[Bug 1609209] Re: Disable signature validation on shim without user interactions under secureboot enabled
Ivan Hu
ivan.hu at canonical.com
Wed Aug 3 02:52:20 UTC 2016
** Changed in: shim-signed (Ubuntu)
Status: New => Confirmed
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to shim-signed in Ubuntu.
https://bugs.launchpad.net/bugs/1609209
Title:
Disable signature validation on shim without user interactions under
secureboot enabled
Status in shim-signed package in Ubuntu:
Confirmed
Bug description:
In some secureboot enabled machines, after update to kernel 3.19
without disabling the secureboot. It causes the some DKMS (for
example, kernel wireless and audio) won't work, because it forces the
kernel and modules need to be signed.
Considering that the end users don't have enough knowledge to use
"mokutil" to disable the shim signature validation, provide a way to
disable signature validation on shim without user interactions.
MokSBStateSet.efi - UEFI shell application to set two variables
(MokSBState and MokSBStateRT) which disable signature validation on
shim. It should be signed with Ubuntu key.
shim_dis_validation.sh - create a bootentry and set bootnext to it.
This bootentry will boot to shim and then base on loadoption (second
stage boot on shim) to execute MokSBStateSet.efi. That's why
MokSBStateSet.efi need to be signed and key must be in the MOK
database under secureboot enabled. MOK database already has canonical
key, so MokSBStateSet.efi should be signed with Ubuntu key, so that
users don't do anything to import key to MOK database.
[Execute]
Put MokSBStateSet-signed.efi and shim_dis_validation.sh in the same folder
#sudo sh shim_dis_validation.sh
[Test case]
1. Get the signed MokSBStateSet.efi, MokSBStateSet-signed.efi
2. impoll key to MOK database, this is not necessary if MokSBStateSet.efi signed with canonical key
# mokutil --import MOK.cer
3. sudo sh shim_dis_validation.sh
4. check the DKMS funcitons
[Potential issue]
Shim has a bug and cause the shim second stage fail and a fix with it,
https://bugs.launchpad.net/ubuntu/+source/shim/+bug/1581299
Will need to change the loadoption data on shim_dis_validation.sh according to the shim version in the future releases.
[Todo]
MokSBStateSet.efi need to be signed with Canonical key.
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/shim-signed/+bug/1609209/+subscriptions
More information about the foundations-bugs
mailing list