Product SiteDocumentation Site

Fedora 18

Guida al UEFI Secure Boot

Edizione 18.4

Josh Boyer

Fedora Project

Kevin Fenzi

Fedora Project

Peter Jones

Red Hat Red Hat

Josh Bressers

Red Hat Product Security Team

Florian Weimer

Red Hat Product Security Team

A cura di

Eric Christensen

Red Hat Product Security Team

Nota Legale

Copyright © 2012-2013 Fedora Project Contributors.
The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at The original authors of this document, and Red Hat, designate the Fedora Project as the "Attribution Party" for purposes of CC-BY-SA. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version.
Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law.
Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries.
For guidelines on the permitted uses of the Fedora trademarks, refer to
Linux® is the registered trademark of Linus Torvalds in the United States and other countries.
Java® is a registered trademark of Oracle and/or its affiliates.
XFS® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries.
MySQL® is a registered trademark of MySQL AB in the United States, the European Union and other countries.
All other trademarks are the property of their respective owners.

1. Convenzioni del documento
1.1. Convenzioni tipografiche
1.2. Convenzioni del documento
1.3. Note ed avvertimenti
2. Inviateci i vostri commenti!
1. Cos'é UEFI Secure Boot ?
1.1. UEFI Secure Boot
1.2. Requisiti Microsoft per Boot Sicuro
1.2.1. Dettagli sull'implementazione
1.3. Fedora Secure Boot
1.4. Da cosa protegge Secure Boot ?
1.5. Potenziali rischi del Secure Boot
1.5.1. Rimozione forzata di funzionalità in modalità Secure Boot
1.5.2. Transizioni di Sistema aldifuori di Secure Boot
1.5.3. Nessuna infrastruttura di provisioning oltre a Microsoft Windows
1.5.4. Procedure di revoca non provate
2. System Configuration
2.1. Entering the UEFI firmware
2.2. Disabling UEFI Secure Boot
2.3. Enabling Microsoft Secure Boot
2.4. Known issues
3. Implementazione del UEFI Secure Boot
3.1. Chiavi
3.2. Shim
3.3. GRUB
3.4. Kernel
3.4.1. Restrizioni
4. Strumenti
4.1. Shim
4.2. Pesign
4.3. EFIKeyGen
4.4. sign-file
5. Utilizzare le proprie chiavi
5.1. Creazione chiavi
5.2. Ottenere le chiavi per la compilazione di shim
5.3. Pacchetti che necessitano di essere ricostruiti
5.4. Registrazione delle proprie chiavi nel firmware
A. Storico Revisioni
Indice analitico