all lists on lists.proxmox.com
 help / color / mirror / Atom feed
From: "Daniel Kral" <d.kral@proxmox.com>
To: "Proxmox VE development discussion" <pve-devel@lists.proxmox.com>
Subject: Re: [pve-devel] [PATCH-SERIES qemu-server/manager/docs v3 0/3] improve Microsoft+Windows UEFI CA 2023 enrollment
Date: Mon, 23 Feb 2026 11:59:23 +0100	[thread overview]
Message-ID: <DGMAENE5QLUV.1KC78AS2VTTP9@proxmox.com> (raw)
In-Reply-To: <20260121154453.285642-1-f.ebner@proxmox.com>

On Wed Jan 21, 2026 at 4:44 PM CET, Fiona Ebner wrote:
> Make it possible to enroll via the API and UI by setting the
> ms-cert=2023w marker on the EFI disk.
>
> The previous Microsoft UEFI CA 2011 will expire in June 2026, and the
> previous Windows UEFI CA 2011 will expire in October 2026, so there
> should be a way to update that can be automated and done while guests
> are running.
>
> pve-manager needs a dependency bump for qemu-server for the API call
> to have the desired effect (or the marker will just get set without
> actually enrolling).

Tested this series with some Windows 11, Debian and Proxmox VE VMs that
I had lying around which still did not have the new UEFI CA certs
enrolled yet.

Tested with each the Windows 11 and Linux VMs that

- `qm enroll-efi-keys $vmid` fails for running VMs
- `qm enroll-efi-keys $vmid` fails for VMs without EFI disks
- `qm enroll-efi-keys $vmid` does nothing for VMs without pre-enrolled
  keys set
- `qm enroll-efi-keys $vmid` does update to '2023w' if ms-cert=2023
- `qm enroll-efi-keys $vmid` works for stopped VMs
- Enrolling EFI keys through the CLI/API/UI works for them and are
  enrolled correctly when doing a full shutdown-start cycle
- Enrolling EFI keys is disabled in UI if VM does not have pre-enrolled
  keys set or ms-cert=2023w, but enabled for ms-cert=2011 or
  ms-cert=2023

I checked whether those were correctly enrolled inside the VM with

    [System.Text.Encoding]::ASCII.GetString((Get-SecureBootUEFI db).bytes)
        -match 'Microsoft UEFI CA 2023'
    [System.Text.Encoding]::ASCII.GetString((Get-SecureBootUEFI db).bytes)
        -match 'Windows UEFI CA 2023'

for Windows VMs, and

    mokutil --all --list-enrolled | grep '\(Microsoft\|Windows\) UEFI CA 2023'

for Linux VMs.

The Windows VMs did _not_ have BitLocker configured though.


Two small nits unrelated to the direct changes of this series:

- a `qm set 101 --efidisk0 '...,pre-enrolled-keys=1,ms-cert=2023'` will
  also enroll the Windows UEFI CA 2023 certificate, should we set
  `ms-cert=2023w` afterwards then as that's the correct state? But as
  it's only a marker state that might be unnecessary.

- there are few spots only naming the Microsoft UEFI CA 2023 but not the
  Windows UEFI CA 2023 certificate, e.g. the output and description of
  `qm enroll-efi-keys`.


Otherwise, the changes look good to me, so consider this series as:

Tested-by: Daniel Kral <d.kral@proxmox.com>
Reviewed-by: Daniel Kral <d.kral@proxmox.com>




  parent reply	other threads:[~2026-02-23 10:58 UTC|newest]

Thread overview: 8+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2026-01-21 15:44 Fiona Ebner
2026-01-21 15:44 ` [pve-devel] [PATCH qemu-server v3 1/3] vm start: check efi: always check for certificates when pre-enrolled-keys=1 Fiona Ebner
2026-01-21 15:44 ` [pve-devel] [PATCH manager v3 2/3] ui: qemu: hardware: efi: allow enrolling Microsoft+Windows UEFI CA 2023 Fiona Ebner
2026-01-21 15:44 ` [pve-devel] [PATCH docs v3 3/3] qm: bios/uefi: add secure boot certificate expiration section Fiona Ebner
2026-02-05 12:12 ` [pve-devel] [PATCH-SERIES qemu-server/manager/docs v3 0/3] improve Microsoft+Windows UEFI CA 2023 enrollment Fiona Ebner
2026-02-16 10:04   ` Fiona Ebner
2026-02-23 10:59 ` Daniel Kral [this message]
2026-02-23 11:05   ` Fiona Ebner

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=DGMAENE5QLUV.1KC78AS2VTTP9@proxmox.com \
    --to=d.kral@proxmox.com \
    --cc=pve-devel@lists.proxmox.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.
Service provided by Proxmox Server Solutions GmbH | Privacy | Legal