<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="http://blogs.msdn.com/utility/FeedStylesheets/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/"><channel><title>Windows Hardware Certification blog - All Comments</title><link>http://blogs.msdn.com/b/windows_hardware_certification/</link><description>This blog—formerly the Windows Certification Newsletter—provides up-to-date news about the Windows Certification Program.</description><dc:language>en-US</dc:language><generator>Telligent Evolution Platform Developer Build (Build: 5.6.50428.7875)</generator><item><title>re: Windows Hardware Certification requirement changes effective January 1, 2014</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2013/12/13/windows-hardware-certification-requirement-changes-effective-january-1-2014.aspx#10507940</link><pubDate>Fri, 14 Mar 2014 12:18:12 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10507940</guid><dc:creator>Roger Techima</dc:creator><description>&lt;p&gt;Sorry, forget to mention. I updated filters last week, but HCK Studio is not automatically applying 4568 in my Fidelity Test.&lt;/p&gt;
&lt;p&gt;Best regards,&lt;/p&gt;
&lt;p&gt;Roger.&lt;/p&gt;
&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10507940" width="1" height="1"&gt;</description></item><item><title>re: Windows Hardware Certification requirement changes effective January 1, 2014</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2013/12/13/windows-hardware-certification-requirement-changes-effective-january-1-2014.aspx#10507939</link><pubDate>Fri, 14 Mar 2014 12:15:43 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10507939</guid><dc:creator>Roger Techima</dc:creator><description>&lt;p&gt;Dear Andy_Wen, about Errata 4568, I can only apply it in README if I never started the Fildeity Test? Or can I use it after an log importation failure?&lt;/p&gt;
&lt;p&gt;Thanks, Roger.&lt;/p&gt;
&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10507939" width="1" height="1"&gt;</description></item><item><title>re: Fast-track Windows 8.1 certification</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2013/12/05/fast-track-windows-8-1-certification.aspx#10507683</link><pubDate>Thu, 13 Mar 2014 16:51:59 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10507683</guid><dc:creator>Mark Hughes</dc:creator><description>&lt;p&gt;This procedure is still valid. &amp;nbsp; &amp;nbsp;The reason errata ID 2657 is not appearing on the DTM filter list is because its a manual errata. &amp;nbsp;Manual errata that don&amp;#39;t contain an actual filter so they don&amp;#39;t get published on the DTM errata filter list. &amp;nbsp;&lt;/p&gt;
&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10507683" width="1" height="1"&gt;</description></item><item><title>re: Fast-track Windows 8.1 certification</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2013/12/05/fast-track-windows-8-1-certification.aspx#10506659</link><pubDate>Mon, 10 Mar 2014 18:24:22 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10506659</guid><dc:creator>Kumar87</dc:creator><description>&lt;p&gt;Hi,&lt;/p&gt;
&lt;p&gt;I have a driver signed for Windows 8. Is this procedure still valid for getting the driver signed for Windows 8.1? I tried to find Errata 2657 on the DTM Filter page but could not find it. I was hoping this process is valid as of today.&lt;/p&gt;
&lt;p&gt;Thanks!&lt;/p&gt;
&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10506659" width="1" height="1"&gt;</description></item><item><title>re: Self-test submission model for touch device and precision touchpad certification</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2014/01/23/self-test-submission-model-for-touch-device-and-precision-touchpad-certification.aspx#10506463</link><pubDate>Mon, 10 Mar 2014 06:58:32 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10506463</guid><dc:creator>Tina</dc:creator><description>&lt;p&gt;From &lt;a rel="nofollow" target="_new" href="http://msdn.microsoft.com/en-us/library/windows/hardware/dn456917.aspx"&gt;msdn.microsoft.com/.../dn456917.aspx&lt;/a&gt;,&lt;/p&gt;
&lt;p&gt;PT3 need to use 7mm diameter contacts; however, there is no mention of the same required for RA.&lt;/p&gt;
&lt;p&gt;May I know does RA need to use 7mm diameter contacts, too?&lt;/p&gt;
&lt;p&gt;Thanks.&lt;/p&gt;
&lt;p&gt;Tina&lt;/p&gt;
&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10506463" width="1" height="1"&gt;</description></item><item><title>re: Dashboard system submissions process simplified</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2014/02/26/dashboard-system-submissions-process-simplified.aspx#10506146</link><pubDate>Fri, 07 Mar 2014 17:43:16 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10506146</guid><dc:creator>Mark Hughes</dc:creator><description>&lt;p&gt;We are investigating the test reports at this time with the intention to add all previous detail that was present on the previous test reports before this change took place. &amp;nbsp;So the CPU and BIOS information will be incorporated back into the test reports in the near future. &amp;nbsp;&lt;/p&gt;
&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10506146" width="1" height="1"&gt;</description></item><item><title>re: HCK for Windows 8.1 and WLK 1.6 usage scenarios</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2014/02/10/hck-for-windows-8-1-and-wlk-1-6-usage-scenarios.aspx#10505840</link><pubDate>Thu, 06 Mar 2014 18:56:53 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10505840</guid><dc:creator>Mark Hughes</dc:creator><description>&lt;p&gt;If the driver was previously tested for 2003 and 2008 reference that submission ID in the README and check the 2003 and 2008 signature boxes. &amp;nbsp;Its acceptable to update or change the driver that was previously tested and choose the free signature boxes for 2003 and 2008 as long as it was previously tested one time. &amp;nbsp; &amp;nbsp;&lt;/p&gt;
&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10505840" width="1" height="1"&gt;</description></item><item><title>re: MUTT software package update available</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2014/02/19/mutt-software-package-update-available.aspx#10505720</link><pubDate>Thu, 06 Mar 2014 14:10:50 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10505720</guid><dc:creator>GongXing Town</dc:creator><description>&lt;p&gt;@Raven Mill &amp;nbsp; It&amp;#39;s OK, It says released &amp;quot;late last year&amp;quot;.&lt;/p&gt;
&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10505720" width="1" height="1"&gt;</description></item><item><title>re: HCK for Windows 8.1 and WLK 1.6 usage scenarios</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2014/02/10/hck-for-windows-8-1-and-wlk-1-6-usage-scenarios.aspx#10505459</link><pubDate>Wed, 05 Mar 2014 20:56:25 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10505459</guid><dc:creator>Andrew Fox at RIM</dc:creator><description>&lt;p&gt;I had WHQL&amp;#39;d v1.0 of a driver on all Windows OS&amp;#39;s using the HCK 2.0 last year. This year I have v2.0 of the same driver and I&amp;#39;m running it again using HCK 2.1. Now I don&amp;#39;t get 2K3 or 2K8 because of the policy change. Can I reference the submissions from last year for a previous version of the driver to get it passed on 2K3 and 2K8 OR do I have to run my driver v2.0 through HCK 2.0 for just 2K3 and 2K8? It&amp;#39;s not clear to me how to handle multiple versions of the same driver. Thanks in advance for your response.&lt;/p&gt;
&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10505459" width="1" height="1"&gt;</description></item><item><title>re: Dashboard system submissions process simplified</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2014/02/26/dashboard-system-submissions-process-simplified.aspx#10505078</link><pubDate>Tue, 04 Mar 2014 18:02:38 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10505078</guid><dc:creator>Mark Hughes</dc:creator><description>&lt;p&gt;By design the BIOS version and &amp;nbsp;processor detail are not being listed on the test reports. &amp;nbsp; &amp;nbsp;The information is present in full detail on the server catalog at this time for server related systems. &amp;nbsp;The full detail may be added to test reports and the client catalogs in the future. &amp;nbsp; &amp;nbsp; The server catalog is presenting more rich information on the actual product detail at this time. &amp;nbsp; &lt;/p&gt;
&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10505078" width="1" height="1"&gt;</description></item><item><title>re: Self-test submission model for touch device and precision touchpad certification</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2014/01/23/self-test-submission-model-for-touch-device-and-precision-touchpad-certification.aspx#10504806</link><pubDate>Mon, 03 Mar 2014 23:40:34 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10504806</guid><dc:creator>Andy_Wen</dc:creator><description>&lt;p&gt;Hello,&lt;/p&gt;
&lt;p&gt;As long as the device can pass requirements, it&amp;#39;d be eligible for self-test submission.&lt;/p&gt;
&lt;p&gt;Thanks,&lt;/p&gt;
&lt;p&gt;Andy&lt;/p&gt;
&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10504806" width="1" height="1"&gt;</description></item><item><title>re: Errata expiration guidelines</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2013/12/10/errata-expiration-guidelines.aspx#10504166</link><pubDate>Fri, 28 Feb 2014 22:34:00 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10504166</guid><dc:creator>Ludi</dc:creator><description>&lt;p&gt;For how long are Windows Hardware Certifications good for? And where can I find that info?&lt;/p&gt;
