[SRU] enable signing riscv64 binaries in bionic
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
sbsigntool (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned | ||
Bionic |
Fix Released
|
High
|
Unassigned | ||
Focal |
Fix Released
|
High
|
Unassigned |
Bug Description
[Impact]
The Ubuntu signing box is running Ubuntu Bionic. The riscv64 architecture is expanding. We expect development boards using EDK II to appear in 2022. We should be able to support secure boot then.
A patch for enabling this has been accepted upstream:
[Test Plan]
* Signatures produced by sbsign in bionic, must be verifiable with sbverify from jammy.
* Test instructions:
- create as new certificate RSA2048) for signing EFI binaries
openssl req -x509 -sha256 -newkey rsa:2048 -subj /CN=TEST_$*/ \
-keyout db.key -out db.crt -nodes -days 3650
- sign amd64, arm64 and riscv64 EFI binaries with Bionic's sbsign
sbsign --key db.key --cert db.crt test.efi
- check the signature with Jammy's sbverify
- check the signature with Bionics's sbverify
* Testing should be executed before landing the update.
[Where problems could occur]
* The upstream patch is trivial and should have no effect on any non-riscv64 architecture. It only changes the architecture test that is made before signing.
* With the test procedure above we ensure that we still can sign on the same architectures as before.
[Other Info]
* The Focal task is so that we don't loose functionality in case of an upgrade from Bionic to Focal.
tags: | added: fr-2104 |
To verify use:
sbverify --cert db.crt test.efi.signed