-
Notifications
You must be signed in to change notification settings - Fork 87
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
rotate-keys
seems to enroll keys without vendor certificates/TPM Eventlog checksums
#353
Comments
Nothing is going to be bricked.
Right, we don't record the enrolled vendor certs before doing this so we are currently not adding them back after rotation. That should be fixed. |
I looked at this again. The intention of The unexpected part is probably that |
It's unclear to me why this may not brick machines considering https://github.com/Foxboron/sbctl/wiki/FAQ#option-rom |
That page is not describing bricking. |
It does, or at the very least, it describes "soft bricking":
|
Correct. It's a poor word to describe a failure case if you don't have an internal GPU. This is no way the same as bricking anything as you can still very much solve the problem. |
Well yes, it's definitely recoverable if some precautions are taken. But if one does not set up SSH beforehand and has no integrated GPU (as on most AMD Ryzen desktop processors like mine), only a discrete GPU (which will be validated by the Secure Boot chain) then some unfortunate things will happen. So using the improper term for this issue is my bad. But at the same time I didn't want this to be too under-emphasized, since it could have affected me. I will edit my issue so the proper term is used. |
Soft-bricking seems like a very appropriate term. |
Bonjour,
I have a system that had Secure Boot previously set up with sbctl.
I disabled it, cleared all the keys from my UEFI setup utility (to enter Setup mode),
then first tried running
create-keys
. It said keys were already created, so Iran
rotate-keys
instead. Runningreset
beforehand doesn't seem to changethe behavior.
When run, the command
rotate-keys
(without any flags) reports that it hasautomatically enrolled new keys without enrolling any vendor certificates
(e.g. Microsoft certificates).
There is no documented flag or option to override this behavior.
I've examined the source code and it doesn't look like both commands perform
the same action, that is, enroll. But I'm not sure, I never programmed in Go before,
and especially didn't code programs that interface with low-level boot utilities.
Running
list-enrolled-keys
will report that there are no keys, whetherPK, KEX or Signature Database.
Running
enroll-keys --microsoft
does work though. It will actually enrollthe keys along with Microsoft certificates, and running
list-enrolled-keys
will list all three keys along with Microsoft certificates.
At best, it could just be outdated logging. At worst, it might soft-brick machines
if the user isn't careful enough and has a problematic setup.
Merci d'avoir lu.
Version: 0.15.4.2.g237ac77
(latest commit as of posting, built from source using sbctl-git AUR package)
Also present in 0.15.3
The text was updated successfully, but these errors were encountered: