Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

blog/content/post/2024-08-19-secureboot-freebsd.md: add #603

Draft
wants to merge 1 commit into
base: develop
Choose a base branch
from

Conversation

filipleple
Copy link
Member

No description provided.

@filipleple filipleple self-assigned this Aug 19, 2024
### Linux

On Linux, Secure Boot is supported using a small, signed bootloader called "
shim," which is pre-signed by Microsoft. Shim loads the GRUB bootloader, which
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

you can use backticks instead of quotes

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

also, bootloader in general, not necessarily GRUB only


### Linux

On Linux, Secure Boot is supported using a small, signed bootloader called "
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is the approach that major linux distros took, so they can sign their kernel themselves, instead of asking Microsoft to sign each kernel update.

But it does not mean shim is crucial, it is also possible to use similar approach as in freebsd.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This blogpost is important one to link here https://mjg59.dreamwidth.org/20303.html

* `boot1.efi` in turn loads `loader.efi`
* Finally, `loader.efi` loads the kernel.

The goal scenario, according to the FreeBSD Foundation, would be that a
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

target scenario, or the goal of this scenario, or similar, depending on what the original meaning was


## Creating a Secure Boot - ready FreeBSD EFI executable

This guide is about migrating your current installation, not from scratch
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

this sounds incomplete

$ makefs bootfs.img bootfs
```

determine the size of the boot filesystem. This will determine how much memory
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
determine the size of the boot filesystem. This will determine how much memory
Determine the size of the boot filesystem. This will determine how much memory

```
$ ls -l bootfs.img | awk '{print $5}'
```
add a safety factor of a couple hundred bytes (~512) to this number, and record
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Probably needs an empty line, also I would not break sentence by a block of code. Applies to other cases as well.

* Find the loader-kernel object. It should be located under
`<efi>/<freebsd>/loader.efi`
* Name the entry appropriately, confirm and save the changes.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

drop extra line


## Summary


Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

drop extra line

to your `/boot/loader.conf`.

## Summary

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actual technical summary could be there.




Unlock the full potential of your hardware and secure your firmware with the
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

For the "marketing" part, would you like to propose something @pietrushnic ?
Perhaps mention the SB training as well?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants