Skip to content

Commit e90c5af

Browse files
jsetjevathpela
authored andcommitted
Document how revocations can be delivered
Revocation metadata has been consolidated into SbatLevel_Variable.txt and can be delivered both built into shim as well as via revocations_sbat.efi binaries. This adds a short text file describing how revocation levels can be built into these components and delivered. Signed-off-by: Jan Setje-Eilers <[email protected]>
1 parent 6b8e40c commit e90c5af

File tree

1 file changed

+29
-0
lines changed

1 file changed

+29
-0
lines changed

Delivering_Sbat_Revocations.md

+29
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,29 @@
1+
When new sbat based revocations become public they are added to
2+
https://github.com/rhboot/shim/blob/main/SbatLevel_Variable.txt They
3+
are identified by their year, month, day, counter YYYYMMDDCC field in
4+
the header.
5+
6+
If secure boot is disabled, shim will always clear the applied
7+
revocations.
8+
9+
shim binaries will include the opt-in latest revocation payload
10+
available at the time that they are built. This can be applied by
11+
running mokutil --set-sbat-policy latest and rebooting with the new
12+
shim binary in place. A shim build can also specify a
13+
-DSBAT_AUTOMATIC_DATE=YYYYMMDDCC on the command line which will
14+
include and automatically apply that revocation. shim will never
15+
downgrade a revocation. The only way to roll back is to disable secure
16+
boot, load shim to clear the revocations and then re-apply the desired
17+
level.
18+
19+
In addition to building revocation levels into shim, they can also be
20+
delivered via a revocations_sbat.efi binary. These binaries can be
21+
created from the https://github.com/rhboot/certwrapper
22+
repository. This repository uses the same
23+
https://github.com/rhboot/shim/blob/main/SbatLevel_Variable.txt file
24+
as the source of the revocation metadata. Both
25+
SBAT_LATEST_DATE=YYYYMMDDCC and SBAT_AUTOMATIC_DATE=YYYYMMDDCC can be
26+
specified there. These files need to be signed with a certificate that
27+
your shim trusts. These files can be created without the need to
28+
deliver a new shim and can be set to have shim automatically apply a
29+
new revocations whey they are delivered into the system partition.

0 commit comments

Comments
 (0)