> On Oct 21, 2017, at 5:51 AM, Didier Kryn <k...@in2p3.fr> wrote:
> 
> Le 21/10/2017 à 09:58, Arnt Gulbrandsen a écrit :
>> John Franklin writes:
>>> That’s not an apology.  Would you like to try again?
>> 
>> I'm not Steve, but the occasion fits:
>> 
>> Tobias, until I read your posting a couple of days ago I did not realise 
>> that UEFI/Secure Boot can be configured such that ONLY my kernels can be 
>> booted, not even fresh install media from the vendor. Thank you very much. 
> 
>    Me neither. Who, in fact? There seems to be a lack of information on that 
> matter. Does anybody have some link to point us?

A generic guide to Secureboot and updating Secureboot keys in your uEFI 
firmware:

        https://www.rodsbooks.com/efi-bootloaders/secureboot.html
        https://www.rodsbooks.com/efi-bootloaders/controlling-sb.html


Ubuntu’s guide to signing things for Secureboot:

        
https://insights.ubuntu.com/2017/08/11/how-to-sign-things-for-secure-boot/

Red Hat’s guide to signing kernels, kernel modules and installing MOKs in your 
uEFI firmware:

        
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/system_administrators_guide/sect-signing-kernel-modules-for-secure-boot

OpenSUSE’s version:

        
https://doc.opensuse.org/documentation/leap/reference/html/book.opensuse.reference/cha.uefi.html

Between those four, you should be able to get a pretty good idea of how 
Secureboot works and how to get shim to boot your own signed kernels, even your 
own Devuan kernels.


And finally, writing your own .efi binary, which requires linking a C program 
against a vast tree of dependencies a specific crt0 and static library:

        https://www.rodsbooks.com/efi-programming/hello.html

jf
-- 
John Franklin
frank...@tux.org



Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng

Reply via email to