Hibernation doesn't work?
Hibernation doesn't work?
Posted Sep 14, 2012 16:51 UTC (Fri) by hummassa (subscriber, #307)In reply to: Hibernation doesn't work? by mjg59
Parent article: LSS: Secure Boot
Posted Sep 14, 2012 17:08 UTC (Fri)
by mjg59 (subscriber, #23239)
[Link]
Posted Sep 14, 2012 17:19 UTC (Fri)
by raven667 (subscriber, #5198)
[Link] (4 responses)
Even in the case where there is malware running on a system you should still be able to perform a clean boot with verification up to the point where your trust chain stops. Then the problem is post-boot (re)compromise and you can use many tools to combat that, if you can get them into your trusted base.
Posted Sep 14, 2012 19:48 UTC (Fri)
by hummassa (subscriber, #307)
[Link] (3 responses)
No, because crafting a special restore-image/swapfile and forcing a reboot you can, for instance, boot a whole another OS altogether, totally bypassing the "secure" boot nonsense.
> Even in the case where there is malware running on a system you should still be able to perform a clean boot with verification up to the point where your trust chain stops. Then the problem is post-boot (re)compromise and you can use many tools to combat that, if you can get them into your trusted base.
No, because at that point the "phantom" OS can just behave like the "original" OS with a rootkit, rendering symptoms of infection invisible to the original OS.
Suppose the machine is running Windows8, ok? The malware prepares an image that will run some OS that will run Windows8 in an emulated, censored environment that can make a lot of bad things, invisibly to W8. Everytime W8 tries to reboot, it goes thru the hoops again and boots instead the other OS.
Posted Sep 14, 2012 20:59 UTC (Fri)
by raven667 (subscriber, #5198)
[Link]
- Hibernate images are outside the trust boundary because they contain arbitrary code
I don't think Secure Boot attempts or claims to solve the problems of running arbitrary code it only allows you to build a beachhead, ideally an execution chain all the way until user space starts that can't be modified without throwing alarms. That means that re-compromise of a system needs to happen via the normal startup sequence and tools started before the malware can run can potentially block the malware. Once the malware runs it's Blue Pill all the way, you can't trust anything on the system after that.
Posted Sep 14, 2012 22:56 UTC (Fri)
by mjg59 (subscriber, #23239)
[Link] (1 responses)
Yes, and if you can get private information out of the kernel then you can probably also get private information *into* the kernel, and then you can just make the kernel execute your other OS without doing anything with hibernation.
Posted Sep 15, 2012 2:03 UTC (Sat)
by raven667 (subscriber, #5198)
[Link]
Hibernation doesn't work?
Hibernation doesn't work?
Hibernation doesn't work?
Hibernation doesn't work?
- The fix is to not restore hibernate images
- The proposed signature checking on hibernate images could protect an un-compromised system on disk from being modified before being restored
- There is no security added for a system booted in a VM
- There is no attestation in Secure Boot, a running system can't tell if it's been compromised or not
Hibernation doesn't work?
Hibernation doesn't work?