Attacking the kernel via its command line
Attacking the kernel via its command line
Posted Jun 22, 2017 18:00 UTC (Thu) by thestinger (guest, #91827)In reply to: Attacking the kernel via its command line by pjones
Parent article: Attacking the kernel via its command line
Not what secure boot means. You're trying to push a redefinition of a term into one being pushed to market a meaningless non-security feature. Other vendors understand what secure / verified boot actually means:
https://www.qualcomm.com/media/documents/files/secure-boo...
"Secure boot is defined as a boot sequence in which each software image to be executed is authenticated by software that was previously verified"
Note they don't try to change the definition of a feature implemented across many architectures / platforms.
> Since this potentially allows arbitrary untrusted code execution from the kernel's privilege level, it's a real vuln in the context of the Secure Boot threat model.
Not a meaningful threat model and not what secure boot means.
> So yes, it really is a potential Secure Boot bypass, and yes it does actually matter for normal deployment of normal systems.
Nope, not a bypass, and nope, you haven't given one example of how it matters.
> From a practical point of view, that means you can use it to build and install a bootkit that persists across OS reinstalls.
If the persistent kernel line isn't verified... which is a thoroughly broken implementation of secure / verified boot.
> What Secure Boot is giving you is the ability to recover from being rooted by an attacker who's actually moderately competent.
A more complete implementation of secure / verified boot covering the OS makes persistence as root more difficult. Not verifying any of userspace does not.
> You can effectively organize that code as a bootloader for what looks like a normal OS, except with a loader that modifies whatever it wants however it wants. With fairly minimal effort, this means a perpetual back door that remains open across kernel upgrades. With a little more effort you can make that continue being true when you boot new install media.
You can still do exactly this if userspace isn't verified. No value is provided for this threat model that you're describing without verifying any of userspace.
> There are several different ways you can accomplish that, some more insidious than others, and there are various bells and whistles that are more effort on top of that, including how hard you want to hide that you're doing it. But those are bells and whistles. Basic exploits of this type have been seen in the wild, and these are what Secure Boot prevents. And talks at security conferences now regularly include methods to do all of this, with the stipulation that Secure Boot must be disabled. This bug gives you a mechanism to build it again with Secure Boot enabled. That's what this has to do with Secure Boot.
Nope, you're totally wrong. Maybe you should learn some security basics before trying to explain things in a condescending to someone that has a far better grasp on it than you do. If you read what I and other people had written about it, you already would have learned why your view on it isn't correct. Not sure why you're responding without reading first.
> What it has to do with "verified boot" or "trusted boot" is nothing at all.
Secure boot and verified boot are synonyms. You're trying to redefine a long lived industry term to include an orthogonal feature not directly related to it, and to reduce the scope to a nearly worthless implementation. If you want to have a new term for your company's attempt at security features, make a new term for it without a widespread existing definition.
