155 lines
4.3 KiB
Text
155 lines
4.3 KiB
Text
|
#!/usr/bin/env bash
|
||
|
# Copyright (c) 2015 by Roderick W. Smith
|
||
|
# Copyright (c) 2020 Corey Hinshaw
|
||
|
#
|
||
|
# This program is free software: you can redistribute it and/or modify
|
||
|
# it under the terms of the GNU General Public License as published by
|
||
|
# the Free Software Foundation, either version 3 of the License, or
|
||
|
# (at your option) any later version.
|
||
|
#
|
||
|
# This program is distributed in the hope that it will be useful,
|
||
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||
|
# GNU General Public License for more details.
|
||
|
#
|
||
|
# You should have received a copy of the GNU General Public License
|
||
|
# along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||
|
|
||
|
[ -n "${DEBUG}" ] && set -x
|
||
|
set -e
|
||
|
|
||
|
usage() {
|
||
|
cat <<EOF
|
||
|
Usage: sbkeys [OPTION]...
|
||
|
Generate secure boot keys
|
||
|
|
||
|
Options:
|
||
|
-h Print this help text
|
||
|
-m Generate signature database entries for Microsoft certificates
|
||
|
EOF
|
||
|
}
|
||
|
|
||
|
generate_keys() {
|
||
|
# Do not create new keys if key files already exist
|
||
|
KEYS=(
|
||
|
PK.key PK.crt PK.cer PK.esl PK.auth
|
||
|
KEK.key KEK.crt KEK.cer KEK.esl KEK.auth
|
||
|
DB.key DB.crt DB.cer DB.esl DB.auth
|
||
|
noPK.esl noPK.auth
|
||
|
myGUID.txt
|
||
|
)
|
||
|
for file in ${KEYS[@]}; do
|
||
|
if [ -f ${file} ]; then
|
||
|
echo "Skipping key generation: keys already exist in $(pwd)"
|
||
|
return
|
||
|
fi
|
||
|
done
|
||
|
|
||
|
echo -n "Enter a Common Name to embed in the keys: "
|
||
|
read NAME
|
||
|
|
||
|
# Platform key
|
||
|
openssl req -new -x509 \
|
||
|
-subj "/CN=${NAME} PK/" -days 3650 -nodes \
|
||
|
-newkey rsa:2048 -sha256 \
|
||
|
-keyout PK.key -out PK.crt
|
||
|
openssl x509 -in PK.crt -out PK.cer -outform DER
|
||
|
|
||
|
# Key exchange key
|
||
|
openssl req -new -x509 \
|
||
|
-subj "/CN=${NAME} KEK/" -days 3650 -nodes \
|
||
|
-newkey rsa:2048 -sha256 \
|
||
|
-keyout KEK.key -out KEK.crt
|
||
|
openssl x509 -in KEK.crt -out KEK.cer -outform DER
|
||
|
|
||
|
# Signature database
|
||
|
openssl req -new -x509 \
|
||
|
-subj "/CN=${NAME} DB/" -days 3650 -nodes \
|
||
|
-newkey rsa:2048 -sha256 \
|
||
|
-keyout DB.key -out DB.crt
|
||
|
openssl x509 -in DB.crt -out DB.cer -outform DER
|
||
|
|
||
|
GUID="$(uuidgen -r)"
|
||
|
echo ${GUID} > myGUID.txt
|
||
|
|
||
|
cert-to-efi-sig-list -g ${GUID} PK.crt PK.esl
|
||
|
cert-to-efi-sig-list -g ${GUID} KEK.crt KEK.esl
|
||
|
cert-to-efi-sig-list -g ${GUID} DB.crt DB.esl
|
||
|
rm -f noPK.esl
|
||
|
touch noPK.esl
|
||
|
|
||
|
sign-efi-sig-list \
|
||
|
-t "$(date --date='1 second' +'%Y-%m-%d %H:%M:%S')" \
|
||
|
-k PK.key -c PK.crt \
|
||
|
PK PK.esl PK.auth
|
||
|
sign-efi-sig-list \
|
||
|
-t "$(date --date='1 second' +'%Y-%m-%d %H:%M:%S')" \
|
||
|
-k PK.key -c PK.crt \
|
||
|
PK noPK.esl noPK.auth
|
||
|
sign-efi-sig-list \
|
||
|
-t "$(date --date='1 second' +'%Y-%m-%d %H:%M:%S')" \
|
||
|
-k PK.key -c PK.crt \
|
||
|
KEK KEK.esl KEK.auth
|
||
|
sign-efi-sig-list \
|
||
|
-t "$(date --date='1 second' +'%Y-%m-%d %H:%M:%S')" \
|
||
|
-k KEK.key -c KEK.crt \
|
||
|
DB DB.esl DB.auth
|
||
|
|
||
|
chmod 0600 *.key
|
||
|
}
|
||
|
|
||
|
generate_ms_db() {
|
||
|
msguid=77fa9abd-0359-4d32-bd60-28f4e78f784b
|
||
|
|
||
|
msdb="MS_db.esl add_MS_db.auth"
|
||
|
for file in $msdb; do
|
||
|
if [ -f $file ]; then
|
||
|
echo "Microsoft signature lists already exist in $(pwd)"
|
||
|
return
|
||
|
fi
|
||
|
done
|
||
|
|
||
|
wget --user-agent="Mozilla" https://www.microsoft.com/pkiops/certs/MicWinProPCA2011_2011-10-19.crt
|
||
|
wget --user-agent="Mozilla" https://www.microsoft.com/pkiops/certs/MicCorUEFCA2011_2011-06-27.crt
|
||
|
|
||
|
sbsiglist --owner "$msguid" --type x509 --output MS_Win_db.esl MicWinProPCA2011_2011-10-19.crt
|
||
|
sbsiglist --owner "$msguid" --type x509 --output MS_UEFI_db.esl MicCorUEFCA2011_2011-06-27.crt
|
||
|
cat MS_Win_db.esl MS_UEFI_db.esl > MS_db.esl
|
||
|
sign-efi-sig-list -a -g "$msguid" -k KEK.key -c KEK.crt DB MS_db.esl add_MS_db.auth
|
||
|
|
||
|
rm MS_Win_db.esl MS_UEFI_db.esl MicWinProPCA2011_2011-10-19.crt MicCorUEFCA2011_2011-06-27.crt
|
||
|
}
|
||
|
|
||
|
mskeys=0
|
||
|
|
||
|
while getopts ":hm" opt; do
|
||
|
case $opt in
|
||
|
h)
|
||
|
usage
|
||
|
cat <<EOF
|
||
|
|
||
|
For use with KeyTool, copy the *.auth and *.esl files to a FAT USB
|
||
|
flash drive or to your EFI System Partition (ESP).
|
||
|
For use with most UEFIs' built-in key managers, copy the *.cer files.
|
||
|
|
||
|
To add Microsoft's certificates use KeyTool or UEFI to append
|
||
|
add_MS_db.auth to the signature database.
|
||
|
EOF
|
||
|
exit 0
|
||
|
;;
|
||
|
m)
|
||
|
mskeys=1
|
||
|
;;
|
||
|
\?)
|
||
|
echo "Invalid option: -$OPTARG" >&2
|
||
|
usage >&2
|
||
|
exit 1
|
||
|
;;
|
||
|
esac
|
||
|
done
|
||
|
|
||
|
generate_keys
|
||
|
if [ $mskeys -eq 1 ]; then
|
||
|
generate_ms_db
|
||
|
fi
|