summaryrefslogtreecommitdiff
path: root/docs/kbase
diff options
context:
space:
mode:
authorAndrea Bolognani <abologna@redhat.com>2022-08-04 10:43:09 +0200
committerAndrea Bolognani <abologna@redhat.com>2022-08-04 14:39:18 +0200
commit550bf7682d9d9e43d747d49a73236e6829ce6d78 (patch)
tree52f6325f2c726384ae4acc8f3cc843b5bca1489a /docs/kbase
parent18249f278a1f08c42fcbf6f9ab6a2af397fe15c1 (diff)
downloadlibvirt-550bf7682d9d9e43d747d49a73236e6829ce6d78.tar.gz
kbase: Document how to disable Secure Boot entirely
In most cases, disabling the secure-boot or the enrolled-keys firmware feature will achieve the same result: allowing an unsigned operating system to run. Right now we're only documenting the latter configuration. Add the former as well, and explain the difference between the two. Signed-off-by: Andrea Bolognani <abologna@redhat.com> Reviewed-by: Daniel P. Berrangé <berrange@redhat.com>
Diffstat (limited to 'docs/kbase')
-rw-r--r--docs/kbase/secureboot.rst31
1 files changed, 28 insertions, 3 deletions
diff --git a/docs/kbase/secureboot.rst b/docs/kbase/secureboot.rst
index 5fa59ad5e2..4340454a7b 100644
--- a/docs/kbase/secureboot.rst
+++ b/docs/kbase/secureboot.rst
@@ -19,7 +19,17 @@ ask for Secure Boot to be enabled with
</firmware>
</os>
-and for it to be disabled with
+and for it to be disabled with either
+
+::
+
+ <os firmware='efi'>
+ <firmware>
+ <feature enabled='no' name='secure-boot'/>
+ </firmware>
+ </os>
+
+or
::
@@ -30,8 +40,10 @@ and for it to be disabled with
</firmware>
</os>
-These configuration will cause unsigned guest operating systems to
-be rejected and allowed respectively.
+The first configuration will cause unsigned guest operating systems
+to be rejected, while the remaining two will allow running them. See
+below for a more detailed explanation of how each knob affects the
+firmware selection process.
Older libvirt versions
@@ -103,3 +115,16 @@ The opposite configuration, where the feature is explicitly disabled,
will result in no keys being present in the NVRAM file. Unable to
verify signatures, the firmware will allow even unsigned operating
systems to run.
+
+If running unsigned code is desired, it's also possible to ask for
+the ``secure-boot`` feature to be disabled, which will cause libvirt
+to pick a build of EDKII that doesn't have Secure Boot support at
+all.
+
+The main difference between using a build of EDKII that has Secure
+Boot support but without keys enrolled and one that doesn't have
+Secure Boot support at all is that, with the former, you could enroll
+your own keys and securely run an operating system that you've built
+and signed yourself. If you are only planning to run existing,
+off-the-shelf operating system images, then the two configurations
+are functionally equivalent.