(Optional) Enroll Arcserve UDP Public Key for Secure Boot Enabled Oracle Linux UEK6 Kernel

This section provides information about how to enroll Arcserve public key for Secure Boot enabled Oracle Linux UEK6 kernel.

Prerequisites:

Follow these steps:

  1. Log into the shell environment of the backup source node.
  2. Locate Arcserve public key at the following location:
    /tmp/arcserve_public_key_for_secureboot.der
  3. Locate Arcserve Platform key file (PKCS12) at the following location:
    /tmp/arcserve_p12key_for_secureboot.p12
  4. From the Oracle Linux documentation on inserting the module certificate in kernel and signing the kernel image for UEK6 kernel, follow these steps:
  5. To update the MOK database, follow these steps:
    1. To import the certification to MOK, run the following command:
    2. mokutil [--root-pw] --import
    3. /tmp/arcserve_public_key_for_secureboot.der
    4. The --root-pw option enables the usage of root user directly. The root password is required to enroll the key after restarting the system.
    5. Specify a password for the certification when the --root-pw option is not available.
    6. This password is required to enroll the key after restarting the system.
    7. Verify the list of certificates that are prepared to be enrolled from mokutil using the following command:
    8. mokutil --list-new>
    9. The list must include Arcserve public key.
    10. Restart the system.
    11. The system launches shim UEFI key management tool.
    12. Note: If the shim UEFI key management tool is not launched, the system may not have the mmx64.efi file.
    13. Enter the password that you have specified while importing Arcserve public key to enroll the certification to the MOK list.
  6. For UEK R6, only those keys that are listed in the kernel builtin_trusted_keys keyring are trusted for module signing. For this reason, module signing keys are added to the kernel image as part of the process for signing modules. Run the following command to validate that a key is trusted:
  7. # keyctl show %:.builtin_trusted_keys
  8. Keyring: 335047181 ---lswrv 0 0 keyring: .builtin_trusted_keys
  9. 1042239099 ---lswrv 0 0 \_ asymmetric: Oracle CA Server: 58bd7ea9c4fba3a4a62720d5d06f1e96053ddf4d
  10. 24285436 ---lswrv 0 0 \_ asymmetric: Arcserve kernel module signing key: fb4c19dca60d31bb203499bf6cb384af6615699d
  11. 362335717 ---lswrv 0 0 \_ asymmetric: Oracle America, Inc.: Ksplice Kernel Module Signing Key: 09010ebef5545fa7c54b626ef518e077b5b1ee4c
  12. 448587676 ---lswrv 0 0 \_ asymmetric: Oracle Linux Kernel Module Signing Key: 2bb352412969a3653f0eb6021763408ebb9bb5ab
  13. Notes:

The Secure Boot enabled Oracle Linux UEK6 kernel is ready for protection.