summaryrefslogtreecommitdiff
path: root/Cryptlib/Library
diff options
context:
space:
mode:
authorPeter Jones <pjones@redhat.com>2013-10-01 14:03:16 -0400
committerPeter Jones <pjones@redhat.com>2013-10-01 14:03:16 -0400
commitcbef697a96d9fcd7e0949e4cf772955b32a92290 (patch)
treed9302ca984993d8f7baf45080c7afbb9ad569c5c /Cryptlib/Library
parenta1f2863584ef780eb0f974efe226f1c2524db681 (diff)
downloadefi-boot-shim-cbef697a96d9fcd7e0949e4cf772955b32a92290.tar.gz
efi-boot-shim-cbef697a96d9fcd7e0949e4cf772955b32a92290.zip
Harden shim against non-participating bootloaders.
It works like this: during startup of shim, we hook into the system's ExitBootServices() and StartImage(). If the system's StartImage() is called, we automatically unhook, because we're chainloading to something the system can verify. When shim's verify is called, we record what kind of certificate the image was verified against. If the call /succeeds/, we remove our hooks. If ExitBootServices() is called, we check how the bootloader verified whatever it is loading. If it was verified by its hash, we unhook everything and call the system's EBS(). If it was verified by certificate, we check if it has called shim_verify(). If it has, we unhook everything and call the system's EBS() If the bootloader has not verified anything, and is itself verified by a certificate, we display a security violation warning and halt the machine.
Diffstat (limited to 'Cryptlib/Library')
0 files changed, 0 insertions, 0 deletions