Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Expiring signing CA in 2026 (Microsoft Corporation UEFI CA 2011) - documented migration path? #679

Open
restena-sw opened this issue Aug 12, 2024 · 2 comments

Comments

@restena-sw
Copy link

Looking at Debian bookworm's shipped shim-signed packages, it looks like shim is still signed by

"Microsoft Corporation UEFI CA 2011"

which will expire in Oct 2026. At some point, shim would need to be signed by the successor

"Windows UEFI CA 2023"

at some point before that.

This change is non-trivial - either the loader can be signed by both CAs in the overlap time (if carrying two sigs is foreseen in the SecureBoot spec) or the signature changes hard with a next release.

It would be good to document publicly what the strategy is, and when it is to be executed.

For example, the PC I have is a bit older, and only has the 2011 CA in its SecureBoot trust store. There are also no UEFI updates coming any more that would add the 2023 edition (and it doesn't run Windows at all, so no Windows Update can add them).

Unannounced signature changes would break the boot after update; I will need to find a way to add the new CA to the trust store in some manual way. Assuming I'm not the only person with this problem, everyone in this situation would have an unpleasant day unless pre-warned properly.

@AdrianVovk
Copy link

The UEFI firmware doesn't care when the cert expires AFAIK. So in the worst case you can have two shims: one to boot anything signed w/ Microsoft's 2023 CA, which chainloads a newer shim

@AdrianVovk
Copy link

In theory I'm pretty sure Microsoft could also sign an update with their KEK to add the 2023 key to DB and push it through Windows Update and fwupd. Similar to how DBX updates have been going out all these years. In practice - unclear how that will go. They might deem it too risky to do.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants