-
Notifications
You must be signed in to change notification settings - Fork 22
Description
Dear Developer,
I am trying to use SEloader to authenticate the non-PE files in the UEFI secure boot process, but found that SEloader only authenticate the signature file (*.p7a) but not verify the original file.
I'd like to verify the zipped kernel file bzImage via pkcs#7(p7a) signatures, I generated a signature file bzImage.p7a for it. But when I replace a new kernel file and keep using the previous signature file(bzImage.p7a). SEloader also authenticate successfully.
seems SELoader did not verify the original file with .p7a format signature.
signing command:
selsign --key MOK.key --cert MOK.der --content-attached bzImage
logs:
lib/efi/mok2verify.c:133: attempting to verify the file /imgy/bzImage ...
Attempting to verify file \imgy\bzImage by MOK2 Verify Protocol ...
Signature verification is required
Attempting to load the content-attached signature file \imgy\bzImage.p7a ...
File \imgy\bzImage.p7a loaded (1498-byte)
Signed content extracted (73-byte): 53454C53011900000010000000010000002000000000000000090000000000000000000000200000009AB35409D6624926EB0F0F4D8A2AB4CA75B7FF2F03458374D1318350C09E04F1
Succeeded to verify PKCS#7 attached signature (signed content 73-byte)
Signature format revision 1 supported
Content attached in SELoader signature
Succeeded to verify the attached signature
The file \imgy\bzImage loaded with the exit code 0x0
Succeeded to verify file \imgy\bzImage by MOK2 Verify Protocol
lib/efi/mok2verify.c:177: succeeded to verify file /imgy/bzImage