&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10504166" width="1" height="1"&gt;</description></item><item><title>re: Dashboard system submissions process simplified</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2014/02/26/dashboard-system-submissions-process-simplified.aspx#10503883</link><pubDate>Fri, 28 Feb 2014 00:57:36 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10503883</guid><dc:creator>kukucz</dc:creator><description>&lt;p&gt;I did submission 20 February 2014 and it was accepted 21 February 2014.&lt;/p&gt;
&lt;p&gt;But in my logo verification report is only BIOS URL which was required to type manually.&lt;/p&gt;
&lt;p&gt;I don&amp;#39;t see any data about bios and processor information which should be downloaded from hckx file.&lt;/p&gt;
&lt;p&gt;It seems that it is not working as it should.&lt;/p&gt;
&lt;p&gt;&lt;a rel="nofollow" target="_new" href="https://sysdev.microsoft.com/en-us/hardware/LogoVerificationReport.aspx?sid=1637036"&gt;sysdev.microsoft.com/.../LogoVerificationReport.aspx&lt;/a&gt;&lt;/p&gt;
&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10503883" width="1" height="1"&gt;</description></item><item><title>re: Self-test submission model for touch device and precision touchpad certification</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2014/01/23/self-test-submission-model-for-touch-device-and-precision-touchpad-certification.aspx#10502866</link><pubDate>Tue, 25 Feb 2014 07:37:00 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10502866</guid><dc:creator>TY</dc:creator><description>&lt;p&gt;Hi, &lt;/p&gt;
&lt;p&gt;I wonder if there is any criteria for proceeding self-test submission or full-test submission? &lt;/p&gt;
&lt;p&gt;Thanks.&lt;/p&gt;
&lt;p&gt;TY.&lt;/p&gt;
&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10502866" width="1" height="1"&gt;</description></item><item><title>re: MUTT software package update available</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2014/02/19/mutt-software-package-update-available.aspx#10502501</link><pubDate>Mon, 24 Feb 2014 03:42:25 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10502501</guid><dc:creator>Raven Mill</dc:creator><description>&lt;p&gt;I use it update a super mutt, the display of hardwareID is &amp;quot;REV_0040&amp;quot;, but we already use FW0040 for some time.please share more detail about this version, thanks! &lt;/p&gt;
&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10502501" width="1" height="1"&gt;</description></item><item><title>re: Changes to “System - Sleep and PNP (disable and enable) with IO Before and After (Certification)” test in February HCK QFE</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2014/02/11/changes-to-system-sleep-and-pnp-disable-and-enable-with-io-before-and-after-certification-test-in-february-hck-qfe.aspx#10502018</link><pubDate>Fri, 21 Feb 2014 06:19:59 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10502018</guid><dc:creator>HC Huang</dc:creator><description>&lt;p&gt;Hi Sir,&lt;/p&gt;
&lt;p&gt;I filed a bug on dashboard about this test.&lt;/p&gt;
&lt;p&gt;Could you help to take a look at the failure&amp;#39;s hckx file?&lt;/p&gt;
&lt;p&gt;Bug ID is 605896.&lt;/p&gt;
&lt;p&gt;Thank you in advance.&lt;/p&gt;
&lt;p&gt;HC&lt;/p&gt;
&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10502018" width="1" height="1"&gt;</description></item><item><title>re: Changes to “System - Sleep and PNP (disable and enable) with IO Before and After (Certification)” test in February HCK QFE</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2014/02/11/changes-to-system-sleep-and-pnp-disable-and-enable-with-io-before-and-after-certification-test-in-february-hck-qfe.aspx#10501217</link><pubDate>Tue, 18 Feb 2014 19:59:15 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10501217</guid><dc:creator>KAENNGAI CHAN</dc:creator><description>&lt;p&gt;with IO Before and After test: You no longer need to configure all devices on the system before the test can run. - We also released...&lt;/p&gt;
&lt;p&gt;i like how Microsoft use the words and i know i will fail on test without test, let people have more talents have more chance for test&lt;/p&gt;
