From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from firstgate.proxmox.com (firstgate.proxmox.com [IPv6:2a01:7e0:0:424::9]) by lore.proxmox.com (Postfix) with ESMTPS id B12721FF136 for ; Mon, 23 Feb 2026 16:25:28 +0100 (CET) Received: from firstgate.proxmox.com (localhost [127.0.0.1]) by firstgate.proxmox.com (Proxmox) with ESMTP id ADFB610D99; Mon, 23 Feb 2026 16:26:07 +0100 (CET) From: Fiona Ebner To: pve-devel@lists.proxmox.com Subject: [PATCH-SERIES qemu-server/manager/docs v4 0/6] improve Microsoft+Windows UEFI CA 2023 enrollment Date: Mon, 23 Feb 2026 16:25:32 +0100 Message-ID: <20260223152556.197761-1-f.ebner@proxmox.com> X-Mailer: git-send-email 2.47.3 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Bm-Milter-Handled: 55990f41-d878-4baa-be0a-ee34c49e34d2 X-Bm-Transport-Timestamp: 1771860345167 X-SPAM-LEVEL: Spam detection results: 0 AWL -1.081 Adjusted score from AWL reputation of From: address BAYES_00 -1.9 Bayes spam probability is 0 to 1% DMARC_MISSING 0.1 Missing DMARC policy KAM_DMARC_STATUS 0.01 Test Rule for DKIM or SPF Failure with Strict Alignment RCVD_IN_VALIDITY_CERTIFIED_BLOCKED 0.798 ADMINISTRATOR NOTICE: The query to Validity was blocked. See https://knowledge.validity.com/hc/en-us/articles/20961730681243 for more information. RCVD_IN_VALIDITY_RPBL_BLOCKED 0.79 ADMINISTRATOR NOTICE: The query to Validity was blocked. See https://knowledge.validity.com/hc/en-us/articles/20961730681243 for more information. RCVD_IN_VALIDITY_SAFE_BLOCKED 0.547 ADMINISTRATOR NOTICE: The query to Validity was blocked. See https://knowledge.validity.com/hc/en-us/articles/20961730681243 for more information. SPF_HELO_NONE 0.001 SPF: HELO does not publish an SPF Record SPF_PASS -0.001 SPF: sender matches SPF record Message-ID-Hash: UYHBQ5CIYJUJ2F2EI53YZOGZHP6UHUWV X-Message-ID-Hash: UYHBQ5CIYJUJ2F2EI53YZOGZHP6UHUWV X-MailFrom: f.ebner@proxmox.com X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; loop; banned-address; emergency; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header X-Mailman-Version: 3.3.10 Precedence: list List-Id: Proxmox VE development discussion List-Help: List-Owner: List-Post: List-Subscribe: List-Unsubscribe: Changes in v4: * Also enroll MS 2023 KEK. * Add ms-cert=2023k marker. * Clarify that there are multiple certificates in all descriptions. * Print correct marker when applying pending changes. * Mention that ms-cert=2023 and ms-cert=2023w may indicate partial enrollment in docs. Changes in v3: * drop already applied patches * squash ui patches * add additional newline in confirm dialog to better separate subject from note * move enrollment to Disk Actions menu * also suggest and support enrollment for non-Windows guests (Linux distro shims are also signed with the Microsoft KEK) * add docs patch Changes in v2: * add patch to also enroll the Windows UEFI CA 2023 * improve readability of change_drive() function * ui: add more context to confirmation dialog * add patch introducing a '2023w' marker so that drives already enrolled with only the MS 2023 cert can still be detected as needing enrollment Make it possible to enroll via the API and UI by setting the ms-cert=2023k marker on the EFI disk. The previous Microsoft UEFI CA 2011 will expire in June 2026, and the previous Windows UEFI CA 2011 will expire in October 2026, so there should be a way to update that can be automated and done while guests are running. pve-manager needs a dependency bump for qemu-server for the API call to have the desired effect (or the marker will just get set without actually enrolling). qemu-server: Fiona Ebner (4): vm start: check efi: always check for certificates when pre-enrolled-keys=1 efi disk: clarify that there are multiple certificates apply pending: efi disk: print drive to pick up changes ovmf: efi enroll: also enroll the MS 2023 KEK src/PVE/CLI/qm.pm | 11 +++-------- src/PVE/QemuServer.pm | 14 ++++++++------ src/PVE/QemuServer/Drive.pm | 11 ++++++----- src/PVE/QemuServer/OVMF.pm | 16 +++++++++++++--- 4 files changed, 30 insertions(+), 22 deletions(-) manager: Fiona Ebner (1): ui: qemu: hardware: efi: allow enrolling UEFI 2023 certs from Microsoft www/manager6/qemu/HardwareView.js | 89 ++++++++++++++++++++++++++++++- 1 file changed, 88 insertions(+), 1 deletion(-) docs: Fiona Ebner (1): qm: bios/uefi: add secure boot certificate expiration section qm.adoc | 52 +++++++++++++++++++++++++++++++++++++++++++++++++++- 1 file changed, 51 insertions(+), 1 deletion(-) Summary over all repositories: 6 files changed, 169 insertions(+), 24 deletions(-) -- Generated by git-murpp 0.5.0