|
| 1 | +When new sbat based revocations become public they are added to |
| 2 | +https://github.com/rhboot/shim/blob/main/SbatLevel_Variable.txt They |
| 3 | +are identified by their year, month, day, counter YYYYMMDDCC field in |
| 4 | +the header. |
| 5 | + |
| 6 | +If secure boot is disabled, shim will always clear the applied |
| 7 | +revocations. |
| 8 | + |
| 9 | +shim binaries will include the opt-in latest revocation payload |
| 10 | +available at the time that they are built. This can be applied by |
| 11 | +running mokutil --set-sbat-policy latest and rebooting with the new |
| 12 | +shim binary in place. A shim build can also specify a |
| 13 | +-DSBAT_AUTOMATIC_DATE=YYYYMMDDCC on the command line which will |
| 14 | +include and automatically apply that revocation. shim will never |
| 15 | +downgrade a revocation. The only way to roll back is to disable secure |
| 16 | +boot, load shim to clear the revocations and then re-apply the desired |
| 17 | +level. |
| 18 | + |
| 19 | +In addition to building revocation levels into shim, they can also be |
| 20 | +delivered via a revocations_sbat.efi binary. These binaries can be |
| 21 | +created from the https://github.com/rhboot/certwrapper |
| 22 | +repository. This repository uses the same |
| 23 | +https://github.com/rhboot/shim/blob/main/SbatLevel_Variable.txt file |
| 24 | +as the source of the revocation metadata. Both |
| 25 | +SBAT_LATEST_DATE=YYYYMMDDCC and SBAT_AUTOMATIC_DATE=YYYYMMDDCC can be |
| 26 | +specified there. These files need to be signed with a certificate that |
| 27 | +your shim trusts. These files can be created without the need to |
| 28 | +deliver a new shim and can be set to have shim automatically apply a |
| 29 | +new revocations whey they are delivered into the system partition. |
0 commit comments