Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Implement secure boot enforcement #19

Closed
wants to merge 2 commits into from

Conversation

andSmv
Copy link

@andSmv andSmv commented Jul 20, 2023

Depending on a parameter, varstored aborts if secure_boot_enable is activated, but no certificates are present.
This behavior was discussed in [https://github.com//issues/16]

@stormi
Copy link
Contributor

stormi commented Jul 20, 2023

It's still a draft because we need to test it in situation (with a modified XAPI to set the secureboot-enforce setting), but otherwise is ready for review.

handler.c Outdated
&gEfiGlobalVariableGuid, &data, &data_len);

if (status != EFI_SUCCESS)
return false;
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

If we ever enter this condition, it might deserve a specific WARN log.

varstored.c Outdated
@@ -532,6 +543,11 @@ varstored_initialize(domid_t domid)
}
}

if (!check_secure_boot()) {
ERR("Secure boot is required, but isn't acitvated\n");
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Typo

Suggested change
ERR("Secure boot is required, but isn't acitvated\n");
ERR("Secure boot is required, but isn't activated\n");

Depending on a parameter, varstored aborts if secure_boot_enable is activated, but no
certificates are present.

Signed-off-by: Andrei Semenov <[email protected]>
benjamreis added a commit to xcp-ng/xen-api that referenced this pull request Jul 25, 2023
This setting will be used by varstored to know
wheter to allow the start of a VM that has no certificates
when secureboot is enabled.

Default: false to keep the previous behavior.

See: xapi-project/varstored#19

Signed-off-by: BenjiReis <[email protected]>
benjamreis added a commit to xcp-ng/xen-api that referenced this pull request Jul 25, 2023
This setting will be used by varstored to know
wheter to allow the start of a VM that has no certificates
when secureboot is enabled by writing in the xenstore in
`/local/domain/<domid>/platform/secureboot-enforce`.

Default: false to keep the previous behavior.

See: xapi-project/varstored#19

Signed-off-by: BenjiReis <[email protected]>
benjamreis added a commit to xcp-ng/xen-api that referenced this pull request Jul 25, 2023
This setting will be used by varstored to know
wheter to allow the start of a VM that has no certificates
when secureboot is enabled by writing in the xenstore in
`/local/domain/<domid>/platform/secureboot-enforce`.

Default: false to keep the previous behavior.

See: xapi-project/varstored#19

Signed-off-by: BenjiReis <[email protected]>
benjamreis added a commit to xcp-ng/xen-api that referenced this pull request Jul 25, 2023
This setting will be used by varstored to know
wheter to allow the start of a VM that has no certificates
when secureboot is enabled by writing in the xenstore in
`/local/domain/<domid>/platform/secureboot-enforce`.

Default: false to keep the previous behavior.

See: xapi-project/varstored#19

Signed-off-by: BenjiReis <[email protected]>
benjamreis added a commit to xcp-ng/xen-api that referenced this pull request Jul 27, 2023
This setting will be used by varstored to know
wheter to allow the start of a VM that has no certificates
when secureboot is enabled by writing in the xenstore in
`/local/domain/<domid>/platform/secureboot-enforce`.

Default: false to keep the previous behavior.

See: xapi-project/varstored#19

Signed-off-by: BenjiReis <[email protected]>
benjamreis added a commit to xcp-ng/xen-api that referenced this pull request Jul 27, 2023
This setting will be used by varstored to know
wheter to allow the start of a VM that has no certificates
when secureboot is enabled by writing in the xenstore in
`/local/domain/<domid>/platform/secureboot-enforce`.

Default: false to keep the previous behavior.

See: xapi-project/varstored#19

Signed-off-by: BenjiReis <[email protected]>
benjamreis added a commit to xcp-ng/xen-api that referenced this pull request Jul 27, 2023
This setting will be used by varstored to know
wheter to allow the start of a VM that has no certificates
when secureboot is enabled by writing in the xenstore in
`/local/domain/<domid>/platform/secureboot-enforce`.

Default: false to keep the previous behavior.

See: xapi-project/varstored#19

Signed-off-by: BenjiReis <[email protected]>
@stormi
Copy link
Contributor

stormi commented Sep 6, 2023

Closing. See #16 (comment).

@andSmv andSmv closed this Sep 6, 2023
@andSmv
Copy link
Author

andSmv commented Sep 6, 2023

Finally, we don't need to change anymore varstored behaviour

@stormi
Copy link
Contributor

stormi commented Mar 22, 2024

Reopening following the reopening of #16

@stormi
Copy link
Contributor

stormi commented Mar 22, 2024

Looks like I can't reopen it. We'll create another.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants