Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

foresight / warning: Microsoft certificates from 2011 will probably be replaced by certs from 2023. #235

Open
conrad-heimbold opened this issue Aug 7, 2023 · 9 comments

Comments

@conrad-heimbold
Copy link

conrad-heimbold commented Aug 7, 2023

In the future, the Microsoft certificate:

... if I understand the "Windows Secure Boot Key Creation and Management Guidance", Chapter "1.5 Keys Required for Secure Boot on all PCs" correctly . This is just my assumption, based on the year number (2023) .

The older certificates from 2011 are in raw binary format; the linked newer ones from 2023 however are in base64-encoded binary format. That's the reason why I added the ".base64" ending.
So to make them usable and to have them in the same format as the older ones, we have to decode them:

base64 --decode MicWinUEFICA2023.crt.base64 > MicWinUEFICA2023.crt
base64 --decode MicCorKEK2KCA2023.crt.base64 > MicCorKEK2KCA2023.crt

Can anybody check if their freshly installed Windows 11 bootmgfw.efi in its newest version has a signature from the 2011 certs or from the 2023 certs?

This is just a foresight for the future; I hope it might help.

Thank you in advance for your help and work!

@conrad-heimbold conrad-heimbold changed the title foresight: Microsoft certificates from 2011 will probably be replaced by certs from 2023. foresight / warning: Microsoft certificates from 2011 will probably be replaced by certs from 2023. Aug 7, 2023
@Foxboron
Copy link
Owner

It's a bit more complicated.

There are also going to be several new certs so you can use different certs for OpROM and Linux distros and so on. This will be implemented when it becomes relevant.

@medhefgo
Copy link
Contributor

medhefgo commented Sep 6, 2023

There are also going to be several new certs so you can use different certs for OpROM and Linux distros and so on. This will be implemented when it becomes relevant.

I think it's best to get these into sbctl now, rather then later. Or someone is gonna enroll keys with --microsoft on some new device with drivers that are signed only with the new certificates and find themselves with an expensive paperweight.

According to systemd/systemd#29104 (review), you're supposed to have old and new key installed both now.

@Foxboron
Copy link
Owner

Foxboron commented Sep 7, 2023

According to systemd/systemd#29104 (review), you're supposed to have old and new key installed both now.

I missed that memo, can probably take a look at it soon'ish.

@Flickdm
Copy link

Flickdm commented Sep 11, 2023

@conrad-heimbold Hey! We saw your issue and we updated the certificates to DER format (just with a .crt extension)! As of right now the only thing the 2023 Windows production CA has signed is a UEFI Testing Application. We're working with our partners to make sure db append actually appends.

@medhefgo
Copy link
Contributor

@Flickdm Microsoft Corporation KEK 2K CA 2023 is still base64.

@Flickdm
Copy link

Flickdm commented Sep 13, 2023

Thanks for letting me know! I'm bringing it up internally!

@Flickdm
Copy link

Flickdm commented Sep 30, 2023

Just checked, the linked KEK is now der encoded as well!

@Foxboron
Copy link
Owner

@Flickdm Thanks for fixing this :)

@Foxboron
Copy link
Owner

https://techcommunity.microsoft.com/t5/windows-it-pro-blog/updating-microsoft-secure-boot-keys/ba-p/4055324

Should implement this soon :)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants