<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="http://blogs.msdn.com/utility/FeedStylesheets/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/"><channel><title>Microsoft UEFI CA Signing policy updates</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2013/12/03/microsoft-uefi-ca-signing-policy-updates.aspx</link><description>This post describes UEFI Signing policy changes. These changes are important to help secure boot meet its security goals and also to maintain a reasonable turnaround time for signing UEFI submissions. This post also reiterates a few important parts of</description><dc:language>en-US</dc:language><generator>Telligent Evolution Platform Developer Build (Build: 5.6.50428.7875)</generator><item><title>re: Microsoft UEFI CA Signing policy updates</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2013/12/03/microsoft-uefi-ca-signing-policy-updates.aspx#10500135</link><pubDate>Fri, 14 Feb 2014 03:43:22 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10500135</guid><dc:creator>Dee</dc:creator><description>&lt;p&gt;Thanks CT - on the EV in SHIM; We currently provide our own (public) certificate inside shim which was generated via openssl (along of course with the private key). &amp;nbsp;We sign our binaries (from what shim loads all the way to the kernel/main binary) with the private key (which we keep protected). &amp;nbsp; In that case EV certificates don&amp;#39;t mean anything, we are 100% sure of who we are and since we will be signing shim (which has our private embedded certificate) with our verisign EV certificate matching the one in sysdev, you&amp;#39;re sure that the signed shim we provide is from us and the certificate within it is also under our trust. &amp;nbsp;If someone modified our shim, secure boot wouldn&amp;#39;t load it. &amp;nbsp;or am I missing something?&lt;/p&gt;
&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10500135" width="1" height="1"&gt;</description></item><item><title>re: Microsoft UEFI CA Signing policy updates</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2013/12/03/microsoft-uefi-ca-signing-policy-updates.aspx#10500101</link><pubDate>Fri, 14 Feb 2014 01:14:47 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10500101</guid><dc:creator>Certification team</dc:creator><description>&lt;p&gt;Hi Ed,&lt;/p&gt;
&lt;p&gt;The Developer Portal is working towards supporting EV certificates from both DigiCert and VeriSign, and we will bring this capability online soon. In the interim, if you are planning to sign up and submit, you can continue to use VeriSign’s Non-EV Code Signing certificate as stated in the sign up workflow, though we would recommend you use VeriSign’s EV certificate to be forward compatible with future requirements (See answer to Dee’s question on EV certificates). If you use a VeriSign’s EV certificate then you don’t need VeriSign’s $99 certificate for sign up. &amp;nbsp;&lt;/p&gt;
&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10500101" width="1" height="1"&gt;</description></item><item><title>re: Microsoft UEFI CA Signing policy updates</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2013/12/03/microsoft-uefi-ca-signing-policy-updates.aspx#10500100</link><pubDate>Fri, 14 Feb 2014 01:13:36 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10500100</guid><dc:creator>Certification team</dc:creator><description>&lt;p&gt;Hi Dee,&lt;/p&gt;
&lt;p&gt;(about loading unsigned kernel)&lt;/p&gt;
&lt;p&gt;As mentioned in 5.b above, it is strongly recommended to load only signed kernel modules to avoid security vulnerabilities which may result in possible future revocation (if and when exploits are found compromising SecureBoot). This latest article in ITWire(&lt;a rel="nofollow" target="_new" href="http://www.itwire.com/business-it-news/security/63120-microsoft-changes-policy-on-third-party-signing-of-efi-code"&gt;www.itwire.com/.../63120-microsoft-changes-policy-on-third-party-signing-of-efi-code&lt;/a&gt;) might help with deeper understanding of the security need of this, and the adoption of these practices by other operating system vendors, such as Fedora. &lt;/p&gt;
&lt;p&gt;(about EV in SHIMs)&lt;/p&gt;
&lt;p&gt;The rationale for requiring EV inside SHIM is to get a better guarantee of key management and trustworthiness. Signing SHIM is equivalent to cross signing a CA to trust other non-UEFI CA signed modules. &amp;nbsp;Hence the higher security bar for SHIM. We, of course, appreciate this feedback and we will continue discussing with various partners on the impact this change may have on their build infrastructure. &lt;/p&gt;
&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10500100" width="1" height="1"&gt;</description></item><item><title>re: Microsoft UEFI CA Signing policy updates</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2013/12/03/microsoft-uefi-ca-signing-policy-updates.aspx#10499311</link><pubDate>Thu, 13 Feb 2014 18:32:52 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10499311</guid><dc:creator>Dee</dc:creator><description>&lt;p&gt;Still questioning the EV requirement within the shim (6a) - the more I think about, the less sense it makes. &amp;nbsp;If we put our own private strong certificate built using openssl (we know who we are) within the SHIM to verify all our loading of binaries, that is just as strong as using an EV certificate. &amp;nbsp;There is no advantage to having to use an EV certificate within the shim to verify our binaries. &amp;nbsp;Now for submitting to MS, an EV certificate is fine. &amp;nbsp;Once signed, that shim can&amp;#39;t be altered with another certificate (only our private certificate can be in there or it would have never been loaded by the UEFI secure boot code).&lt;/p&gt;
&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10499311" width="1" height="1"&gt;</description></item><item><title>re: Microsoft UEFI CA Signing policy updates</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2013/12/03/microsoft-uefi-ca-signing-policy-updates.aspx#10498802</link><pubDate>Wed, 12 Feb 2014 11:11:57 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10498802</guid><dc:creator>Plaque</dc:creator><description>&lt;p&gt;Still no answer to Myria 10 Dec 2013 2:16 PM &lt;a rel="nofollow" target="_new" href="http://blogs.msdn.com/b/windows_hardware_certification/archive/2013/12/03/microsoft-uefi-ca-signing-policy-updates.aspx#10481013"&gt;blogs.msdn.com/.../microsoft-uefi-ca-signing-policy-updates.aspx&lt;/a&gt;&lt;/p&gt;
&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10498802" width="1" height="1"&gt;</description></item><item><title>re: Microsoft UEFI CA Signing policy updates</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2013/12/03/microsoft-uefi-ca-signing-policy-updates.aspx#10498597</link><pubDate>Tue, 11 Feb 2014 20:44:11 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10498597</guid><dc:creator>Ed</dc:creator><description>&lt;p&gt;The UEFI sign-up process points new registrants at&lt;/p&gt;
&lt;p&gt;&amp;gt; VeriSign Code-Signing Certificates for Microsoft Authenticode &amp;nbsp;($99 USD)&lt;/p&gt;
&lt;p&gt;&amp;gt; &lt;a rel="nofollow" target="_new" href="https://products.verisign.com/orders/enrollment/winqualOrder.do"&gt;products.verisign.com/.../winqualOrder.do&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Is there a new process to obtain an EV certificate to sign up, or does one need both the certificate mentioned above and an EV certificate?&lt;/p&gt;
&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10498597" width="1" height="1"&gt;</description></item><item><title>re: Microsoft UEFI CA Signing policy updates</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2013/12/03/microsoft-uefi-ca-signing-policy-updates.aspx#10497487</link><pubDate>Fri, 07 Feb 2014 01:28:10 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10497487</guid><dc:creator>Dee</dc:creator><description>&lt;p&gt;What exactly is the point of requiring an EV certificate in the SHIM? &amp;nbsp;As long as shim is checking the code to be executed by checking it (using a certificate), that&amp;#39;s all that is needed to ensure it&amp;#39;s okay. &amp;nbsp; What additional would be needed if it was an EV type? &amp;nbsp;Because you can&amp;#39;t provide the CA itself.&lt;/p&gt;
&lt;p&gt;6. If your submission is a shim (handing off execution to another bootloader):&lt;/p&gt;
&lt;p&gt; &amp;nbsp; &amp;nbsp;a. Certificates embedded in the shim must all be EV Certificates, and the Organization attribute in all these embedded certificates must be same as the Organization attribute in the EV Certificate on file for the SysDev account.&lt;/p&gt;
&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10497487" width="1" height="1"&gt;</description></item><item><title>re: Microsoft UEFI CA Signing policy updates</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2013/12/03/microsoft-uefi-ca-signing-policy-updates.aspx#10497141</link><pubDate>Thu, 06 Feb 2014 03:55:44 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10497141</guid><dc:creator>John Doe</dc:creator><description>&lt;p&gt;I wonder where to anti-monopoly regulators are looking. MS has gone as far as to policing what licenses we should use. What a blatant monopoly abuse.&lt;/p&gt;
&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10497141" width="1" height="1"&gt;</description></item><item><title>re: Microsoft UEFI CA Signing policy updates</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2013/12/03/microsoft-uefi-ca-signing-policy-updates.aspx#10495753</link><pubDate>Fri, 31 Jan 2014 01:20:42 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10495753</guid><dc:creator>Dee</dc:creator><description>&lt;p&gt;So is it still okay to boot unsigned linux kernel if the ExitBootServices is called or is the requirement that it *has* to be signed to boot if secureboot is enabled. &amp;nbsp; &lt;/p&gt;
&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10495753" width="1" height="1"&gt;</description></item><item><title>re: Microsoft UEFI CA Signing policy updates</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2013/12/03/microsoft-uefi-ca-signing-policy-updates.aspx#10487803</link><pubDate>Tue, 07 Jan 2014 17:54:44 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10487803</guid><dc:creator>JJ Cox</dc:creator><description>&lt;p&gt;Hi geofft, &lt;/p&gt;
&lt;p&gt;Yes, we are working on an alternative distribution channel for the revocation lists that is directly consumable by 3rd-parties without requiring a functioning Windows 8.x installation. &amp;nbsp;We&amp;#39;ll post here when we have more information.&lt;/p&gt;
