![]() This allows us to 'nest' firmware formats, and removes a ton of duplication. The aim here is to deprecate FuFirmwareImage -- it's almost always acting as a 'child' FuFirmware instance, and even copies most of the vfuncs to allow custom types. If I'm struggling to work out what should be a FuFirmware and what should be a FuFirmwareImage then a plugin author has no hope. For simple payloads we were adding bytes into an image and then the image into a firmware. This gets really messy when most plugins are treating the FuFirmware *as* the binary firmware file. The GBytes saved in the FuFirmware would be considered the payload with the aim of not using FuFirmwareImage in the single-image case. |
||
---|---|---|
.. | ||
fuzzing | ||
dbxtool.h2m | ||
fu-dbxtool.c | ||
fu-efi-image.c | ||
fu-efi-image.h | ||
fu-plugin-uefi-dbx.c | ||
fu-self-test.c | ||
fu-uefi-dbx-common.c | ||
fu-uefi-dbx-common.h | ||
fu-uefi-dbx-device.c | ||
fu-uefi-dbx-device.h | ||
meson.build | ||
README.md |
UEFI dbx Support
Introduction
Updating the UEFI revocation database prevents starting EFI binaries with known security issues, and is typically no longer done from a firmware update due to the risk of the machine being "bricked" if the bootloader is not updated first.
This plugin also checks if the UEFI dbx contains all the most recent revoked checksums. The result will be stored in an security attribute for HSI.
Firmware Format
The daemon will decompress the cabinet archive and extract a firmware blob in EFI_SIGNATURE_LIST format.
See https://www.uefi.org/sites/default/files/resources/UEFI%20Spec%202_6.pdf for details.
This plugin supports the following protocol ID:
- org.uefi.dbx
GUID Generation
These devices use the GUID constructed of the uppercase SHA256 of the X509 certificates found in the system KEK and optionally the EFI architecture. e.g.
UEFI\CRT_{sha256}
UEFI\CRT_{sha256}&ARCH_{arch}
...where arch
is typically one of IA32
, X64
, ARM
or AA64
Update Behavior
The firmware is deployed when the machine is in normal runtime mode, but it is only activated when the system is restarted.
Vendor ID Security
The vendor ID is hardcoded to UEFI:Microsoft
for all devices.
External interface access
This plugin requires:
- read/write access to
/sys/firmware/efi/efivars