Check if EFI signatures are revoked at build time

Bug #1996955 reported by Dimitri John Ledkov
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
linux-signed (Ubuntu)
Confirmed
Undecided
Unassigned

Bug Description

[ Impact ]

 * Recent kernels expose built-in trusted and revoked certificates. See https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1996892

 * When kernels expose such information, it is prudent to check if the freshly signed EFI binaries are actually revoked. And fail the build in such cases.

 * This ensures that a given signed kernel, can perform verified kexec for quick-reboot or for kdump purposes.

 * This also helps with key rotations, in case kernel is routed to be signed with the wrong key due to miss-configuration of the build.

[ Test Plan ]

 * Add test-build PPA certificate as revoked
 * Perform a test-build crank of linux & linux-signed, in test-build PPA
 * linux-signed should FTBFS in test-build PPA
 * Copy linux and linux-signed with binaries to a personal PPA, linux-signed should complete the build correctly

[ Where problems could occur ]

 * Each individual linux-signed package needs to add a build-dep on all buildinfo packages of all EFI signed flavours on EFI signed arches

 * The verification is done on EFI signed binaries only for now. OPAL & SIPL signing checks might be implemented in the future

Changed in linux-signed (Ubuntu):
status: New → Confirmed
description: updated
summary: - Fail the build if EFI binaries are signed with revoked keys
+ Check if EFI signatures are revoked at build
summary: - Check if EFI signatures are revoked at build
+ Check if EFI signatures are revoked at build time
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.