From: Alex Elsayed <eternaleye@gmail.com>
To: dm-crypt@saout.de
Subject: Re: [dm-crypt] Integrate cryptsetup in bootloader
Date: Wed, 20 Nov 2013 01:24:31 -0800 [thread overview]
Message-ID: <l6hv47$u39$1@ger.gmane.org> (raw)
In-Reply-To: 7ffecb94408e77dc58197faa6883bf6c.squirrel@ssl.verfeiert.org
Sven Eschenberg wrote:
> What autheticity? grub's?
>
> The key will be stored by the firmware the same way the keys delivered
> with it are stored, most probably. That's why I said, you'd have to trust
> the firmware and that it can not easily be tampered with.
>
> I wanted to point out, that an attack on the bootloader itself is not
> really the problem here, as you can sign it and use secure boot.
>
> But in turn we'd have to trust secure boot and the security of the
> firmware in general.
>
> It is probably way easier though to manipulate the bootloader executeable,
> as Arno pointed out, than using a JTAGGer and modify the firmware.
Well, there are two concerns there, and the difficulty of using a JTAG
debugger only addresses one.
The other issue is that while GRUB2 is open-source and can be inspected for
backdoors, the same is not generally true of firmware.
Trinh, if you have the resources you may want to look into Coreboot with a
signed (and verification-capable) U-Boot payload. That's what ChromeOS is
using (although their U-Boot verification differs from and predates what
went upstream), and provides a similar trust chain to Secure Boot using
open-source components. That will restrict what hardware you can use, but if
your use-case requires that kind of security it may be worth considering.
next prev parent reply other threads:[~2013-11-20 9:24 UTC|newest]
Thread overview: 16+ messages / expand[flat|nested] mbox.gz Atom feed top
2013-11-19 2:20 [dm-crypt] Integrate cryptsetup in bootloader Trinh Van Thanh
2013-11-19 2:52 ` Arno Wagner
2013-11-19 3:42 ` Ralf Ramsauer
2013-11-19 4:20 ` Arno Wagner
2013-11-19 13:38 ` Ralf Ramsauer
2013-11-20 15:34 ` Arno Wagner
2013-11-27 2:16 ` Trinh Van Thanh
2013-11-27 13:45 ` Ralf Ramsauer
2013-11-19 23:28 ` Sven Eschenberg
2013-11-20 0:28 ` Ralf Ramsauer
2013-11-20 1:13 ` Sven Eschenberg
2013-11-20 9:24 ` Alex Elsayed [this message]
2013-11-19 3:27 ` Christoph Anton Mitterer
2013-11-20 9:09 ` Alex Elsayed
2013-11-20 9:14 ` Alex Elsayed
2013-11-19 4:56 ` Milan Broz
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to='l6hv47$u39$1@ger.gmane.org' \
--to=eternaleye@gmail.com \
--cc=dm-crypt@saout.de \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox