Gentoo Archives: gentoo-dev

From: Sascha Cunz <sascha-ml@×××××××××.org>
To: gentoo-dev@l.g.o
Subject: Re: [gentoo-dev] Re: UEFI secure boot and Gentoo
Date: Sun, 17 Jun 2012 17:35:06
Message-Id: 1694115.BlGnUZZYGL@mephista
In Reply to: Re: [gentoo-dev] Re: UEFI secure boot and Gentoo by "Michał Górny"

> It doesn't. It's just a very long wooden fence; you just didn't find > the hole yet.
Given the fact that the keys in the BIOS must somehow get there and it must also be able to update them (how to revoke or add keys else?). Unless this is completely done in hardware, there must be a software doing it. Software can - by design - be reverse engineered; in some countries even legally without any further agreement or license. So, you can sign, encrypt, obfuscate or use some other foobar-mechanism on this blob of software - at some point it must be readable from the processor, so you have to provide the mechanisms to verify signs, undo encryption etc somewhere (either in hardware or another software). Even if you somehow manage to embed all of this in the hardware stack, it would still require some kind of interface to get updated / revoked keys to operate on. It's not a matter of *if this can* be broken by someone who cares, it's a matter of *how long does it take* for someone who cares to break it. In the end, this is just another kind of "seems to be secure for a day or two". Admittedly a complex one - but there will always be a "kid in a garage" that is able to set everyone else out of business. SaCu


Subject Author
Re: [gentoo-dev] Re: UEFI secure boot and Gentoo Rich Freeman <rich0@g.o>
Re: [gentoo-dev] Re: UEFI secure boot and Gentoo Florian Philipp <lists@×××××××××××.net>