Make sure you have provided the following information:
- link to your code branch cloned from rhboot/shim-review in the form user/repo@tag baramundisoftware/shim-review@master
- completed README.md file with the necessary information https://github.com/baramundisoftware/shim-review/blob/master/README.md
- shim.efi to be signed https://github.com/baramundisoftware/shim-review/blob/master/shim_x64.efi
- public portion of your certificate(s) embedded in shim (the file passed to VENDOR_CERT_FILE) https://github.com/baramundisoftware/shim-review/blob/master/bsAG_EV_productive_2020.cer
- binaries, for which hashes are added do vendor_db ( if you use vendor_db and have hashes allow-listed ) not used
- any extra patches to shim via your own git tree or as files No extra patches
- any extra patches to grub via your own git tree or as files https://github.com/baramundisoftware/grub2
- build logs https://github.com/baramundisoftware/shim-review/blob/master/shim_x64_build.log
- a Dockerfile to reproduce the build of the provided shim EFI binaries https://github.com/baramundisoftware/shim-review/blob/master/Dockerfile
baramundi software AG
baramundi Management Suite
This matches https://github.com/rhboot/shim/releases/tag/15.4 and contains
Yes
What's the justification that this really does need to be signed for the whole world to be able to boot it:
The SHIM bootloader starts a grub2 which decides if it should boot the local installed windows operating system or netboot a windows PE image. This is necessary to support remote operating system installation on clients in the LAN. With a signed SHIM bootloader we are able to support clients with enabled secure boot feature.
Private key is stored in hardware module with controlled access.
Yes
If you use new vendor_db functionality, are any hashes allow-listed, and if yes: for what binaries ?
vendor_db not used, no hashes allow-listed
Is kernel upstream commit 75b0cea7bf307f362057cc778efe89af4c615354 present in your kernel, if you boot chain includes a Linux kernel ?
No Linux kernel is used
Yes The grub2 sources we use have it's origin in the commit https://git.launchpad.net/ubuntu/+source/grub2/tag/?h=applied/2.04-1ubuntu44
"Please specifically confirm that you add a vendor specific SBAT entry for SBAT header in each binary that supports SBAT metadata
Please provide exact SBAT entries for all SBAT binaries you are booting or planning to boot directly through shim
shim: sbat,1,SBAT Version,sbat,1,https://github.com/rhboot/shim/blob/main/SBAT.md shim,1,UEFI shim,shim,1,https://github.com/rhboot/shim
grub: sbat,1,SBAT Version,sbat,1,https://github.com/rhboot/shim/blob/main/SBAT.md grub,1,Free Software Foundation,grub,2.04,https://www.gnu.org/software/grub/ grub.baramundi,1,Baramundi,grub2,2.04-1ubuntu44.2-bblefi1,https://github.com/baramundisoftware/grub2
No. We changed the EV certificate embedded in the shim, so the old shim can only start grubs signed with the old ev certificate.
Did you change your certificate strategy, so that affected by CVE-2020-14372, CVE-2020-25632, CVE-2020-25647, CVE-2020-27749,
CVE-2020-14308, CVE-2020-14309, CVE-2020-14310, CVE-2020-14311, CVE-2020-15705 ( July 2020 grub2 CVE list + March 2021 grub2 CVE list )
We used a new EV certificate which is only used for the new grub 2.04 which origin is the commit https://git.launchpad.net/ubuntu/+source/grub2/tag/?h=applied/2.04-1ubuntu44
* Upstream grub2 shim_lock verifier or * Downstream RHEL/Fedora/Debian/Canonical like implementation ?
Downstream RHEL/Fedora/Debian/Canonical like implementation see: https://github.com/baramundisoftware/grub2
grub 2.04 (extended) see: https://github.com/baramundisoftware/grub2 The grub2 sources we use have it's origin in the commit https://git.launchpad.net/ubuntu/+source/grub2/tag/?h=applied/2.04-1ubuntu44
Our shim only launches the mentioned grub 2.04
The SHIM bootloader starts a grub2 which decides if it should boot the local installed windows operating system or netboot a windows PE image. This is necessary to support remote operating system installation on clients in the LAN. With a signed SHIM bootloader we are able to support clients with enabled secure boot feature.
No certificate got reused. The EV certificate used for the shim is new. No need for vendor_dbx entry.
with standard grub 2.04 functionality, we prevent to start any unsigned bootloader
No
We launch Windows and Windows PE loader and kernel
no changes were made to the original shim
shim_x64.efi MD5 Hash:
2AD3AD28458C81F210DD95150DDB8110