summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorSerge Hallyn <serge@hallyn.com>2021-07-14 07:49:34 -0500
committerPeter Jones <pjones@redhat.com>2021-07-15 18:55:56 -0400
commit9a8a6cdb5e862648ee663eee6124bed05208639a (patch)
tree51c4a4aabf554ed40bcb1ced020d98cb3d93116a
parent9f973e4e95b1136b8c98051dbbdb1773072cc998 (diff)
downloadefi-boot-shim-9a8a6cdb5e862648ee663eee6124bed05208639a.tar.gz
efi-boot-shim-9a8a6cdb5e862648ee663eee6124bed05208639a.zip
SBAT.md: trivial fixes
1. Use : instead of , to separate a list. 2. Fix spelling of therefore. 3. Pull unrelated clause out of parenthesized clause. Signed-off-by: Serge Hallyn <serge@hallyn.com>
-rw-r--r--SBAT.md6
1 files changed, 3 insertions, 3 deletions
diff --git a/SBAT.md b/SBAT.md
index 1a5ecad9..c1edf15e 100644
--- a/SBAT.md
+++ b/SBAT.md
@@ -6,7 +6,7 @@ In the PC ecosystem, [UEFI Secure Boot](https://docs.microsoft.com/en-us/windows
is typically configured to trust 2 authorities for signing UEFI boot code, the
Microsoft UEFI Certificate Authority (CA) and Windows CA. When malicious or
security compromised code is detected, 2 revocation mechanisms are provided by
-compatible UEFI implementations, signing certificate or image hash. The UEFI
+compatible UEFI implementations: signing certificate or image hash. The UEFI
Specification does not provides any well tested additional revocation
mechanisms.
@@ -269,7 +269,7 @@ that the global generation numbers will eventually move forward and exclude
those products from booting on a UEFI Secure Boot enabled system. However a
product made up of GRUB and a closed source kernel is just as conceivable. In
that case the kernel version may never move forward once the product reaches
-its end of support. Therefor it is recommended that the product-specific
+its end of support. Therefore it is recommended that the product-specific
generation number be incremented past the latest one shown in any binary for
that product, effectively disabling that product on UEFI Secure Boot enabled
systems.
@@ -309,7 +309,7 @@ compromise.
The initial SBAT implementation will add SBAT metadata to Shim and GRUB and
enforce SBAT on all components labeled with it. Until a component (e.g. the
-Linux kernel gains SBAT metadata) it can not be revoked via SBAT, but only by
+Linux kernel) gains SBAT metadata it can not be revoked via SBAT, but only by
revoking the keys signing that component. These keys will should live in
separate, product-specific signed PE files that contain **only** the
certificate and SBAT metadata for the key files. These key files can then be