Open daveminer1 opened 1 month ago
docker build .
b098fb90bff86509aacff0e5bc197583e7e77968cc64da4d41d310fb4eab3087 /usr/share/shim/15.8-1.0.3.el9/x64/shimx64.efi
https://keyserver.ubuntu.com/pks/lookup?search=4A193C06D35E7C670FA4EF0BA2FB9E081F2D130E&fingerprint=on&op=index
Issuer: C=US, O=DigiCert, Inc., CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1
Subject: jurisdictionC=US, jurisdictionST=Delaware, businessCategory=Private Organization, serialNumber=2101822, C=US, ST=California, L=Redwood City, O=Oracle America, Inc., CN=Oracle America, Inc.
Not After : Apr 2 23:59:59 2025 GMT
Issues:
DISABLE_EBS_PROTECTION
is set so official reviewer will have to take a deeper look.Since I work for the same company as the submitters, I don't count as a reviewer in this case. However, I looked this over in some detail before it was submitted.
DISABLE_EBS_PROTECTION is expected, since with the custom ELF validation code nothing will call back into shim lock protocol to have shim validate anything additional.
My key is present on pgp.mit.edu:
Search results for 'oracle miner dave com'
Type bits/keyID Date User ID
pub 256E/8C450938 2024-07-23 Dave Miner dave.miner@oracle.com
Mail sent to @daveminer1 for verification.
Alan's key is an ancient 1024-bit DSA key. We can't use that - it's way past time he generated something newer that's less readily broken.
Confirming identity
leaders drearier picker sequins oatmeal torrential Portsmouth revert Lindsay strait
Mail sent to @daveminer1 for verification.
Alan's key is an ancient 1024-bit DSA key. We can't use that - it's way past time he generated something newer that's less readily broken.
Is not the RSA4096 key shown on https://keyserver.ubuntu.com/pks/lookup?search=0xCFDF148828C642A7&fingerprint=on&op=index sufficient?
The old DSA one shows up first, presumably because it's your oldest key endorsing the others? I don't think we should use it anymore, but removing it from the server doesn't seem right either.
Mail sent to @daveminer1 for verification. Alan's key is an ancient 1024-bit DSA key. We can't use that - it's way past time he generated something newer that's less readily broken.
Is not the RSA4096 key shown on https://keyserver.ubuntu.com/pks/lookup?search=0xCFDF148828C642A7&fingerprint=on&op=index sufficient?
That is a subkey of a dsa1024 key, and as such the binding signature (the signature the primary key makes to certify the subkey as bound to it) is not strong enough, you need to properly rotate to a strong primary key.
As the primary key is the root of trust, when someone goes fetch the key it will fetch and trust all it's subkeys and encrypt to the latest encryption subkey.
An attacker with enough compute could be able to fake signatures binding arbitrary new suvkeys to the primary keys as dsa1024 is particularly weak.
@julian-klode has described this exactly - just adding new stronger subkeys isn't sufficient
Sorry, I thought what I had done years ago was doing that, but I guess I did not. Unfortunately that description, no matter how exact, does not help me understand what I need to do now to satisfy you while not breaking the verification of the hundreds of X.Org package releases I've signed with that key which distros use to verify. Can you point to instructions for what gpg commands you want me to use here?
Hi Alan!
No worries! You don't have to kill the old key, you can just create another new key for this new purpose.
The guide we typically point people to in the Debian community is https://keyring.debian.org/creating-key.html ; the defaults in gpg tend to be reasonable out of the box these days, but it dosn't hurt to check things look sane.
Alan has generated a new key, the review is updated with the new fingerprint and updated pub files for both
Mail to Alan on the way now
Confirming my identity:
primitive epigram tablelands raking drubs reactive teakettle layettes hoppers extrinsic
Review
[x] Build reproduces:
b098fb90bff86509aacff0e5bc197583e7e77968cc64da4d41d310fb4eab3087 /shimx64.efi
[x] HSM is used to store the key
[x] SBAT entries ok
[x] Shim is built from the provided srpm, which includes the upstream 15.8 as verified by the sha256 csum:
fisk:~/projects/shim-review/oracle/src$ sha256sum shim-15.8.tar.bz2
a79f0a9b89f3681ab384865b1a46ab3f79d88b11b4ca59aa040ab03fffae80a9 shim-15.8.tar.bz2
[x] SBAT looks ok:
#23 0.185 sbat,1,SBAT Version,sbat,1,https://github.com/rhboot/shim/blob/main/SBAT.md
#23 0.185 shim,4,UEFI shim,shim,1,https://github.com/rhboot/shim
#23 0.185 shim.solaris11,3,UEFI shim,shim,15.8,mail:secalert_us@oracle.com
[x] Certificate is OK
I'm still looking at GRUB patches yet, but here's current state with some questions - see the end...
Tag oraclesolaris-shim-x86_64-20241010
b098fb90bff86509aacff0e5bc197583e7e77968cc64da4d41d310fb4eab3087 /shimx64.efi
b098fb90bff86509aacff0e5bc197583e7e77968cc64da4d41d310fb4eab3087 /usr/share/shim/15.8-1.0.3.el9/x64/shimx64.efi
Serial Number:
04:e6:d1:e5:28:2a:74:d6:92:19:6d:bb:71:0f:22:d6
Signature Algorithm: sha256WithRSAEncryption
Issuer: C = US, O = "DigiCert, Inc.", CN = DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1
Validity
Not Before: Apr 1 00:00:00 2022 GMT
Not After : Apr 2 23:59:59 2025 GMT
Subject: jurisdictionC = US, jurisdictionST = Delaware, businessCategory = Private Organization, serialNumber = 2101822, C = US, ST = California, L = Redwood City, O = "Oracle America, Inc.", CN = "Oracle America, Inc."
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (3072 bit)
solaris11,3
for
the vendor SBAT. Why not just solaris11,1
?iorw
and memrw
in your signed GRUB build?
Can you explain how they're compatible with Secure Boot please?Thanks for the questions, Steve:
iorw
and memrw
certainly aren't needed, that list was initially carried over from our 1.99 build and I hadn't considered them. They'll be dropped.
Confirm the following are included in your repo, checking each box:
What is the link to your tag in a repo cloned from rhboot/shim-review?
https://github.com/daveminer1/shim-review/tree/oraclesolaris-shim-x86_64-20241010
What is the SHA256 hash of your final SHIM binary?
b098fb90bff86509aacff0e5bc197583e7e77968cc64da4d41d310fb4eab3087 shimx64.efi
What is the link to your previous shim review request (if any, otherwise N/A)?
N/A
If no security contacts have changed since verification, what is the link to your request, where they've been verified (if any, otherwise N/A)?
N/A