From owner-freebsd-hackers@freebsd.org Mon Oct 7 04:58:34 2019 Return-Path: Delivered-To: freebsd-hackers@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 2C26513E0BD for ; Mon, 7 Oct 2019 04:58:34 +0000 (UTC) (envelope-from dcrosstech@gmail.com) Received: from mail-ot1-x32a.google.com (mail-ot1-x32a.google.com [IPv6:2607:f8b0:4864:20::32a]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 46mpCY0BY4z4GM0 for ; Mon, 7 Oct 2019 04:58:32 +0000 (UTC) (envelope-from dcrosstech@gmail.com) Received: by mail-ot1-x32a.google.com with SMTP id c10so9876467otd.9 for ; Sun, 06 Oct 2019 21:58:32 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:from:date:message-id:subject:to; bh=soBfot5eiMPh2eiIGsnnPUtn9sSjuHE8qfCN/7NLlMs=; b=tJh5JCLghP2/PifG/GaqAzqYkOPPf/qyLYQskkhHLgOc6dxmwdiUzHhe7PnfoT2LrD B9s1koqH5R7O75ZzTrUNbeiyiX7HeAP5uH6VYY6nP9JkbKaCw1J50dta7Txu9bxsaNzm 1QWixZ8z/GUYulGPCVcl3ZH1nAmdooodAsDaJ7C16zpLeykkE5QJa1+zmFlQwm9pfhv9 z+aAcl3Xybxk86XSgzamq55cRsJY/TZJB7D674FlYaBkv5wnOpUV1tlZDk5F7PXaD5nH 51+wE/NocR6Rqkvb57Yrrcutau6Ic2d1HHEOnCpGiEu3ftrIFC9QUUj0KA4vimJDrTFO iJjA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=soBfot5eiMPh2eiIGsnnPUtn9sSjuHE8qfCN/7NLlMs=; b=bjiA8ViCZU63SNzfWzXjbmnUKwgqXN7oxFqUoBGApLWJvYkdtwJjn+h7WXT1ZEYlPJ PhYkoj2rgBFvZou3eWTfOtj7zzj1y0zU5FPsw7DVYY/8m/gzizYXPUsQErFWwo67AxNW ku6VkuXJMxJeU1NOBNJ/X2wRDVRMq0cJHCLXgeB5lMZPZI2DF2cN9eP4Kgv82quewUfu NvCjzldte7L7gOr9cP78urcPm/ZJDsJNsM+ILyJS9kYZaLC/t4Wbb31RkqtpfRRy7mrV o5P7leZq1xwLDmL5svdqgOGOdRJES1Bj3KLYCZt/iiOMSVZZ/7ZK9ZRuIWPnkefj/DD+ yP3g== X-Gm-Message-State: APjAAAW1oR0KfJlSyKWpMeWVhTcV/KgQdsjINEHxBNaQdt/BHp8lgMlP t/xXlJ5XZp+L+ptwa9aqOPs9+PnqNq6Ed0ilAW4ZH+vh X-Google-Smtp-Source: APXvYqzCMF6+ktB+mn5jsI9MvhNs154TglsR9LHlCwGXqo/ABch/Ycob1wNVQfFRMqrkxjnEY41YbB6cXyDiVsVkU+Q= X-Received: by 2002:a9d:a63:: with SMTP id 90mr18933676otg.164.1570424311432; Sun, 06 Oct 2019 21:58:31 -0700 (PDT) MIME-Version: 1.0 From: David Cross Date: Mon, 7 Oct 2019 00:58:20 -0400 Message-ID: Subject: uefisign and loader To: FreeBSD Hackers X-Rspamd-Queue-Id: 46mpCY0BY4z4GM0 X-Spamd-Bar: -- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=tJh5JCLg; dmarc=pass (policy=none) header.from=gmail.com; spf=pass (mx1.freebsd.org: domain of dcrosstech@gmail.com designates 2607:f8b0:4864:20::32a as permitted sender) smtp.mailfrom=dcrosstech@gmail.com X-Spamd-Result: default: False [-3.00 / 15.00]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-1.00)[-1.000,0]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; FROM_HAS_DN(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2607:f8b0:4000::/36]; FREEMAIL_FROM(0.00)[gmail.com]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-hackers@freebsd.org]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; IP_SCORE_FREEMAIL(0.00)[]; RCPT_COUNT_ONE(0.00)[1]; IP_SCORE(0.00)[ip: (-7.89), ipnet: 2607:f8b0::/32(-2.55), asn: 15169(-2.15), country: US(-0.05)]; TO_DN_ALL(0.00)[]; DKIM_TRACE(0.00)[gmail.com:+]; DMARC_POLICY_ALLOW(-0.50)[gmail.com,none]; RCVD_IN_DNSWL_NONE(0.00)[a.2.3.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.b.8.f.7.0.6.2.list.dnswl.org : 127.0.5.0]; TO_MATCH_ENVRCPT_ALL(0.00)[]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+,1:+,2:~]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2607:f8b0::/32, country:US]; RCVD_COUNT_TWO(0.00)[2]; RCVD_TLS_ALL(0.00)[]; DWL_DNSWL_NONE(0.00)[gmail.com.dwl.dnswl.org : 127.0.5.0] Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 07 Oct 2019 04:58:34 -0000 I've been working on getting secureboot working under freebsd (I today just finished off a REALLY rough tool that lets one tweak uefi authenticated variables under freebsd, with an eye to try to get a patch to put this into efivar). After setting the PK, the KEK, and the db, I was super excited to finally secure-boot my machine, and discovered that I could not uefisign loader. Attempting to sign loader returns a cryptic: "section points inside the headers" and then hangs in pipe-read (via siginfo). (this is under 12.0 FWIW). I am able to sign boot1, however boot1.efi doesn't handle GELI keys so its not really useful for me. Suggestions?