&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10501217" width="1" height="1"&gt;</description></item><item><title>re: Hardware certification submission fees update</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2013/12/13/hardware-certification-submission-fees-update.aspx#10501201</link><pubDate>Tue, 18 Feb 2014 19:14:49 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10501201</guid><dc:creator>Lyndon Bethel - MSFT HCK Support</dc:creator><description>&lt;p&gt;I don&amp;#39;t understand something related to your comments Don. I have always been able to access the certification filters without a Sysdev account for a short time these were on connect which required a connect loigin that was available to anyone but now they appear freely available: &lt;a rel="nofollow" target="_new" href="http://msdn.microsoft.com/en-us/library/windows/hardware/hh998024.aspx"&gt;msdn.microsoft.com/.../hh998024.aspx&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;-Lyndon&lt;/p&gt;
&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10501201" width="1" height="1"&gt;</description></item><item><title>re: Changes to “System - Sleep and PNP (disable and enable) with IO Before and After (Certification)” test in February HCK QFE</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2014/02/11/changes-to-system-sleep-and-pnp-disable-and-enable-with-io-before-and-after-certification-test-in-february-hck-qfe.aspx#10501160</link><pubDate>Tue, 18 Feb 2014 16:50:54 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10501160</guid><dc:creator>paul_Reed55</dc:creator><description>&lt;p&gt;Hi Mike Lu,&lt;/p&gt;
&lt;p&gt;When the requirement relaxations were finalized, we were approaching the holiday season in December and many teams were leaving for extended holiday. &amp;nbsp;Then when they returned there was a really tight deadline to make the February HCK QFE release. &amp;nbsp;Not all teams were able to do so. &amp;nbsp;However, we have published errata filters that will turn all failures into pass. &amp;nbsp;So if you do not wish to test for the quality bar, you can run the test and it will fail. &amp;nbsp;The errata will convert it to a pass. &amp;nbsp;&lt;/p&gt;
&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10501160" width="1" height="1"&gt;</description></item><item><title>re: Changes to “System - Sleep and PNP (disable and enable) with IO Before and After (Certification)” test in February HCK QFE</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2014/02/11/changes-to-system-sleep-and-pnp-disable-and-enable-with-io-before-and-after-certification-test-in-february-hck-qfe.aspx#10500690</link><pubDate>Mon, 17 Feb 2014 07:11:26 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10500690</guid><dc:creator>Summer Nie</dc:creator><description>&lt;p&gt;Hi, Mark:&lt;/p&gt;
&lt;p&gt;Is Mutt device supposed to be plugged in during &amp;quot;device status check&amp;quot;? &lt;/p&gt;
&lt;p&gt;As we are running QFE006, and it still failed on Super MUTT during device status check phase, so the main test will not process at all. &lt;/p&gt;
&lt;p&gt;Per the description, does it mean we could unplug the Super Mutt device from system once device status check was passing? &amp;nbsp; &lt;/p&gt;
&lt;p&gt;Thank you!&lt;/p&gt;
&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10500690" width="1" height="1"&gt;</description></item><item><title>re: HCK for Windows 8.1 and WLK 1.6 usage scenarios</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2014/02/10/hck-for-windows-8-1-and-wlk-1-6-usage-scenarios.aspx#10500342</link><pubDate>Fri, 14 Feb 2014 19:08:21 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10500342</guid><dc:creator>Mark Hughes</dc:creator><description>&lt;p&gt;Run testing on HCK 2.1 on the following OS&amp;#39;s Server 2008 R2, Server 2012, Server 2012 R2, Win 7, Win 8, and Win 8.1. &amp;nbsp;If you’re using a uniform driver that supports the lower level OS’s check boxes will appear to add digital signatures for the following OS’s if using a unified driver XP, Vista, Server 2003 and Server 2008.&lt;/p&gt;
&lt;p&gt;Per policy if you select the Server 2003 and Server 2008 digital signatures you need to provide a README file &amp;nbsp;that references where Server 2003 and Server 2008 were previously tested using either WLK 1.6 or HCK 2.0. &amp;nbsp;If not previously tested you need to use WLK 1.6 and run testing on Server 2003 and Server 2008 so you can provide submissions ID’s for those OS’s in the README file.&lt;/p&gt;
&lt;p&gt;For XP and Vista it’s not required to provide a README that verifies the product was previously tested for those OS. &amp;nbsp;You can select the XP and Vista digital signatures without further testing. &amp;nbsp;&lt;/p&gt;
