all lists on lists.proxmox.com
 help / color / mirror / Atom feed
From: Fiona Ebner <f.ebner@proxmox.com>
To: Daniel Kral <d.kral@proxmox.com>,
	Proxmox VE development discussion <pve-devel@lists.proxmox.com>
Subject: Re: [pve-devel] [PATCH-SERIES qemu-server/manager/docs v3 0/3] improve Microsoft+Windows UEFI CA 2023 enrollment
Date: Mon, 23 Feb 2026 12:05:12 +0100	[thread overview]
Message-ID: <3ef71bc4-93cb-4eab-982d-7663083a9726@proxmox.com> (raw)
In-Reply-To: <DGMAENE5QLUV.1KC78AS2VTTP9@proxmox.com>

Am 23.02.26 um 11:59 AM schrieb Daniel Kral:
> On Wed Jan 21, 2026 at 4:44 PM CET, Fiona Ebner wrote:
>> Make it possible to enroll via the API and UI by setting the
>> ms-cert=2023w marker on the EFI disk.
>>
>> The previous Microsoft UEFI CA 2011 will expire in June 2026, and the
>> previous Windows UEFI CA 2011 will expire in October 2026, so there
>> should be a way to update that can be automated and done while guests
>> are running.
>>
>> pve-manager needs a dependency bump for qemu-server for the API call
>> to have the desired effect (or the marker will just get set without
>> actually enrolling).
> 
> Tested this series with some Windows 11, Debian and Proxmox VE VMs that
> I had lying around which still did not have the new UEFI CA certs
> enrolled yet.
> 
> Tested with each the Windows 11 and Linux VMs that
> 
> - `qm enroll-efi-keys $vmid` fails for running VMs
> - `qm enroll-efi-keys $vmid` fails for VMs without EFI disks
> - `qm enroll-efi-keys $vmid` does nothing for VMs without pre-enrolled
>   keys set
> - `qm enroll-efi-keys $vmid` does update to '2023w' if ms-cert=2023
> - `qm enroll-efi-keys $vmid` works for stopped VMs
> - Enrolling EFI keys through the CLI/API/UI works for them and are
>   enrolled correctly when doing a full shutdown-start cycle
> - Enrolling EFI keys is disabled in UI if VM does not have pre-enrolled
>   keys set or ms-cert=2023w, but enabled for ms-cert=2011 or
>   ms-cert=2023
> 
> I checked whether those were correctly enrolled inside the VM with
> 
>     [System.Text.Encoding]::ASCII.GetString((Get-SecureBootUEFI db).bytes)
>         -match 'Microsoft UEFI CA 2023'
>     [System.Text.Encoding]::ASCII.GetString((Get-SecureBootUEFI db).bytes)
>         -match 'Windows UEFI CA 2023'
> 
> for Windows VMs, and
> 
>     mokutil --all --list-enrolled | grep '\(Microsoft\|Windows\) UEFI CA 2023'
> 
> for Linux VMs.
> 
> The Windows VMs did _not_ have BitLocker configured though.
> 
> 
> Two small nits unrelated to the direct changes of this series:
> 
> - a `qm set 101 --efidisk0 '...,pre-enrolled-keys=1,ms-cert=2023'` will
>   also enroll the Windows UEFI CA 2023 certificate, should we set
>   `ms-cert=2023w` afterwards then as that's the correct state? But as
>   it's only a marker state that might be unnecessary.

Yes, good catch!

> - there are few spots only naming the Microsoft UEFI CA 2023 but not the
>   Windows UEFI CA 2023 certificate, e.g. the output and description of
>   `qm enroll-efi-keys`.

Ack.

> Otherwise, the changes look good to me, so consider this series as:
> 
> Tested-by: Daniel Kral <d.kral@proxmox.com>
> Reviewed-by: Daniel Kral <d.kral@proxmox.com>

Thank you for testing! Unfortunately, it seems we need yet another
change to also enroll the 2023 KEK:

https://forum.proxmox.com/threads/secure-boot-%E2%80%93-microsoft-uefi-ca-2023-certificate-not-included-in-efi-disk.173417/page-3#post-839474




      reply	other threads:[~2026-02-23 11:04 UTC|newest]

Thread overview: 8+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2026-01-21 15:44 Fiona Ebner
2026-01-21 15:44 ` [pve-devel] [PATCH qemu-server v3 1/3] vm start: check efi: always check for certificates when pre-enrolled-keys=1 Fiona Ebner
2026-01-21 15:44 ` [pve-devel] [PATCH manager v3 2/3] ui: qemu: hardware: efi: allow enrolling Microsoft+Windows UEFI CA 2023 Fiona Ebner
2026-01-21 15:44 ` [pve-devel] [PATCH docs v3 3/3] qm: bios/uefi: add secure boot certificate expiration section Fiona Ebner
2026-02-05 12:12 ` [pve-devel] [PATCH-SERIES qemu-server/manager/docs v3 0/3] improve Microsoft+Windows UEFI CA 2023 enrollment Fiona Ebner
2026-02-16 10:04   ` Fiona Ebner
2026-02-23 10:59 ` Daniel Kral
2026-02-23 11:05   ` Fiona Ebner [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=3ef71bc4-93cb-4eab-982d-7663083a9726@proxmox.com \
    --to=f.ebner@proxmox.com \
    --cc=d.kral@proxmox.com \
    --cc=pve-devel@lists.proxmox.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.
Service provided by Proxmox Server Solutions GmbH | Privacy | Legal