Uploaded image for project: 'RHEL'
  1. RHEL
  2. RHEL-87433

[RFE] Add the ability to enroll a custom public key to the MOK list for secure boot

Linking RHIVOS CVEs to...Migration: Automation ...RHELPRIO AssignedTeam ...SWIFT: POC ConversionSync from "Extern...XMLWordPrintable

    • Icon: Story Story
    • Resolution: Unresolved
    • Icon: Undefined Undefined
    • None
    • None
    • osbuild-composer
    • None
    • None
    • rhel-sst-image-builder
    • None
    • False
    • False
    • Hide

      None

      Show
      None
    • None
    • None
    • None
    • None
    • Unspecified
    • Unspecified
    • Unspecified
    • None

      BACKGROUND
      If a customer is using secure boot, they'll most likely need to enroll additional public keys (eg. to verify signed kernel modules used by 3rd party security software). Currently, the recommended procedure [1] is manual and there's no easy way to automate it. If we can provide such a feature in Image Builder, it might benefit its adoption, in particular considering the push towards better security we're seeing these days (eg. the NIS2 directive adoption).

      SUGGESTION
      A potential implementation could be to add an additional customizations directive in the Blueprint (eg. customizations.secureboot.import_keys).
      The new directive would take in input a list strings containing the path the public keys to import (similarly to what the customizations.rpm.import_keys already does).
      osbuild would then enroll the uploaded keys to the MOK list at build time.

      [1]: https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html-single/managing_monitoring_and_updating_the_kernel/index#enrolling-public-key-on-target-system-by-adding-the-public-key-to-the-mok-list_signing-a-kernel-and-modules-for-secure-boot

              osbuilders Osbuilders Bot Account
              rhn-support-rfurlan Riccardo Furlan
              Osbuilders Bot Account Osbuilders Bot Account
              Release Test Team Release Test Team
              Votes:
              0 Vote for this issue
              Watchers:
              1 Start watching this issue

                Created:
                Updated: