patos/scripts/sbkeys

155 lines
4.3 KiB
Text
Raw Normal View History

2025-01-22 09:15:54 +01:00
#!/usr/bin/env bash
# Copyright (c) 2015 by Roderick W. Smith
# Copyright (c) 2020 Corey Hinshaw
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
[ -n "${DEBUG}" ] && set -x
set -e
usage() {
cat <<EOF
Usage: sbkeys [OPTION]...
Generate secure boot keys
Options:
-h Print this help text
-m Generate signature database entries for Microsoft certificates
EOF
}
generate_keys() {
# Do not create new keys if key files already exist
KEYS=(
PK.key PK.crt PK.cer PK.esl PK.auth
KEK.key KEK.crt KEK.cer KEK.esl KEK.auth
DB.key DB.crt DB.cer DB.esl DB.auth
noPK.esl noPK.auth
myGUID.txt
)
for file in ${KEYS[@]}; do
if [ -f ${file} ]; then
echo "Skipping key generation: keys already exist in $(pwd)"
return
fi
done
echo -n "Enter a Common Name to embed in the keys: "
read NAME
# Platform key
openssl req -new -x509 \
-subj "/CN=${NAME} PK/" -days 3650 -nodes \
-newkey rsa:2048 -sha256 \
-keyout PK.key -out PK.crt
openssl x509 -in PK.crt -out PK.cer -outform DER
# Key exchange key
openssl req -new -x509 \
-subj "/CN=${NAME} KEK/" -days 3650 -nodes \
-newkey rsa:2048 -sha256 \
-keyout KEK.key -out KEK.crt
openssl x509 -in KEK.crt -out KEK.cer -outform DER
# Signature database
openssl req -new -x509 \
-subj "/CN=${NAME} DB/" -days 3650 -nodes \
-newkey rsa:2048 -sha256 \
-keyout DB.key -out DB.crt
openssl x509 -in DB.crt -out DB.cer -outform DER
GUID="$(uuidgen -r)"
echo ${GUID} > myGUID.txt
cert-to-efi-sig-list -g ${GUID} PK.crt PK.esl
cert-to-efi-sig-list -g ${GUID} KEK.crt KEK.esl
cert-to-efi-sig-list -g ${GUID} DB.crt DB.esl
rm -f noPK.esl
touch noPK.esl
sign-efi-sig-list \
-t "$(date --date='1 second' +'%Y-%m-%d %H:%M:%S')" \
-k PK.key -c PK.crt \
PK PK.esl PK.auth
sign-efi-sig-list \
-t "$(date --date='1 second' +'%Y-%m-%d %H:%M:%S')" \
-k PK.key -c PK.crt \
PK noPK.esl noPK.auth
sign-efi-sig-list \
-t "$(date --date='1 second' +'%Y-%m-%d %H:%M:%S')" \
-k PK.key -c PK.crt \
KEK KEK.esl KEK.auth
sign-efi-sig-list \
-t "$(date --date='1 second' +'%Y-%m-%d %H:%M:%S')" \
-k KEK.key -c KEK.crt \
DB DB.esl DB.auth
chmod 0600 *.key
}
generate_ms_db() {
msguid=77fa9abd-0359-4d32-bd60-28f4e78f784b
msdb="MS_db.esl add_MS_db.auth"
for file in $msdb; do
if [ -f $file ]; then
echo "Microsoft signature lists already exist in $(pwd)"
return
fi
done
wget --user-agent="Mozilla" https://www.microsoft.com/pkiops/certs/MicWinProPCA2011_2011-10-19.crt
wget --user-agent="Mozilla" https://www.microsoft.com/pkiops/certs/MicCorUEFCA2011_2011-06-27.crt
sbsiglist --owner "$msguid" --type x509 --output MS_Win_db.esl MicWinProPCA2011_2011-10-19.crt
sbsiglist --owner "$msguid" --type x509 --output MS_UEFI_db.esl MicCorUEFCA2011_2011-06-27.crt
cat MS_Win_db.esl MS_UEFI_db.esl > MS_db.esl
sign-efi-sig-list -a -g "$msguid" -k KEK.key -c KEK.crt DB MS_db.esl add_MS_db.auth
rm MS_Win_db.esl MS_UEFI_db.esl MicWinProPCA2011_2011-10-19.crt MicCorUEFCA2011_2011-06-27.crt
}
mskeys=0
while getopts ":hm" opt; do
case $opt in
h)
usage
cat <<EOF
For use with KeyTool, copy the *.auth and *.esl files to a FAT USB
flash drive or to your EFI System Partition (ESP).
For use with most UEFIs' built-in key managers, copy the *.cer files.
To add Microsoft's certificates use KeyTool or UEFI to append
add_MS_db.auth to the signature database.
EOF
exit 0
;;
m)
mskeys=1
;;
\?)
echo "Invalid option: -$OPTARG" >&2
usage >&2
exit 1
;;
esac
done
generate_keys
if [ $mskeys -eq 1 ]; then
generate_ms_db
fi