Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

SecureBoot Keys #28

Open
xnox opened this issue Nov 8, 2024 · 2 comments
Open

SecureBoot Keys #28

xnox opened this issue Nov 8, 2024 · 2 comments
Assignees
Labels
enhancement New feature or request

Comments

@xnox
Copy link

xnox commented Nov 8, 2024

Are there any signatures on the kernel?

Or should I self sign & enroll?

Even ephemeral keys one would help.

@stgraber stgraber added the enhancement New feature or request label Dec 5, 2024
@stgraber
Copy link
Member

stgraber commented Dec 5, 2024

Currently it's all ephemeral keys at build time, but I think we should be able to generate a key, dump it as a Github Actions Secret and have the kernel build use that instead.

As everything is built on private Github Runners (ephemeral Github instances), that should be fine, so long as Github itself doesn't get compromised (but then we'd have other problems).

@stgraber stgraber self-assigned this Dec 5, 2024
@xnox
Copy link
Author

xnox commented Dec 5, 2024

Honestly I would be very happy to get ephemeral Sigstore Cosign cert that has 15min validity https://docs.sigstore.dev/quickstart/quickstart-cosign/ to embed as trusted cert into kernel; and sign the kernel and modules with it. (and use faketime to keep the signing time within the validity time, cause kexec checks that). And then such cert is easy to include into moklist to trust.

Also hoping in the future to have sigstore policies in kernel to allow users to specify "trust sigstore cert with these attestations".

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

2 participants