Skip to content

Commit

Permalink
Document how revocations can be delivered
Browse files Browse the repository at this point in the history
Revocation metadata has been consolidated into SbatLevel_Variable.txt and
can be delivered both built into shim as well as via revocations_sbat.efi
binaries. This adds a short text file describing how revocation levels
can be built into these components and delivered.

Signed-off-by: Jan Setje-Eilers <Jan.SetjeEilers@oracle.com>
  • Loading branch information
jsetje authored and vathpela committed Feb 18, 2025
1 parent 6b8e40c commit 301cf52
Showing 1 changed file with 29 additions and 0 deletions.
29 changes: 29 additions & 0 deletions Delivering_Sbat_Revocations.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,29 @@
When new sbat based revocations become public they are added to
https://github.com/rhboot/shim/blob/main/SbatLevel_Variable.txt They
are identified by their year, month, day, counter YYYYMMDDCC field in
the header.

If secure boot is disabled, shim will always clear the applied
revocations.

shim binaries will include the opt-in latest revocation payload
available at the time that they are built. This can be applied by
running mokutil --set-sbat-policy latest and rebooting with the new
shim binary in place. A shim build can also specify a
-DSBAT_AUTOMATIC_DATE=YYYYMMDDCC on the command line which will
include and automatically apply that revocation. shim will never
downgrade a revocation. The only way to roll back is to disable secure
boot, load shim to clear the revocations and then re-apply the desired
level.

In addition to building revocation levels into shim, they can also be
delivered via a revocations_sbat.efi binary. These binaries can be
created from the https://github.com/rhboot/certwrapper
repository. This repository uses the same
https://github.com/rhboot/shim/blob/main/SbatLevel_Variable.txt file
as the source of the revocation metadata. Both
SBAT_LATEST_DATE=YYYYMMDDCC and SBAT_AUTOMATIC_DATE=YYYYMMDDCC can be
specified there. These files need to be signed with a certificate that
your shim trusts. These files can be created without the need to
deliver a new shim and can be set to have shim automatically apply a
new revocations whey they are delivered into the system partition.

0 comments on commit 301cf52

Please sign in to comment.