Skip to content

Commit 1957070

Browse files
committed
Add comment explaining usage of OVMF generator
1 parent bade36f commit 1957070

File tree

1 file changed

+30
-0
lines changed

1 file changed

+30
-0
lines changed

tasks/prepare-secure-boot.yml

Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,34 @@
11
---
2+
# This playbook enrolls Platform, Key Exchange, and Signature Database keys
3+
# in the emulated NVRAM. NVRAM is the storage location for persistent
4+
# EFI state. The keys that are installed are as follows:
5+
#
6+
# * Platform Key: Red Hat Secure Boot (PK/KEK key 1)/[email protected].
7+
# This is a Red Hat controlled key which controls modification to the
8+
# Key Exchange Keys (KEK).
9+
#
10+
# * Key Exchange Keys:
11+
# 1) Microsoft Corporation KEK CA 2011
12+
# 2) Red Hat Secure Boot (PK/KEK key 1)/[email protected]
13+
#
14+
# The first KEK is used to sign the revocation database obtained from:
15+
# http://www.uefi.org/revocationlistfile. This allows you to use: dbxtool
16+
# to periodically update your local copy of this blacklist. The second gives
17+
# RedHat control over the dbx (Forbidden Signature) and db (Signature) databases.
18+
# This essentially makes your computer trust RedHat and Microsoft signed binaries.
19+
#
20+
# * Signature database (db) keys:
21+
# - Microsoft Windows Production PCA 2011 (for accepting Windows 8, Windows Server 2012 R2, etc boot loaders)
22+
# - Microsoft Corporation UEFI CA 2011 (for verifying the shim binary, and PCI expansion ROMs).
23+
#
24+
# Further signing keys can be enrolled in the shim binary to allow execution of custom binaries.
25+
#
26+
# When a platform key is enrolled, the secure boot mode changes from "setup mode" to "user mode"
27+
# and secure boot is automatically enabled. Secure boot can only be disabled via the EFI setup
28+
# menu - this is accessed by pressing delete when the VM is started. It does not seem possible to
29+
# to control this setting via libvirt or by using a qemu command line option.
30+
#
31+
# TODO: Allow installation of custom keys
232

333
- name: Gather os specific variables
434
include_vars: "{{ item }}"

0 commit comments

Comments
 (0)