Skip to content

Conversation

@Flickdm
Copy link
Member

@Flickdm Flickdm commented Dec 1, 2025

Description

This pull request adds a new "verify" command to the auth_var_tool.py script, enhancing its ability to cryptographically verify UEFI authenticated variables. It also improves the output of the "describe" command by converting hex-encoded certificate fields into human-readable text. The most important changes are summarized below:

New Verification Functionality:

  • Added a verify command that verifies the cryptographic signature of authenticated variables, checking PKCS7 structure validity, signature correctness, and presence of the signing certificate. This includes new helper functions for extracting certificates and verifying signatures from PKCS7 data. [1] [2] [3] [4] [5] [6]

Improvements to Describe Output:

  • Enhanced the describe command to convert ASN.1 hex-encoded certificate fields (such as subject and issuer names) into human-readable strings, making the output more user-friendly. [1] [2]

Documentation and Usage Examples:

  • Updated script documentation and usage examples to include the new verify command and its arguments, ensuring users are aware of the new functionality. [1] [2]

These changes make the tool more robust for workflows that require verification of signed UEFI variables and improve the clarity of output for certificate inspection.
For details on how to complete these options and their meaning refer to CONTRIBUTING.md.

  • Impacts functionality?
  • Impacts security?
  • Breaking change?
  • Includes tests?
  • Includes documentation?

How This Was Tested

Against every supplied KEK update

Appears to have caught a couple mistakes, reviewing them internally

Integration Instructions

N/A

…validation

- Renamed script to validate_kek.py to reflect broader functionality
- Added validate_single_kek() function to validate individual KEK files
- Updated main() to detect and handle both file and folder inputs
- Improved output messages: 'Cryptographic Signature: VALID/INVALID' and 'Expected Payload: True/False'
- JSON output always generated for CI integration
- Preserves git history through git mv
- Created validate-kek-updates.yml workflow that runs on PRs
- Triggers when .bin files in KEK directories are added or modified
- Validates cryptographic signatures and payloads for all changed KEK files
- Fails CI if any KEK has an invalid signature
- Warns (but doesn't fail) if payload doesn't match expected hash
- Uploads validation results as artifacts
- Adds detailed summary to PR with pass/fail status for each file
Copy link

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

This pull request adds cryptographic verification capabilities to the UEFI authenticated variable tools by introducing a new verify command, a batch validation script, and automated CI workflow validation.

  • Adds verify command to auth_var_tool.py with PKCS7 signature verification
  • Creates validate_kek.py script for batch validation of KEK update files
  • Implements GitHub Actions workflow for automated KEK validation on pull requests

Reviewed changes

Copilot reviewed 3 out of 3 changed files in this pull request and generated 13 comments.

File Description
scripts/auth_var_tool.py Adds cryptographic verification functionality with new verify command, PKCS7 certificate extraction, signature verification helpers, and enhanced describe output with human-readable hex strings
scripts/validate_kek.py New script for validating KEK update files (single or batch) with JSON reporting, payload hash checking, and cryptographic signature verification
.github/workflows/validate-kek-updates.yml New GitHub Actions workflow to automatically validate KEK files in pull requests, checking cryptographic signatures and expected payloads
Comments suppressed due to low confidence (1)

scripts/auth_var_tool.py:669

  • This import of module re is redundant, as it was previously imported on line 49.
    import re

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

str
The content with hex strings converted to readable format where possible
"""
import re
Copy link

Copilot AI Dec 3, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The re module is imported at the module level (line 49), so this local import on line 669 is redundant. The module-level import should be used instead.

Suggested change
import re

Copilot uses AI. Check for mistakes.
return datetime.datetime.now(datetime.timezone.utc)


def _get_hash_algorithm_from_oid(oid: str) -> hashes.HashAlgorithm | None:
Copy link

Copilot AI Dec 3, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The type hint uses Python 3.10+ union syntax (hashes.HashAlgorithm | None). While this is modern Python syntax, it could cause compatibility issues if the project supports Python 3.9 or earlier. Consider using Optional[hashes.HashAlgorithm] from the typing module or verify the minimum Python version requirement.

