Hi,

> (I believe on a UEFI Secure Boot VM it's shown)

The default secure boot variable store template shipped by fedora
includes the 2023 keys for roughly one year, so VMs younger than that
and fresh installs should have them.

> For instance, my device, a Dell laptop, for which fwupd recognizes:
> the firmware (which I update via a built in Bios flash utility), the
> dbx (updated via fwupd) and a mysterious "Dell Platform Key", which
> might be Microsoft's certificate along with some other Dell stuff.

The update is a two-step process.  First enroll the new microsoft KEK
key, which needs a signature with the platform keys of the vendor.

Microsoft has published tons of updates for various vendors here:
https://github.com/microsoft/secureboot_objects/tree/main/PostSignedObjects/KEK

Second enroll the new microsoft db keys, with the update being signed with
the new microsoft KEK key.

fwupd should be able to handle both updates.  I'm not sure whenever
that is live already or still in the testing phase.

If you are up for experiments you can try apply the updates manually
using the signed files from the repo listed above.  efi-updatevar
(efitools.rpm) should be able to do it.

Problem with that is not so much linux, but that a KEK update has never
happened before so there are chances that bios vendors messed up things
and updating the KEK doesn't work.  Also not sure how good older
hardware is covered.

take care,
  Gerd

-- 
_______________________________________________
devel mailing list -- devel@lists.fedoraproject.org
To unsubscribe send an email to devel-le...@lists.fedoraproject.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue

Reply via email to