DM-Crypt Archive on lore.kernel.org
 help / color / mirror / Atom feed
From: Alex Elsayed <eternaleye@gmail.com>
To: dm-crypt@saout.de
Subject: Re: [dm-crypt] Integrate cryptsetup in bootloader
Date: Wed, 20 Nov 2013 01:24:31 -0800	[thread overview]
Message-ID: <l6hv47$u39$1@ger.gmane.org> (raw)
In-Reply-To: 7ffecb94408e77dc58197faa6883bf6c.squirrel@ssl.verfeiert.org

Sven Eschenberg wrote:

> What autheticity? grub's?
> 
> The key will be stored by the firmware the same way the keys delivered
> with it are stored, most probably. That's why I said, you'd have to trust
> the firmware and that it can not easily be tampered with.
> 
> I wanted to point out, that an attack on the bootloader itself is not
> really the problem here, as you can sign it and use secure boot.
> 
> But in turn we'd have to trust secure boot and the security of the
> firmware in general.
> 
> It is probably way easier though to manipulate the bootloader executeable,
> as Arno pointed out, than using a JTAGGer and modify the firmware.

Well, there are two concerns there, and the difficulty of using a JTAG 
debugger only addresses one.

The other issue is that while GRUB2 is open-source and can be inspected for 
backdoors, the same is not generally true of firmware.

Trinh, if you have the resources you may want to look into Coreboot with a 
signed (and verification-capable) U-Boot payload. That's what ChromeOS is 
using (although their U-Boot verification differs from and predates what 
went upstream), and provides a similar trust chain to Secure Boot using 
open-source components. That will restrict what hardware you can use, but if 
your use-case requires that kind of security it may be worth considering.

  reply	other threads:[~2013-11-20  9:24 UTC|newest]

Thread overview: 16+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2013-11-19  2:20 [dm-crypt] Integrate cryptsetup in bootloader Trinh Van Thanh
2013-11-19  2:52 ` Arno Wagner
2013-11-19  3:42   ` Ralf Ramsauer
2013-11-19  4:20     ` Arno Wagner
2013-11-19 13:38       ` Ralf Ramsauer
2013-11-20 15:34         ` Arno Wagner
2013-11-27  2:16           ` Trinh Van Thanh
2013-11-27 13:45             ` Ralf Ramsauer
2013-11-19 23:28       ` Sven Eschenberg
2013-11-20  0:28         ` Ralf Ramsauer
2013-11-20  1:13           ` Sven Eschenberg
2013-11-20  9:24             ` Alex Elsayed [this message]
2013-11-19  3:27 ` Christoph Anton Mitterer
2013-11-20  9:09   ` Alex Elsayed
2013-11-20  9:14     ` Alex Elsayed
2013-11-19  4:56 ` Milan Broz

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to='l6hv47$u39$1@ger.gmane.org' \
    --to=eternaleye@gmail.com \
    --cc=dm-crypt@saout.de \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox