NACK: [HIRSUTE][PATCH 0/5] Built-in Revocation certificates
Tim Gardner
tim.gardner at canonical.com
Thu Aug 12 11:33:35 UTC 2021
On 8/12/21 3:04 AM, Dimitri John Ledkov wrote:
> On Mon, Aug 9, 2021 at 1:19 PM Tim Gardner <tim.gardner at canonical.com> wrote:
>>
>>
>>
>> On 8/5/21 8:59 AM, Dimitri John Ledkov wrote:
>>> In Impish, support was added to load revoked certificates from mokx
>>> (submitted upstream, revied, not accepted yet) into blacklist keyring.
>>>
>
> Note mentioning that SAUCE patches have not been accepted upstream anywhere.
>
>>> Also in Impish, from upstream, there is now support to have built-in
>>> revoked keys. And we have 2012 UEFI key revoked by default (as also
>>> revoked globally via uefi dbx update).
>>>
>>> Backport both of the above things to Hirsute, such that our kernels
>>> honor mokx revocations, and also have the 2012 key revoked always
>>> (when booted with or without working shim).
>>>
>>> This patch series was test built and tested using the revocations list
>>> test case that is proposed for RT ubuntu_boot test. See
>>> https://lists.ubuntu.com/archives/kernel-team/2021-August/122986.html
>>>
>>> BugLink: https://bugs.launchpad.net/bugs/1928679
>>> BugLink: https://bugs.launchpad.net/bugs/1932029
>>>
>>> Dimitri John Ledkov (5):
>>> UBUNTU: SAUCE: integrity: Load mokx certs from the EFI MOK config
>>> table
>>> UBUNTU: SAUCE: integrity: add informational messages when revoking
>>> certs
>>> UBUNTU: [Packaging] build canonical-revoked-certs.pem from branch/arch
>>> certs
>>> UBUNTU: [Packaging] Revoke 2012 UEFI signing certificate as built-in
>>> UBUNTU: [Config] Configure CONFIG_SYSTEM_REVOCATION_KEYS with revoked
>>> keys
>>>
>>> certs/blacklist.c | 3 +
>>> debian.master/config/annotations | 1 +
>>> debian.master/config/config.common.ubuntu | 2 +-
>>> .../revoked-certs/canonical-uefi-2012-all.pem | 86 +++++++++++++++++++
>>> debian/rules | 14 ++-
>>> .../platform_certs/keyring_handler.c | 1 +
>>> security/integrity/platform_certs/load_uefi.c | 74 ++++++++--------
>>> 7 files changed, 145 insertions(+), 36 deletions(-)
>>> create mode 100644 debian/revoked-certs/canonical-uefi-2012-all.pem
>>>
>>
>> None of the git SHA1 commit IDs appear to be valid in upstream linux or
>> even linux-next.
>>
>> rtg
>
> That is why they still have the SAUCE title, and point at commits from
> impish series. They have been submitted upstream, but they are not
> getting reviewed / applied for a long time now. I suspect it is mostly
> because Debian already carries an equivalent patch (for mok config
> table) and all other distros are unaffected (they don't use CA inside
> shim) / don't care (to allow users to self revoke many signing
> certificates).
>
> I thought I made this clear in the opening paragraph of the cover
> letter. (albeit there is a typpo "revied" => "reviewed"). The git-sha
> reference will become meaningless once the unstable kernel is rebased
> onto v5.14, but it will be valid whilst impish kernels are still in
> use.
>
> I was not sure how to best indicate that these patches have already
> been through review to get into impish kernel.
>
You are correct. I don't know what I was thinking. Perhaps I was short
on coffee.
rtg
-----------
Tim Gardner
Canonical, Inc
More information about the kernel-team
mailing list