On 28/09/2023 16:45, Valerio Vanni wrote:
On Thu, 28 Sep 2023 10:08:27 +0700 Max Nikulin wrote:

After a vulnerability found in shim or grub (that allows to boot malicious code having no proper signature) old keys used by Linux distributions are revoked, new ones are generated. New images signed by new keys are published.

Yes, but couldn't it add news keys without blacklisting old ones?

It is beyond my knowledge of UEFI and secure boot: specs, requirements from Microsoft, and state of affairs with bugs in implementations. That is why I am suggesting to check for discussions related to shim & grub and to ask people involved into their development.

I have never tried it, but perhaps you may enroll your own keys and rebuild old images to put EFI files signed by you. See "master owner keys".

Do you mean load new EFI files in old Clonezilla?

Yes, I do. My idea is to build custom image of old Clonezilla with EFI files signed by you own keys. The downside is that you need to install your keys to every box where you are going to boot your images.

By the way, perhaps tools for management of secure boot keys allow to replace entries causing issues in your case without full reflash of BIOS. I have heard that some people wipes Microsoft keys completely to have full control what images can be booted on their machines.

With outdated keys secure boot does not protect you. Is it Windows that prevents you from just turning secure boot off? I would not be surprised if during some update of Windows, certificate revocation list will be updated as well, so you would not be able to boot your old Clonezilla any more.

Windows works with or without secure boot, but I'd like to leave it on.
So far, no Windows update did such thing. I also tried update from Windows 10 to Windows 11, and nothing happened.

Notice, it is still just a hypothesis that your issues are caused by new keys and it has to be confirmed by comparison key lists before and after.

If latest installation, repair, etc. images from Microsoft do not cause the issue then chances that shim+grub may behave in a similar way is higher.

If booting grub built by Fedora or some other distribution unrelated to Debian, does not cause the issue then it may be Debian specific bug. Am I right that Clonezilla is based on Ubuntu, so may use same patches?

I do not know what is your threat model, so I am unsure why you consider that secure book with revoked keys still provides enough degree of protection. My impression is that not so much efforts are required to inspect latest CVEs and to trick some signed EFI file to force booting of a malicious EFI file. It is a reason why I suggest to disable secure boot.


Reply via email to