-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 rharwood's statement about Secure Boot on 2023-01-03: I'm one of the upstream maintainers for [pesign](https://github.com/rhboot/pesign), which is used for signing EFI binaries, and I'm one of the upstream maintainers of [shim](https://github.com/rhboot/shim), which most Linux distros use to transition from the firmware's security domain to the kernel's. I'm also responsible for Fedora's, RHEL's, and CentOS's builds of pesign, shim, and grub2. I'm not responsible for the kernels for Fedora, RHEL, or CentOS, nor for determining which of them finally get signed for Secure Boot. # Fedora At no point have I been contacted with warrants of any kind, or any similar instrument, or in any way, from governmental or non-governmental entities, about inclusion of any kind of malware or backdoor in Fedora's signed secure boot binaries, including shim, grub2, the kernel, and pesign, nor have I at any time been approached about disclosure of our signing keys. I am also not aware of anyone else involved in our signing that has been contacted with warrants of any kind, or any similar instrument, or in any way, from governmental or non-governmental entities, about inclusion of any kind of malware or backdoor in Fedora's signed secure boot binaries, including shim, grub2, the kernel, and pesign, nor am I aware of any other involved party having at any time been approached about disclosure of our signing keys (except the troll called out in pjones's statement). # RHEL At no point have I been contacted with warrants of any kind, or any similar instrument, or in any way, from governmental or non-governmental entities, about inclusion of any kind of malware or backdoor in RHEL's signed secure boot binaries, including shim, grub2, the kernel, and pesign, nor have I at any time been approached about disclosure of our signing keys. I am also not aware of anyone else involved in our signing that has been contacted with warrants of any kind, or any similar instrument, or in any way, from governmental or non-governmental entities, about inclusion of any kind of malware or backdoor in RHEL's signed secure boot binaries, including shim, grub2, the kernel, and pesign, nor am I aware of any other involved party having at any time been approached about disclosure of our signing keys. # CentOS At no point have I been contacted with warrants of any kind, or any similar instrument, or in any way, from governmental or non-governmental entities, about inclusion of any kind of malware or backdoor in CentOS's signed secure boot binaries, including shim, grub2, the kernel, and pesign, nor have I at any time been approached about disclosure of our signing keys. I am also not aware of anyone else involved in our signing that has been contacted with warrants of any kind, or any similar instrument, or in any way, from governmental or non-governmental entities, about inclusion of any kind of malware or backdoor in CentOS's signed secure boot binaries, including shim, grub2, the kernel, and pesign, nor am I aware of any other involved party having at any time been approached about disclosure of our signing keys. # Upstream pesign/shim At no point have I been contacted with warrants of any kind, or any similar instrument, or in any way, from governmental or non-governmental entities, about inclusion of any kind of malware or backdoor into either shim or pesign. I am also unaware of any other contributor to shim or pesign having been contacted with warrants of any kind, or any similar instrument, or in any way, from governmental or non-governmental entities, about inclusion of any kind of malware or backdoor into either shim or pesign. # Change history 2022-03-09: created document based on [pjones's current statement](https://blog.uncooperative.org/shim-info-2022-03-02.txt.asc). -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEA5qc6hnelQjDaHWqJTL5F2qVpEIFAmO0pgcACgkQJTL5F2qV pEIvLhAAsuHSSO0MMRcNe/DieZL+dYclEFL/eDJuNLEHCmr/xV7x81eEEAXvSHib ty8hjPMTQAWeGy4IDSqsh7OluuK1rk+ASzz/e5daEZVxjWL+Js4DsbcVh7LK4F+x FGcD/zwzVnow4PN5+UCWwPwmLbwYpy2P1FdPw+MErbA38fC5U6qq1o8+sxMqFTcg T0pn7AkGkOcXPWIiL23FA/TYOsbjgmyNp+9eLS+JG9xCXxzTXvXfBriUl0R7LkEi i3QXU4KjieCpn8mBAdXH+9qNmaoikzB9WoI1s3xAKZxLx4FMLVkXvNOUCCDiPwj5 f9vhiEeAGbjk92HLXhO0k4F5H3/INsUN9I3ujIeo7oRlpjeJ6n+tXzVtQlpZ2mSb RzLeIXZ5lUVYTonayQuQchBXOXJehfe2ApZ674uLRF9F4waTnIHTiV0HuvPfhc1h H9jZ0y35BykYlfFT7tTIc87wXFq0phcl8ptI+Nip+kwxh4XhhbtKXQ8iT0Rd4cYu YYfxKlVnE+561jrA1rpGkiuHKKti5IntTRNLOMNpjJNxVBCYeEeHUoQP62C0aLzu fzzTFVCGvcyz2cRnGW6KLMxOhv5wyUp2RCcmVYMACHQmVEqiAAqLuaE8XUKweYdg nqUOL7Q4oDJy3918CbHzTzF58PqZd9nOBwTHKsvWxWGkwzPkcoI= =ANUk -----END PGP SIGNATURE-----