Date: 2013-12-04 07:58 pm (UTC)
From: [personal profile] mjg59
Yes, if you have some means of performing attestation then this attack can be identified. But you need some mechanism for performing that attestation, which is a far from solved problem.

The policy case is actually an interesting one. The only policy imposed by Secure Boot itself is the firmware→bootloader handoff. The bootloader is free to impose any policy it wants, and in fact Shim takes advantage of that - it transitions the root of trust from the firmware keys to a separate key database. As long as you're willing to put up with some bridge code, you can impose any policy you want.
If you don't have an account you can create one now.
HTML doesn't work in the subject.
More info about formatting

If you are unable to use this captcha for any reason, please contact us by email at support@dreamwidth.org

Profile

Matthew Garrett

About Matthew

Power management, mobile and firmware developer on Linux. Security developer at nvidia. Ex-biologist. Content here should not be interpreted as the opinion of my employer. Also on Mastodon and Bluesky.

Expand Cut Tags

No cut tags