Bug 1411213 (expired-secure-boot-certs)
| Summary: | pesign-bundled Red Hat Test Certificate and CA expired in 2013 | ||
|---|---|---|---|
| Product: | [Fedora] Fedora | Reporter: | David Ward <david.ward> |
| Component: | pesign | Assignee: | Peter Jones <pjones> |
| Status: | CLOSED NOTABUG | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
| Severity: | medium | Docs Contact: | |
| Priority: | unspecified | ||
| Version: | rawhide | CC: | pjones |
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | If docs needed, set a value | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2018-01-09 18:53:26 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
|
Description
David Ward
2017-01-09 06:35:34 UTC
This bug appears to have been reported against 'rawhide' during the Fedora 26 development cycle. Changing version to '26'. The expired certificates have not been replaced in 'rawhide' (or Fedora 26). Changing version back to 'rawhide'. This bug appears to have been reported against 'rawhide' during the Fedora 27 development cycle. Changing version to '27'. The expired certificates have not been replaced in 'rawhide' (or Fedora 27). Changing version back to 'rawhide'. It doesn't make any difference that the certificate has expired - nothing in the Secure Boot verification chain can safely use the validation window like HTTPS does. It's just a vestigial artifact of using CMS-like signing. There's two big problems with using the validation window in this for something like SB: One issue is that we don't have a trustworthy clock anyway. If you're trying to do an attack against Secure Boot, you're basically trying to get persistence once you've already got root - either you're trying to install a "bootkit" or you're trying to use a vulnerable OS /as/ a "bootkit". So an attacker has all the privilege they need to just change the system clock anyway. The other issue is that honoring the validation window means /hardware components expire/. SB's verification is how option ROMs on PCI peripherals are verified, and they need to keep working after the certificate expires. If anything honors the validation window, that means one day you reboot your machine and your HBAs and video cards simply do not work - your machine looks like it just bricked itself during a reboot. So in a lot of ways having an expired certificate as the "test" cert is actually the best possible option, because it means we can find anything that's erroneously checking the window. |