mirror of
https://github.com/ipxe/ipxe
synced 2025-12-30 13:11:11 +03:00
[efi] Include Secure Boot Advanced Targeting (SBAT) metadata
SBAT defines an encoding for security generation numbers stored as a CSV file within a special ".sbat" section in the signed binary. If a Secure Boot exploit is discovered then the generation number will be incremented alongside the corresponding fix. Platforms may then record the minimum generation number required for any given product. This allows for an efficient revocation mechanism that consumes minimal flash storage space (in contrast to the DBX mechanism, which allows for only a single-digit number of revocation events to ever take place across all possible signed binaries). Add SBAT metadata to iPXE EFI binaries to support this mechanism. Signed-off-by: Michael Brown <mcb30@ipxe.org>
This commit is contained in:
@@ -169,6 +169,24 @@ FILE_LICENCE ( GPL2_OR_LATER_OR_UBDL );
|
||||
*/
|
||||
#define PRODUCT_SETTING_URI "https://ipxe.org/cfg/%s"
|
||||
|
||||
/*
|
||||
* Product security name suffix
|
||||
*
|
||||
* Vendors creating signed iPXE binaries must set this to a non-empty
|
||||
* value (e.g. "2pint").
|
||||
*/
|
||||
#define PRODUCT_SBAT_NAME ""
|
||||
|
||||
/*
|
||||
* Product security generation
|
||||
*
|
||||
* Vendors creating signed iPXE binaries must set this to a non-zero
|
||||
* value, and must increment the value whenever a Secure Boot exploit
|
||||
* is fixed (unless the upstream IPXE_SBAT_GENERATION has already been
|
||||
* incremented as part of that fix).
|
||||
*/
|
||||
#define PRODUCT_SBAT_GENERATION 0
|
||||
|
||||
#include <config/local/branding.h>
|
||||
|
||||
#endif /* CONFIG_BRANDING_H */
|
||||
|
||||
Reference in New Issue
Block a user