Copilot uses AI. Check for mistakes.
Args:
kek_file: Path to KEK update file
quiet: If True, suppress validation output from the prototype
Copy link

Copilot AI Dec 3, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The documentation refers to "prototype" which seems like leftover wording from development. Consider updating to "verification process" or "verification output" for clarity.

Suggested change
quiet: If True, suppress validation output from the prototype
quiet: If True, suppress validation output from the verification process

Copilot uses AI. Check for mistakes.
fi
# Exit with error if any validation failed
if [ $VALIDATION_FAILED -eq 1 ]; then
Copy link

Copilot AI Dec 3, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

[nitpick] The condition checks if VALIDATION_FAILED equals 1, but the variable is only ever set to 0 or 1. Consider using a more standard exit immediately after setting VALIDATION_FAILED=1 rather than waiting until the end, or accumulate errors differently. However, the current logic works correctly as written.

Copilot uses AI. Check for mistakes.
Comment on lines +167 to +168
except Exception:
signed_data, _ = decoder.decode(pkcs7_data, asn1Spec=rfc2315.SignedData())
Copy link

Copilot AI Dec 3, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

[nitpick] The bare except Exception catches all exceptions without discriminating between expected decoding failures and unexpected errors. Consider catching specific exceptions (like ASN1 decoding exceptions) for better error handling and debugging.

Copilot uses AI. Check for mistakes.
Comment on lines +130 to +132
except Exception:
# If that fails, try decoding directly as SignedData
signed_data, _ = decoder.decode(pkcs7_data, asn1Spec=rfc2315.SignedData())
Copy link

Copilot AI Dec 3, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

[nitpick] The bare except Exception catches all exceptions without discriminating between expected decoding failures and unexpected errors. Consider catching specific exceptions (like ASN1 decoding exceptions) or at least logging at a higher level for unexpected failures to aid debugging.

Copilot uses AI. Check for mistakes.
Comment on lines 585 to +967
subparsers = setup_format_parser(subparsers)
subparsers = setup_sign_parser(subparsers)
subparsers = setup_describe_parser(subparsers)
subparsers = setup_verify_parser(subparsers)
Copy link

Copilot AI Dec 3, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Variable subparsers is not used.

Suggested change
subparsers = setup_format_parser(subparsers)
subparsers = setup_sign_parser(subparsers)
subparsers = setup_describe_parser(subparsers)
subparsers = setup_verify_parser(subparsers)
setup_format_parser(subparsers)
setup_sign_parser(subparsers)
setup_describe_parser(subparsers)
setup_verify_parser(subparsers)

Copilot uses AI. Check for mistakes.
# Only replace if it looks like printable text
if decoded.isprintable() or all(c in '\t\n\r' or c.isprintable() for c in decoded):
return f'{indent}{hex_string} ("{decoded}")'
except (UnicodeDecodeError, AttributeError):
Copy link

Copilot AI Dec 3, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

'except' clause does nothing but pass and there is no explanatory comment.

Suggested change
except (UnicodeDecodeError, AttributeError):
except (UnicodeDecodeError, AttributeError):
# Decoding failed; ignore and try the next decoding strategy.

Copilot uses AI. Check for mistakes.
decoded = hex_bytes.decode('utf-8')
if decoded.isprintable() or all(c in '\t\n\r' or c.isprintable() for c in decoded):
return f'{indent}{hex_string} ("{decoded}")'
except UnicodeDecodeError:
Copy link

Copilot AI Dec 3, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

'except' clause does nothing but pass and there is no explanatory comment.

Suggested change
except UnicodeDecodeError:
except UnicodeDecodeError:
# Ignore decode errors: not all byte sequences are valid UTF-8, so skip these cases.

Copilot uses AI. Check for mistakes.
Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
@Flickdm Flickdm changed the title Feature/auth var/cryptographic validation Cryptographic Validation For Authenticated Variables Dec 4, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant