From patchwork Thu Jun 25 14:10:15 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Quirin Gylstorff X-Patchwork-Id: 11625477 Return-Path: Received: from mail.kernel.org (pdx-korg-mail-1.web.codeaurora.org [172.30.200.123]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id ED16114B7 for ; Thu, 25 Jun 2020 14:10:22 +0000 (UTC) Received: from web01.groups.io (web01.groups.io [66.175.222.12]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id C777520675 for ; Thu, 25 Jun 2020 14:10:22 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (1024-bit key) header.d=lists.cip-project.org header.i=@lists.cip-project.org header.b="p/vVNAWI" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org C777520675 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=siemens.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=bounce+64572+4829+4520428+8129116@lists.cip-project.org X-Received: by 127.0.0.2 with SMTP id IoueYY4521763xUg3qfpt1FD; Thu, 25 Jun 2020 07:10:22 -0700 X-Received: from david.siemens.de (david.siemens.de [192.35.17.14]) by mx.groups.io with SMTP id smtpd.web11.11426.1593094221295219319 for ; Thu, 25 Jun 2020 07:10:21 -0700 X-Received: from mail1.sbs.de (mail1.sbs.de [192.129.41.35]) by david.siemens.de (8.15.2/8.15.2) with ESMTPS id 05PEAJ6G021343 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for ; Thu, 25 Jun 2020 16:10:19 +0200 X-Received: from md2dvrtc.ad001.siemens.net ([167.87.6.122]) by mail1.sbs.de (8.15.2/8.15.2) with ESMTP id 05PEAFXa000356; Thu, 25 Jun 2020 16:10:19 +0200 From: "Quirin Gylstorff" To: cip-dev@lists.cip-project.org, Jan.Kiszka@siemens.com Cc: Quirin Gylstorff Subject: [cip-dev] [isar-cip-core RFC 7/7] doc: Add README for secureboot Date: Thu, 25 Jun 2020 16:10:15 +0200 Message-Id: <20200625141015.31719-8-Quirin.Gylstorff@siemens.com> In-Reply-To: <20200625141015.31719-1-Quirin.Gylstorff@siemens.com> References: <20200625141015.31719-1-Quirin.Gylstorff@siemens.com> MIME-Version: 1.0 Precedence: Bulk List-Unsubscribe: Sender: cip-dev@lists.cip-project.org List-Id: Mailing-List: list cip-dev@lists.cip-project.org; contact cip-dev+owner@lists.cip-project.org Delivered-To: mailing list cip-dev@lists.cip-project.org Reply-To: cip-dev@lists.cip-project.org X-Gm-Message-State: RcJ1qrEcRXFyQUuaXOGQY5Y3x4520428AA= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=lists.cip-project.org; q=dns/txt; s=20140610; t=1593094222; bh=5TXT20Q6s4wkO32P2qxQeH1opJ9FGAApCmE658lTKP8=; h=Cc:Content-Type:Date:From:Reply-To:Subject:To; b=p/vVNAWI/VND/CFGMXjYedYzFdBi0hDnTeUfoQ9nJsMJCNHydTUgrSaQLYFZnVHClGw ffD5P3I+biB5FDSIc4/tgPj/XQd7Gov/I6mUpY9+WGUNJePE5D7AUqTTMawdQeB6m1EkA xAZd8hjenpSNc1PRrYonAArbd6AF+25Xpj8= From: Quirin Gylstorff Signed-off-by: Quirin Gylstorff --- doc/README.secureboot.md | 188 +++++++++++++++++++++++++++++++++++++++ kas/opt/qemu-wic.yml | 14 +++ 2 files changed, 202 insertions(+) create mode 100644 doc/README.secureboot.md create mode 100644 kas/opt/qemu-wic.yml diff --git a/doc/README.secureboot.md b/doc/README.secureboot.md new file mode 100644 index 0000000..3cd76af --- /dev/null +++ b/doc/README.secureboot.md @@ -0,0 +1,188 @@ +# Efibootguard Secure boot + +This document describes how to generate a secure boot capable image with +[efibootguard](https://github.com/siemens/efibootguard). + +## Description + +The image build signs the efibootguard bootloader (bootx64.efi) and generates +a signed [unified kernel image](https://systemd.io/BOOT_LOADER_SPECIFICATION/). +A unified kernel image packs the kernel, initramfs and the kernel command-line +in one binary object. As the kernel command-line is immutable after the build +process, the previous selection of the root file system with a command-line parameter is no longer +possible. Therefore the selection of the root file-system occurs now in the initramfs. + +The image uses an A/B partition layout to update the root file system. The sample implementation to +select the root file system generates a uuid and stores the id in /etc/os-release and in the initramfs. +During boot the initramfs compares its own uuid with the uuid stored in /etc/os-release of each rootfs. +If a match is found the rootfs is used for the boot. + +## Adaptation for Images + +### WIC +The following elements must be present in a wks file to create a secure boot capable image. + +``` +part --source efibootguard-efi --sourceparams "signwith=