Gentoo Archives: gentoo-dev

From: Rich Freeman <rich0@g.o>
To: gentoo-dev@l.g.o
Subject: Re: [gentoo-dev] Re: UEFI secure boot and Gentoo
Date: Sun, 17 Jun 2012 23:08:41
Message-Id: CAGfcS_=y3tAfq=KGC7UQdxw+z8_kQ_cyzJG9Jhm7z_zimqQySw@mail.gmail.com
In Reply to: Re: [gentoo-dev] Re: UEFI secure boot and Gentoo by Florian Philipp
1 On Sun, Jun 17, 2012 at 4:30 PM, Florian Philipp <lists@×××××××××××.net> wrote:
2 > Am 17.06.2012 20:56, schrieb Sascha Cunz:
3 >> I was under the impression that it should at least help in that scenario.
4 >> OTOH, if it takes a compromised system or physical access to the machine in
5 >> order to manipulate the boot sequence, then I no longer understand what the
6 >> boot sequence in such a system must be protected against (Assuming that the
7 >> primary reason for boot sequence manipulation is to later on compromise the
8 >> system).
9 >>
10 >
11 > Well, it does help, especially when you also prevent changing UEFI
12 > settings with a password. However, there are so many variables and
13 > possibilities when talking about attacks on physically accessible
14 > systems, that you're usually screwed anyway.
15
16 I'd view secure boot as complementary to TPM.
17
18 TPM keeps somebody with physical access from being able to access
19 important information on your computer, since that data would be
20 encrypted and the keys would not be surrendered by the TPM module
21 without a proper chain of trust.
22
23 TPM is potentially more secure, although it has a fatal flaw in that
24 if the OS is compromised then the keys can be obtained (since the OS
25 needs the keys to access the disk) and a trojan can be installed on
26 the bootloader. That trojan is difficult to remove or even detect
27 even if you update your virus scanners/etc. Secure boot keeps trojans
28 out of the early boot chain, making them easier to clean up once your
29 system is further updated.
30
31 Secure boot is also somewhat easier to implement, and a bit more
32 recoverable if things go wrong. If you're using TPM and trusted grub
33 and all that, then if you mess up your trusted boot chain then you may
34 never get back the contents of your drive, unless you kept a copy of
35 various keys elsewhere.
36
37 Rich

Replies

Subject Author
Re: [gentoo-dev] Re: UEFI secure boot and Gentoo George Prowse <george.prowse@×××××.com>