Hello
I have questions regarding UEFI secure boot.
My setup is a Jetson Orin Nano 8GB devkit with latest jetpack 36.3 with bootloader secure boot enabled so that the root-of-trust can start from the BootROM.
I have read UEFI documentation and UEFI secure boot.
I have generated UefiDefaultSecurityKeys.dtbo
using script gen_uefi_default_keys_dts.sh
.
I enabled UEFI secure boot at flashing time and now I can use tools such as sbctl
and mokutil
to check that UEFI secure boot is enabled and PK, KEK and db keys are enrolled correctly.
My questions are:
-
May I consider there is no possible way for user to change any of the keys or update the OS with another one?
-
Even if access to UEFI menu at boot due to 5 seconds timeout (we plan on removing this timeout) is possible, can this be a security concern?
-
Same if user has access to root permission?
-
Can a user register MOK keys and sign its own UEFI payloads using MOK ?
Thanks for clarifications.