From: Jan Alsenz <janalsenz@student.ethz.ch>
To: The development of GRUB 2 <grub-devel@gnu.org>
Subject: Re: GRUB hardened boot framework
Date: Sat, 28 Feb 2009 01:07:33 +0100 [thread overview]
Message-ID: <49A88045.3020209@student.ethz.ch> (raw)
In-Reply-To: <20090227232607.GA29722@thorin>
[-- Attachment #1: Type: text/plain, Size: 1468 bytes --]
Robert Millan wrote:
> On Sat, Feb 28, 2009 at 12:18:17AM +0100, phcoder wrote:
>>> If the code that does the authentication is loaded from the encrypted partition,
>>> without being checked, this is true, but we assume, that core.img is already
>>> loaded (and checked), so the authentication code is not on the encrypted
>>> partition, and can detect any tampering.
>> As far as I understood Robert Millan was suggesting that just encrypting
>> (but not verifying) your kernel is enough. I wanted to show wha it isn't
>
> Fair enough. My point is that we don't need overcomplicated mechanisms to
> measure every module, config file or component separately. After core.img
> is verified/loaded, it's much simpler to handle the rest at this layer
> below the filesystem, which doesn't require significant redesign of how
> GRUB works.
Well, the problem there will probably be, that no commonly used disk encryption
(e.g. dm-crypt) uses checksums (as far as I know), when reading from disk. So if
you want to be compatible, the check of the files needs to be done either by the
filesystem (which only very few can do), or by a separate layer.
Which brings us back to the initial idea.
In any case, for all the crypto stuff it would be a good idea, to have some
general GRUB crypto-library, that everyone could use. Probably like it is done
in the linux kernel.
This could then also be used for the password command.
Greets,
Jan
[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 197 bytes --]
prev parent reply other threads:[~2009-02-28 0:09 UTC|newest]
Thread overview: 25+ messages / expand[flat|nested] mbox.gz Atom feed top
2009-02-22 13:27 GRUB trusted boot framework Jan Alsenz
2009-02-22 13:56 ` phcoder
2009-02-22 15:12 ` Jan Alsenz
2009-02-22 15:42 ` phcoder
2009-02-22 16:48 ` Jan Alsenz
2009-02-22 17:15 ` phcoder
2009-02-22 16:07 ` Vesa Jääskeläinen
2009-02-22 18:31 ` Jan Alsenz
2009-02-22 18:45 ` Vesa Jääskeläinen
2009-02-22 19:16 ` Jan Alsenz
2009-02-22 21:16 ` phcoder
2009-02-22 23:04 ` Jan Alsenz
2009-02-22 23:55 ` phcoder
2009-02-23 7:51 ` Jan Alsenz
2009-02-27 20:42 ` Robert Millan
2009-02-27 21:56 ` GRUB hardened " Jan Alsenz
2009-02-27 22:15 ` phcoder
2009-02-27 22:22 ` Robert Millan
2009-02-27 22:55 ` phcoder
2009-02-27 23:08 ` Robert Millan
2009-02-27 23:16 ` phcoder
2009-02-27 23:10 ` Jan Alsenz
2009-02-27 23:18 ` phcoder
2009-02-27 23:26 ` Robert Millan
2009-02-28 0:07 ` Jan Alsenz [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=49A88045.3020209@student.ethz.ch \
--to=janalsenz@student.ethz.ch \
--cc=grub-devel@gnu.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.