however are in base64-encoded binary format. That's the reason why I added the ".base64" ending.
So to make them usable and to have them in the same format as the older ones, we have to decode them:
Can anybody check if their freshly installed Windows 11 bootmgfw.efi in its newest version has a signature from the 2011 certs or from the 2023 certs?
This is just a foresight for the future; I hope it might help.
Thank you in advance for your help and work!
The text was updated successfully, but these errors were encountered: