On Thu, Apr 10, 2025 at 12:01:18PM +0530, Ani Sinha wrote: > > > > On 9 Apr 2025, at 11:51 AM, Gerd Hoffman <kra...@redhat.com> wrote: > > > > Hi, > > > >>> The chicken-and-egg problem arises if you go for hashing and want embed > >>> the igvm file in the UKI. > >> > >> I don't really see how signing the IGVM file for secure boot helps > >> anything. > > > > It doesn't help indeed. This comes from the original idea by Alex to > > simply add a firmware image to the UKI. In that case the firmware is > > covered by the signature / hash, even though it is not needed. Quite > > the contrary, it complicates things when we want ship db/dbx in the > > firmware image. > > > > So most likely the firmware will not be part of the main UKI. Options > > for alternatives are using UKI add-ons, > > But add-ons are also subjected to signature verification. How does not using > the main UKI help?
For the first boot using secure boot doesn't help much, the trust in the firmware being loaded for the second boot is established via launch measurement not secure boot signature. For the second boot (with new firmware) you don't need the add-on any more. The main advantage of wrapping the igvm into a uki add-on is that we can easily use the hwid matching support of systemd-stub when packaging multiple firmware variants (aws, azure, gcp, qemu, ...). Not sure this will actually matter in practice though. take care, Gersd