Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Rotating specific key(s) #249

Open
Quant-ux opened this issue Oct 20, 2023 · 2 comments
Open

Rotating specific key(s) #249

Quant-ux opened this issue Oct 20, 2023 · 2 comments
Labels
enhancement New feature or request

Comments

@Quant-ux
Copy link

One of downsides of storing keys locally is the fact an adversary with root privileges can sign and install bootkits. My solution is to this is to store PK and KEK offline, and db on the host's drive. Obviously,db remains unprotected here but if the system gets compromised, only db is affected.

If I'm correct, the EFI signing command rotate-keys is used to rotate all keys so it can't be used to replace a single key. With this in mind, considering my use case, I think the ability to selectively rotate keys would be beneficial.

@Foxboron Foxboron added the enhancement New feature or request label Oct 20, 2023
@Foxboron
Copy link
Owner

This is implemented in master but hasn't been part of a release yet.

889325e

I can do a release this weekend probably.

@Foxboron
Copy link
Owner

I still plan to rework the key storage code so in the future keys can be stored on yubikeys, TPMS or PKCS11 devices. That should remove a lot of the issue with having keys available on the system.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

2 participants