&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10487803" width="1" height="1"&gt;</description></item><item><title>re: Microsoft UEFI CA Signing policy updates</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2013/12/03/microsoft-uefi-ca-signing-policy-updates.aspx#10481596</link><pubDate>Thu, 12 Dec 2013 17:25:23 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10481596</guid><dc:creator>Michael Alberts - MSFT</dc:creator><description>&lt;p&gt;Hi Anthony. Because your question isn’t directly about certification, we aren’t the best resource for you. I recommend that you contact your motherboard vendor. Hope this helps.&lt;/p&gt;
&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10481596" width="1" height="1"&gt;</description></item><item><title>re: Microsoft UEFI CA Signing policy updates</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2013/12/03/microsoft-uefi-ca-signing-policy-updates.aspx#10481495</link><pubDate>Thu, 12 Dec 2013 11:54:47 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10481495</guid><dc:creator>ANTHONY M</dc:creator><description>&lt;p&gt;Gigabyte is changing my mobo BIOS OVER TO UEFI BIOS. I&amp;#39;ll be honest here. &amp;nbsp;I have NOT a clue on how to do the change over yet. Is there anything that I need to do before I try this conversion? &amp;nbsp;If so, then please advise. Even better are there any areas in M Soft that can help me with this??&lt;/p&gt;
&lt;p&gt;Sincerely, &lt;/p&gt;
&lt;p&gt;ANTHONY M &lt;/p&gt;
&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10481495" width="1" height="1"&gt;</description></item><item><title>re: Microsoft UEFI CA Signing policy updates</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2013/12/03/microsoft-uefi-ca-signing-policy-updates.aspx#10481035</link><pubDate>Tue, 10 Dec 2013 23:56:19 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10481035</guid><dc:creator>geofft</dc:creator><description>&lt;p&gt;How do vendors (and users) of third-party OSes distribute revocations like this morning&amp;#39;s security advisory 2871690 to machines that don&amp;#39;t have a Windows partition? Is there a feed of blacklists that we can put in our own security updates?&lt;/p&gt;
&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10481035" width="1" height="1"&gt;</description></item><item><title>re: Microsoft UEFI CA Signing policy updates</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2013/12/03/microsoft-uefi-ca-signing-policy-updates.aspx#10481013</link><pubDate>Tue, 10 Dec 2013 22:16:47 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10481013</guid><dc:creator>Myria</dc:creator><description>&lt;p&gt;If Windows fails requirement 5b, will Microsoft revoke its signature?&lt;/p&gt;
&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10481013" width="1" height="1"&gt;</description></item><item><title>re: Microsoft UEFI CA Signing policy updates</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2013/12/03/microsoft-uefi-ca-signing-policy-updates.aspx#10474221</link><pubDate>Thu, 05 Dec 2013 17:06:59 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10474221</guid><dc:creator>JJ Cox</dc:creator><description>&lt;p&gt;Sathya,&lt;/p&gt;
&lt;p&gt;Please review the PreSubmission Testing webpage linked above and let us know if you have additional questions.&lt;/p&gt;
&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10474221" width="1" height="1"&gt;</description></item><item><title>re: Microsoft UEFI CA Signing policy updates</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2013/12/03/microsoft-uefi-ca-signing-policy-updates.aspx#10474032</link><pubDate>Thu, 05 Dec 2013 01:25:25 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10474032</guid><dc:creator>JJ Cox</dc:creator><description>&lt;p&gt;The pre-submission test directions are here:&lt;/p&gt;
&lt;p&gt;&lt;a rel="nofollow" target="_new" href="http://blogs.msdn.com/b/windows_hardware_certification/archive/2013/12/03/pre-submission-testing-for-uefi-submissions.aspx"&gt;blogs.msdn.com/.../pre-submission-testing-for-uefi-submissions.aspx&lt;/a&gt;&lt;/p&gt;
&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10474032" width="1" height="1"&gt;</description></item><item><title>re: Microsoft UEFI CA Signing policy updates</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2013/12/03/microsoft-uefi-ca-signing-policy-updates.aspx#10473906</link><pubDate>Wed, 04 Dec 2013 18:03:05 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10473906</guid><dc:creator>Sathya</dc:creator><description>&lt;p&gt;Could we get more details on this like what are the tests and how they applicable to IHV provided boot services driver etc?. More like step be step version of what needs to be done prior to signing submission&lt;/p&gt;
&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10473906" width="1" height="1"&gt;</description></item><item><title>re: Microsoft UEFI CA Signing policy updates</title><link>http://blogs.msdn.com/b/windows_hardware_certification/archive/2013/12/03/microsoft-uefi-ca-signing-policy-updates.aspx#10473589</link><pubDate>Tue, 03 Dec 2013 20:31:31 GMT</pubDate><guid isPermaLink="false">91d46819-8472-40ad-a661-2c78acb4018c:10473589</guid><dc:creator>WM</dc:creator><description>&lt;p&gt;Where can this pre-submission testing document be found?&lt;/p&gt;
&lt;div style="clear:both;"&gt;&lt;/div&gt;&lt;img src="http://blogs.msdn.com/aggbug.aspx?PostID=10473589" width="1" height="1"&gt;</description></item></channel></rss>