Disabling Secure Boot signature validation
One of the benefits of the Shim approach of bridging trust between the Microsoft key and our own keys is that we can define whatever trust policy we want. Some of the feedback we've received has indicated that people really do want the ability to disable signature validation without having to go through the firmware. The problem is in ensuring that this can't be done either accidentally or via trivial social engineering.
We've come up with one possible solution for this. A tool run at the OS level generates a random password and hashes it. This hash is appended to the desired secure boot state and stored in an EFI variable. On reboot, Shim notices that this variable is set and drops to a menu. The user then selects "Change signature enforcement" and types the same password again. The system is then rebooted and Shim now skips the signature validation.
This approach avoids automated attacks - if malware sets this variable, the user will have no idea which password is required. Any social engineering attack would involve a roughly equivalent number of steps to disabling Secure Boot in the firmware UI, so it's not really any more attractive than just doing that. We're fairly confident that this meets everyone's expectations of security, but also guarantees that people who want to run arbitrary kernels and bootloaders can do so.
We've come up with one possible solution for this. A tool run at the OS level generates a random password and hashes it. This hash is appended to the desired secure boot state and stored in an EFI variable. On reboot, Shim notices that this variable is set and drops to a menu. The user then selects "Change signature enforcement" and types the same password again. The system is then rebooted and Shim now skips the signature validation.
This approach avoids automated attacks - if malware sets this variable, the user will have no idea which password is required. Any social engineering attack would involve a roughly equivalent number of steps to disabling Secure Boot in the firmware UI, so it's not really any more attractive than just doing that. We're fairly confident that this meets everyone's expectations of security, but also guarantees that people who want to run arbitrary kernels and bootloaders can do so.
How do they know the password
Re: How do they know the password
Re: How do they know the password
(Anonymous) - 2012-10-17 22:37 (UTC) - ExpandRe: How do they know the password
Re: How do they know the password
Re: How do they know the password
Re: How do they know the password
Re: How do they know the password
(Anonymous) - 2012-10-18 12:00 (UTC) - ExpandRe: How do they know the password
Re: How do they know the password
(Anonymous) - 2012-10-18 17:32 (UTC) - Expandno subject
If you can define any trust policy you want, then so can anyone, including your local (or remote, be it as it may) malware author. Explain how the Shim approach benefits the end user if this is the case?
(no subject)
no subject
(Or is it simply a laughable idea that a signature on a bootloader certifies anything other than that somebody with halfway plausible credentials gave a lot of money to the signing authority?)
(no subject)
Anonymity
(Anonymous) - 2012-10-20 11:01 (UTC) - Expandno subject
(Anonymous) 2012-10-18 03:21 pm (UTC)(link)And why do we need to "trust" Microsoft in order to compete with them. That's like Apple having to "trust" Microsoft just to create the iPhone 6.
no subject
(Anonymous) 2012-10-18 06:02 pm (UTC)(link)(no subject)
Apple keyboards?
(Anonymous) 2012-10-19 03:25 am (UTC)(link)Re: Apple keyboards?
Approach eases social engineering attacks
(Anonymous) 2012-10-19 02:58 pm (UTC)(link)I thought firmware UIs are so diverse that it is unreasonable/impossible to guide users to the secure boot options. Luckily, this makes it very hard to attack masses of users with single social engineering attacks.
Now the Shim provides a uniform mechanism that can be exploited by a single social engineering attack? ("There is a problem with the signature validation process of your computer. To fix this problem, please reboot and enter 09sifd5b when asked for a password." CLICK-HERE-TO-REBOOT)
Am I something wrong? For me it looks like you're increasing the attractiveness for these kinds of attacks a lot.
Re: Approach eases social engineering attacks
(Anonymous) - 2012-10-19 15:49 (UTC) - ExpandRe: Approach eases social engineering attacks
(Anonymous) - 2012-10-19 15:49 (UTC) - ExpandRe: Approach eases social engineering attacks
(Anonymous) - 2012-10-20 13:09 (UTC) - ExpandRe: Approach eases social engineering attacks
Re: Approach eases social engineering attacks
(Anonymous) - 2012-10-21 21:41 (UTC) - ExpandRe: Approach eases social engineering attacks
Re: Approach eases social engineering attacks
(Anonymous) - 2012-10-23 23:29 (UTC) - ExpandRe: Approach eases social engineering attacks
Re: Approach eases social engineering attacks
(Anonymous) - 2012-10-24 17:31 (UTC) - ExpandRe: Approach eases social engineering attacks
Re: Approach eases social engineering attacks
(Anonymous) - 2012-10-24 18:21 (UTC) - Expandno subject
(Anonymous) 2012-10-28 10:37 pm (UTC)(link)