Garrett: Secure Boot and Restricted Boot
Garrett: Secure Boot and Restricted Boot
Posted Apr 8, 2013 5:08 UTC (Mon) by paulj (subscriber, #341)In reply to: Garrett: Secure Boot and Restricted Boot by mjg59
Parent article: Garrett: Secure Boot and Restricted Boot
Security in context: What does Secure Boot add against the type of attackers sophisticated enough to subvert the kernel and modify boot? Why _aren't_ these attackers also capable of just subverting the boot, again and again?
There's a whole class of software, and methods of attacking it, that have traditionally been viewed as "not security-sensitive", which suddenly become *front-line* once you have Secure Boot, from /etc config files, to state in /var, to kernel modules, to on-disk fs data structures (h/t Al). If those fail, then there'll still be a wealth of data read by non-privileged programmes from which to get started up and then run a kernel exploit.
The Google Chrome security bounties have demonstrated that we over-estimate the benefits of just adding additional hoops, and that the X-hats are incredibly capable at stringing together exploits of long chains of bugs into attacks.
