-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 rharwood's statement about Secure Boot on 2022-07-01: I'm one of the upstream maintainers for [pesign](https://github.com/rhboot/pesign), which is used for signing EFI binaries, and I'm one of the upstream maintainers of [shim](https://github.com/rhboot/shim), which most Linux distros use to transition from the firmware's security domain to the kernel's. I'm also responsible for Fedora's, RHEL's, and CentOS's builds of pesign, shim, and grub2. I'm not responsible for the kernels for Fedora, RHEL, or CentOS, nor for determining which of them finally get signed for Secure Boot. # Fedora At no point have I been contacted with warrants of any kind, or any similar instrument, or in any way, from governmental or non-governmental entities, about inclusion of any kind of malware or backdoor in Fedora's signed secure boot binaries, including shim, grub2, the kernel, and pesign, nor have I at any time been approached about disclosure of our signing keys. I am also not aware of anyone else involved in our signing that has been contacted with warrants of any kind, or any similar instrument, or in any way, from governmental or non-governmental entities, about inclusion of any kind of malware or backdoor in Fedora's signed secure boot binaries, including shim, grub2, the kernel, and pesign, nor am I aware of any other involved party having at any time been approached about disclosure of our signing keys (except the troll called out in pjones's statement). # RHEL At no point have I been contacted with warrants of any kind, or any similar instrument, or in any way, from governmental or non-governmental entities, about inclusion of any kind of malware or backdoor in RHEL's signed secure boot binaries, including shim, grub2, the kernel, and pesign, nor have I at any time been approached about disclosure of our signing keys. I am also not aware of anyone else involved in our signing that has been contacted with warrants of any kind, or any similar instrument, or in any way, from governmental or non-governmental entities, about inclusion of any kind of malware or backdoor in RHEL's signed secure boot binaries, including shim, grub2, the kernel, and pesign, nor am I aware of any other involved party having at any time been approached about disclosure of our signing keys. # CentOS At no point have I been contacted with warrants of any kind, or any similar instrument, or in any way, from governmental or non-governmental entities, about inclusion of any kind of malware or backdoor in CentOS's signed secure boot binaries, including shim, grub2, the kernel, and pesign, nor have I at any time been approached about disclosure of our signing keys. I am also not aware of anyone else involved in our signing that has been contacted with warrants of any kind, or any similar instrument, or in any way, from governmental or non-governmental entities, about inclusion of any kind of malware or backdoor in CentOS's signed secure boot binaries, including shim, grub2, the kernel, and pesign, nor am I aware of any other involved party having at any time been approached about disclosure of our signing keys. # Upstream pesign/shim At no point have I been contacted with warrants of any kind, or any similar instrument, or in any way, from governmental or non-governmental entities, about inclusion of any kind of malware or backdoor into either shim or pesign. I am also unaware of any other contributor to shim or pesign having been contacted with warrants of any kind, or any similar instrument, or in any way, from governmental or non-governmental entities, about inclusion of any kind of malware or backdoor into either shim or pesign. # Change history 2022-03-09: created document based on [pjones's current statement](https://blog.uncooperative.org/shim-info-2022-03-02.txt.asc). -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEA5qc6hnelQjDaHWqJTL5F2qVpEIFAmK/FrwACgkQJTL5F2qV pEKJmg/8DB7QwywPvc5k5tofXxTxAC23hVDTH8ZGnzzgpsCOA/j08xbJ9kSaaecq 8JdMyYFY/tT5JdnMzgDZdHdzLUKjbvezaNWVyfp6avwsEdSzcpZfXBf5MUT6a0A5 tqzXFSC4jAS3ozwp3FzRhgd6p1N9ZsC3+LXpwdSVoMQa2uy64MjDz4OdyDosK2Wl 2+wnDrifusgfu+CIGLUrrI8eSLt6Npbbsm7f+B1NkDTh4nvRdnjYyxlmHE6NIgNI XB+VrF1EJ0K65J7jJHmk03+0OhwBr9SlIFATJfIyBf07IOfoqKLMC9NdkhnIiMTa i2dm/eRoxulZ/38NK8Q98vPPSKeJtCjL3nkKHFyDKkan62zHwHYy/7n413mDaWPC drL10g4f/2Ihy6AitAFLOYD1+PT3WYAZC9c+Mm0U+FWaG/q6h+ohOOXzZ/0el821 i9Ia9dEJZGkUprIqTonDdPXyrHivu5CpV6ILgYZFR1dRnR5m6gzDx4Zm25m1IpLX eOQSu3CXN80pOI6UuSuvxeMj25HEt6cS2Rr4WN5jsljeWva5NR0qgK+PNpyL6nIM GrVetd/4l3VFKac7/vW3vgoOBH2GmSEt5y0kKM/jSH1gei0pmx8Tq/geEDss9SWz C36zA6dBSwJfIkSLEMRU5Inf2iD+H9ZmlG66uEOWhiR5IHV9cG8= =DyPt -----END PGP SIGNATURE-----