On 03/22/18 03:02, Wu, Jiaxin wrote:
> On 03/21/18 14:39, Laszlo Ersek wrote:
>> (1) Do you agree EFI_CERT_X509_GUID is the right setting for
>> "EFI_SIGNATURE_LIST.SignatureType" (even though the edk2 code
>> currently ignores it)?
>>
>> This would also imply that we set
>> "EFI_SIGNATURE_LIST.SignatureHeaderSize" to zero, according to the
>> UEFI spec.
>>
> 
> Yes, exactly, EFI_CERT_X509_GUID is the correct SignatureType for the
> CACertificate. SignatureHeaderSize should be set to zero. We do miss
> the check in HttpDxe driver, I'm fine to add back the  SignatureType
> check in TlsConfigCertificate(). So, can you report the Bugzilla for
> this fixing? Thanks.

I've filed <https://bugzilla.tianocore.org/show_bug.cgi?id=909> and
assigned it to myself (for a v1 patch at least).

>> (2) Do you foresee any such restrictions for the
>> "EFI_SIGNATURE_DATA.SignatureOwner" field in
>> EFI_TLS_CA_CERTIFICATE_VARIABLE? Or is it safe if we generate a GUID
>> for the tool with "uuidgen"?
>>
> 
> I don't think it's necessary to restrict/stand the GUID in the field
> of SignatureOwner for the CA certification (at least for now) since
> it's only used to identify the different venders (i.e, Microsoft) so
> as to avoid the following content check. In the UEFI part, we also
> didn't check the SignatureOwner for the any security consideration.
> So, I think it's safe to generate a GUID using the tool at present.

Sounds great, thanks!

Laszlo
_______________________________________________
edk2-devel mailing list
[email protected]
https://lists.01.org/mailman/listinfo/edk2-devel

Reply via email to