Add Secure Boot report

Approved by:	hrs (mentor, implicit)
This commit is contained in:
Benjamin Kaduk 2015-04-15 04:22:53 +00:00
parent f27f5b0759
commit 2fa66bd5ca
Notes: svn2git 2020-12-08 03:00:23 +00:00
svn path=/head/; revision=46557

View file

@ -2126,4 +2126,53 @@ WITHOUT_FORTH=y</pre>
two were taken in for safe-keeping.</p>
</body>
</project>
<project cat='proj'>
<title>Secure Boot</title>
<contact>
<person>
<name>
<given>Edward Tomasz</given>
<common>Napiera&#322;a</common>
</name>
<email>trasz@FreeBSD.org</email>
</person>
</contact>
<links>
<url href="https://wiki.freebsd.org/SecureBoot" />
</links>
<body>
<p>UEFI Secure Boot is a mechanism that requires boot
drivers and operating system loaders to be cryptographically
signed by an authorized key. It will refuse to execute any
software that is not correctly signed, and is intended to secure
boot drivers and operating system loaders from malicious
tampering or replacement.</p>
<p>The utility to add Authenticode signatures to EFI files,
uefisign(8), was committed to 11-CURRENT and will ship in
10.2-RELEASE. Ports for other open source utilities were added
to the Ports Collection, as <tt>sysutils/pesign</tt>,
<tt>sysutils/sbsigntool</tt>, and <tt>sysutils/shim</tt>. There
is a prototype patch that makes boot1 use the Secure Boot shim, and
modifies the shim to provide the functionality necessary
for a successful bootstrap.</p>
</body>
<sponsor>The &os; Foundation</sponsor>
<help>
<task>
<p>Finalize the shim API extension and get it accepted
upstream.</p>
</task>
<task>
<p>Commit boot1 changes.</p>
</task>
</help>
</project>
</report>