Skip to content

pcks#7(.p7a) format signature authenticate issue #12

@leitao1019

Description

@leitao1019

Dear Developer,

I am trying to use SEloader to authenticate the non-PE files in the UEFI secure boot process, but found that SEloader only authenticate the signature file (*.p7a) but not verify the original file.
I'd like to verify the zipped kernel file bzImage via pkcs#7(p7a) signatures, I generated a signature file bzImage.p7a for it. But when I replace a new kernel file and keep using the previous signature file(bzImage.p7a). SEloader also authenticate successfully.
seems SELoader did not verify the original file with .p7a format signature.

signing command:
selsign --key MOK.key --cert MOK.der --content-attached bzImage

logs:

lib/efi/mok2verify.c:133: attempting to verify the file /imgy/bzImage ...
Attempting to verify file \imgy\bzImage by MOK2 Verify Protocol ...
Signature verification is required
Attempting to load the content-attached signature file \imgy\bzImage.p7a ...
File \imgy\bzImage.p7a loaded (1498-byte)
Signed content extracted (73-byte): 53454C53011900000010000000010000002000000000000000090000000000000000000000200000009AB35409D6624926EB0F0F4D8A2AB4CA75B7FF2F03458374D1318350C09E04F1
Succeeded to verify PKCS#7 attached signature (signed content 73-byte)
Signature format revision 1 supported
Content attached in SELoader signature
Succeeded to verify the attached signature
The file \imgy\bzImage loaded with the exit code 0x0
Succeeded to verify file \imgy\bzImage by MOK2 Verify Protocol
lib/efi/mok2verify.c:177: succeeded to verify file /imgy/bzImage

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions