-
Notifications
You must be signed in to change notification settings - Fork 0
Description
When using the -m option, Microsoft's DB keys are downloaded, signed with the new local keys, and included for sync with the firmware in order to allow critical Microsoft signed binaries (like GPU GOPs or a dual-booted Windows installation) to be loaded. However, the associated DBX list of forbidden checksums, available from https://uefi.org/revocationlistfile , is not included. If the DBX file is not installed, I believe this creates a security issue where a binary signed by Microsoft's DB and also in the DBX (like Grub2 versions affected by the boothole vulnerability) could be booted, breaking the security guarantees of Secure Boot.
Is it possible to include the official DBX when using the -m option? I believe that this would require stripping the Microsoft signature from the official DBX file and re-signing with the local keys. Syncing the DBX could done with the dbxtool utility by end users. I'm unsure if sbkeysync supports automatic handling of DBX or not.
It would also be very beneficial to include instructions on how to update the DBX when using already-generated keys from a previous invocation of sbkeys. In particular, stripping the MS signature from the DBX file seems nontrivial. (An extension to sbkeys that might handle this automatically would be great but I understand if it is out-of-scope.)
Please correct me if my understanding of the interaction between the Microsoft DB and DBX is incorrect.