> On Oct 21, 2017, at 5:51 AM, Didier Kryn <[email protected]> wrote: > > Le 21/10/2017 à 09:58, Arnt Gulbrandsen a écrit : >> John Franklin writes: >>> That’s not an apology. Would you like to try again? >> >> I'm not Steve, but the occasion fits: >> >> Tobias, until I read your posting a couple of days ago I did not realise >> that UEFI/Secure Boot can be configured such that ONLY my kernels can be >> booted, not even fresh install media from the vendor. Thank you very much. > > Me neither. Who, in fact? There seems to be a lack of information on that > matter. Does anybody have some link to point us?
A generic guide to Secureboot and updating Secureboot keys in your uEFI
firmware:
https://www.rodsbooks.com/efi-bootloaders/secureboot.html
https://www.rodsbooks.com/efi-bootloaders/controlling-sb.html
Ubuntu’s guide to signing things for Secureboot:
https://insights.ubuntu.com/2017/08/11/how-to-sign-things-for-secure-boot/
Red Hat’s guide to signing kernels, kernel modules and installing MOKs in your
uEFI firmware:
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/system_administrators_guide/sect-signing-kernel-modules-for-secure-boot
OpenSUSE’s version:
https://doc.opensuse.org/documentation/leap/reference/html/book.opensuse.reference/cha.uefi.html
Between those four, you should be able to get a pretty good idea of how
Secureboot works and how to get shim to boot your own signed kernels, even your
own Devuan kernels.
And finally, writing your own .efi binary, which requires linking a C program
against a vast tree of dependencies a specific crt0 and static library:
https://www.rodsbooks.com/efi-programming/hello.html
jf
--
John Franklin
[email protected]
smime.p7s
Description: S/MIME cryptographic signature
_______________________________________________ Dng mailing list [email protected] https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng
