Skip to main content

State of Secure Boot detailed

posted onNovember 1, 2012
by l33tdawg

Red Hat and Fedora developer Matthew Garrett has detailed the "range of subtle changes" that have taken place since he began working on Secure Boot support. In a blog posting, Garrett gives an overview of the current implementation. He explains that the current approach, a shim bootloader, "cunningly called 'Shim'", contains a public key under their own control and is signed by Microsoft. The shim will only boot binaries signed with the public key and allows the developers to build and sign all other binaries themselves without going back to Microsoft to get bootloaders or other components signed.

Garret points out that a locked-down boot environment and signed kernel do block modified bootloaders and booting attack code, but do nothing if, for example, an attacker uses a booted kernel to launch another kernel. To ensure that doesn't happen, direct hardware access from userspace is blocked and must go through kernel modules which have been signed by a key the kernel trusts.

Source

Tags

Security

You May Also Like

Recent News

Friday, November 29th

Tuesday, November 19th

Friday, November 8th

Friday, November 1st

Tuesday, July 9th

Wednesday, July 3rd

Friday, June 28th

Thursday, June 27th

Thursday, June 13th

Wednesday, June 12th

Tuesday, June 11th

Simplenews subscription

Stay informed - subscribe to our newsletter.
The subscriber's email address.
Keeping Knowledge Free for Over a Decade

Copyright © 2018 Hack In The Box. All rights reserved.

36th Floor, Menara Maxis, Kuala Lumpur City Centre 50088 Kuala Lumpur Malaysia
Tel: +603-2615-7299 Fax: +603-2615-0088