To reproduce:
* Use the stock OVMF_VARS_4M.ms.fd
* Boot with the live 12.6.0 bookworm image (I used 'standard') [1] or the >netinst image [2]
* mokutil --list-sbat-revocations shows:
sbat,1,2022052400
grub,2
* Boot with a freshly built live sid image [3]
* mokutil --list-sbat-revocations shows:
sbat,1,2024010900
shim,4
grub,3
grub.debian,4
* Boot with the bookworm image again -> the SBAT error message is shown.
This would mean that any machine that got an SBAT revocation would not be >able to boot the official Debian Bookworm images any more.
Does this mean that it would be necessary to release a set of 12.6.1 images? >(i.e. live, netinst, etc.)
There are other alternative on your test systems:
1. disable secure boot while testing (which of course is *not* the
right answer long-term!)
2. use mokutil --set-sbat-policy from a running system to go back to
a previous SBAT minimum level, or delete the policy altogether
3. if you're testing in a qemu VM, you can also use "virt-fw-vars"
from the "python3-virt-firmware" package to modify the SBAT (and
other) firmware settings from outside the VM. This is *incredibly*
useful when doing development and CI with shim.
Steve McIntyre <steve@einval.com> (2024-07-03):
There are other alternative on your test systems:
ACK, ta.
1. disable secure boot while testing (which of course is *not* the
right answer long-term!)
That's BIOS-based tests for me.
2. use mokutil --set-sbat-policy from a running system to go back to
a previous SBAT minimum level, or delete the policy altogether
3. if you're testing in a qemu VM, you can also use "virt-fw-vars"
from the "python3-virt-firmware" package to modify the SBAT (and
other) firmware settings from outside the VM. This is *incredibly*
useful when doing development and CI with shim.
ACK. At least at my level I *really* don't want to be diverging from
what end users are going to face: I really want to know about such
things, and not to publish if we know that's going to explode anyway.
There are other alternative on your test systems:
1. disable secure boot while testing (which of course is *not* the
right answer long-term!)
2. use mokutil --set-sbat-policy from a running system to go back to
a previous SBAT minimum level, or delete the policy altogether
3. if you're testing in a qemu VM, you can also use "virt-fw-vars"
from the "python3-virt-firmware" package to modify the SBAT (and
other) firmware settings from outside the VM. This is *incredibly*
useful when doing development and CI with shim.
Nod. Apologies for the surprise this time. I was hoping to minimise
the pain with quick uploads and migration, but... :-(
Sysop: | Keyop |
---|---|
Location: | Huddersfield, West Yorkshire, UK |
Users: | 485 |
Nodes: | 16 (2 / 14) |
Uptime: | 95:27:59 |
Calls: | 9,642 |
Files: | 13,701 |
Messages: | 6,163,498 |