&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10500342" width="1" height="1"&gt;</description></item><item><title>re: Microsoft UEFI CA Signing policy updates</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2013/12/03/microsoft-uefi-ca-signing-policy-updates.aspx#10500135</link><pubDate>Fri, 14 Feb 2014 03:43:22 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10500135</guid><dc:creator>Dee</dc:creator><description>&lt;p&gt;Thanks CT - on the EV in SHIM; We currently provide our own (public) certificate inside shim which was generated via openssl (along of course with the private key). &amp;nbsp;We sign our binaries (from what shim loads all the way to the kernel/main binary) with the private key (which we keep protected). &amp;nbsp; In that case EV certificates don&amp;#39;t mean anything, we are 100% sure of who we are and since we will be signing shim (which has our private embedded certificate) with our verisign EV certificate matching the one in sysdev, you&amp;#39;re sure that the signed shim we provide is from us and the certificate within it is also under our trust. &amp;nbsp;If someone modified our shim, secure boot wouldn&amp;#39;t load it. &amp;nbsp;or am I missing something?&lt;/p&gt;
&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10500135" width="1" height="1"&gt;</description></item><item><title>re: Microsoft UEFI CA Signing policy updates</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2013/12/03/microsoft-uefi-ca-signing-policy-updates.aspx#10500101</link><pubDate>Fri, 14 Feb 2014 01:14:47 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10500101</guid><dc:creator>Certification team</dc:creator><description>&lt;p&gt;Hi Ed,&lt;/p&gt;
&lt;p&gt;The Developer Portal is working towards supporting EV certificates from both DigiCert and VeriSign, and we will bring this capability online soon. In the interim, if you are planning to sign up and submit, you can continue to use VeriSign’s Non-EV Code Signing certificate as stated in the sign up workflow, though we would recommend you use VeriSign’s EV certificate to be forward compatible with future requirements (See answer to Dee’s question on EV certificates). If you use a VeriSign’s EV certificate then you don’t need VeriSign’s $99 certificate for sign up. &amp;nbsp;&lt;/p&gt;
&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10500101" width="1" height="1"&gt;</description></item><item><title>re: Microsoft UEFI CA Signing policy updates</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2013/12/03/microsoft-uefi-ca-signing-policy-updates.aspx#10500100</link><pubDate>Fri, 14 Feb 2014 01:13:36 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10500100</guid><dc:creator>Certification team</dc:creator><description>&lt;p&gt;Hi Dee,&lt;/p&gt;
&lt;p&gt;(about loading unsigned kernel)&lt;/p&gt;
&lt;p&gt;As mentioned in 5.b above, it is strongly recommended to load only signed kernel modules to avoid security vulnerabilities which may result in possible future revocation (if and when exploits are found compromising SecureBoot). This latest article in ITWire(&lt;a rel="nofollow" target="_new" href="http://www.itwire.com/business-it-news/security/63120-microsoft-changes-policy-on-third-party-signing-of-efi-code"&gt;www.itwire.com/.../63120-microsoft-changes-policy-on-third-party-signing-of-efi-code&lt;/a&gt;) might help with deeper understanding of the security need of this, and the adoption of these practices by other operating system vendors, such as Fedora. &lt;/p&gt;
&lt;p&gt;(about EV in SHIMs)&lt;/p&gt;
&lt;p&gt;The rationale for requiring EV inside SHIM is to get a better guarantee of key management and trustworthiness. Signing SHIM is equivalent to cross signing a CA to trust other non-UEFI CA signed modules. &amp;nbsp;Hence the higher security bar for SHIM. We, of course, appreciate this feedback and we will continue discussing with various partners on the impact this change may have on their build infrastructure. &lt;/p&gt;
&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10500100" width="1" height="1"&gt;</description></item><item><title>re: Microsoft UEFI CA Signing policy updates</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2013/12/03/microsoft-uefi-ca-signing-policy-updates.aspx#10499311</link><pubDate>Thu, 13 Feb 2014 18:32:52 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10499311</guid><dc:creator>Dee</dc:creator><description>&lt;p&gt;Still questioning the EV requirement within the shim (6a) - the more I think about, the less sense it makes. &amp;nbsp;If we put our own private strong certificate built using openssl (we know who we are) within the SHIM to verify all our loading of binaries, that is just as strong as using an EV certificate. &amp;nbsp;There is no advantage to having to use an EV certificate within the shim to verify our binaries. &amp;nbsp;Now for submitting to MS, an EV certificate is fine. &amp;nbsp;Once signed, that shim can&amp;#39;t be altered with another certificate (only our private certificate can be in there or it would have never been loaded by the UEFI secure boot code).&lt;/p&gt;
&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10499311" width="1" height="1"&gt;</description></item></channel></rss>