|
|
Subscribe / Log in / New account

Garrett: Producing a trustworthy x86-based Linux appliance

Garrett: Producing a trustworthy x86-based Linux appliance

Posted Jun 2, 2021 19:39 UTC (Wed) by nim-nim (subscriber, #34454)
In reply to: Garrett: Producing a trustworthy x86-based Linux appliance by st
Parent article: Garrett: Producing a trustworthy x86-based Linux appliance

> However, as a slightly paranoid user, I find this very interesting if I can leverage it to work for me rather than against me.

Well, read the article then. It is *not* a simple or cheap endeavor, it requires quite a lot of infrastructure, there’s no way the casual paranoïd user will ever leverage this.

Far cheaper to buy single-use burner hardware, you need scale (and lots of identical systems to protect) to make the thing semi worthwhile.


to post comments

Garrett: Producing a trustworthy x86-based Linux appliance

Posted Jun 2, 2021 22:03 UTC (Wed) by st (guest, #96477) [Link]

You are right. I stand corrected.

Garrett: Producing a trustworthy x86-based Linux appliance

Posted Jun 3, 2021 5:12 UTC (Thu) by gdt (subscriber, #6284) [Link] (6 responses)

I wouldn't be so sure. The level of ransomware attacks in corporations has bought a sharp focus to the integrity of the installed operating system. What's described in the article is less complex than some other fleet management tasks.

It's not all addition of complexity either. Tying disk encryption keys to the mainboard's TPM makes administration of disk encryption simpler since there's no need to find an out-of-band way to enter the keys upon boot. Using your own secure boot keys and deleting the default keys means that stolen laptops can't be re-imaged and resold and provides a positive marker of removal of the laptop from the fleet (firm's keys removed, firms BIOS password cleared, default keys added, standard OS installed).

On the embedded systems side, it's notable that Cisco and Juniper have vastly improved the integrity checking of their operating systems due to instances of supply-chain attacks (the best-documented of these was in US NSA slides leaked by Snowden).

Garrett: Producing a trustworthy x86-based Linux appliance

Posted Jun 3, 2021 6:53 UTC (Thu) by patrakov (subscriber, #97174) [Link] (5 responses)

> Using your own secure boot keys and deleting the default keys

I was going to do that on my own machines, but this statement in the Arch wiki has stopped me:

> Warning: Replacing the platform keys with your own can end up bricking hardware on some machines, including laptops, making it impossible to get into the UEFI/BIOS settings to rectify the situation. This is due to the fact that some device (e.g GPU) firmware is signed using Microsoft's key.

https://wiki.archlinux.org/index.php?title=Unified_Extens...

Is it accurate? How to check in advance whether it is safe to replace the default keys on a particular desktop or laptop?

Garrett: Producing a trustworthy x86-based Linux appliance

Posted Jun 3, 2021 11:03 UTC (Thu) by leromarinvit (subscriber, #56850) [Link] (1 responses)

> Is it accurate? How to check in advance whether it is safe to replace the default keys on a particular desktop or laptop?

1. Buy computer
2. Replace keys
3a. It works? Good!
3b. It doesn't? Return it as broken, because it is. Tell people not to buy $BRAND (or at least $MODEL) and why.

Garrett: Producing a trustworthy x86-based Linux appliance

Posted Jun 24, 2021 12:15 UTC (Thu) by immibis (subscriber, #105511) [Link]

3b.ii: argue with the manager for 2 hours before getting banned from the store.
3b.iii: sue the store.
3b.iv: lose.

Garrett: Producing a trustworthy x86-based Linux appliance

Posted Jun 4, 2021 18:50 UTC (Fri) by JanC_ (guest, #34940) [Link]

Sounds like you’d want to keep one of Microsoft’s signing keys (the one used to sign UEFI drivers & device firmwares) in addition to your own, or make 100% sure you re-signed everything with your key (if that is possible, as it might be included in some ROM)?

Garrett: Producing a trustworthy x86-based Linux appliance

Posted Jun 4, 2021 20:54 UTC (Fri) by thwalker3 (subscriber, #89491) [Link] (1 responses)

> Is it accurate? How to check in advance whether it is safe to replace the default keys on a particular desktop or laptop?

I've actually had much better luck with this with laptops (Lenovo X1s in particular), presumably because everything is integrated. Tried it on a desktop once and found it wouldn't POST until I removed the 3rd party graphics card because or the MS signed option ROM. Unfortunately, the MS cert that is used for these ROMs is the same as that used for shim, so leaving it in db means anyone can boot their favorite distro via USB if they can get it into the boot order.

If you're trying this for the first time on hardware that you don't know how it will behave, it is wise to dump the UEFI ROM with an external programmer before you change the keys so that you can restore it to working order if you find that removing the MS cert leaves you with an unbootable system.

Garrett: Producing a trustworthy x86-based Linux appliance

Posted Jun 9, 2021 14:16 UTC (Wed) by JanC_ (guest, #34940) [Link]

Are shim & the ROMs signed by the same key, or by different keys signed by the same CA key?

(If they are separate keys, it would be possible to blacklist it.)


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds