-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
NewGenkeyCmd() doesn't allow bringing your own certificates #105
Comments
@kreeuwijk let me know if this is a good description of what we are trying to achieve: Foxboron/sbctl#303 (comment) we are still investigating the possibility of replacing genkey commands completely with a set of sbctl commands to prepare the keys needed for |
@jimmykarily |
You are suggesting changes to a command that I'm suggesting it shouldn't exist |
@jimmykarily agreed, if we can do all steps with |
I don't believe we require |
True, it's not necessary but if it does, it:
If these are not very important, I can just drop the PR. |
Many of the customers tend to be Windows-oriented, so I'd rather not standardize on having to use That also results in the desired filenames and it works around the issue of figuring out a way to get the files off the device when you're booted from a read-only ISO. It's just easier to put a regular OS on the box and then have a couple command lines to run to get the files needed. |
Steps to run on the machine with key enrolled to generate auth/esl
i am also testing with already exported cert, so we dont need to install sbctl on host machine |
Enki's
NewGenkeyCmd()
function always generates new self-signed certificates with openssl. This is a problem when the customer wants to use their own CA to issue the PK, KEK and DB certificates.We need to be able to take the provided certificates and the factory exported keys from a device as inputs and generate the rest from that:
enki
already is able to take the factory exported keys (ESL) from a device and add those to its own generated secure boot keys, so that's good. What's missing is the ability to bring your own starting certificates.Currently, the NewGenkeyCmd() function in enki always generates a fresh set of self-signed certificates, What needs to happen is that
enki
gets another switch that tells it to not runopenssl
to make new self-signed PK,KEK,DB certificates but instead read existing PK,KEK,DB certificates from disk and feed those to the rest of the process.CanvOS places all files noted above in the
/keys
directory forenki
, so it can expect to find the customer-provided certificate files there.The text was updated successfully, but these errors were encountered: