TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Authenticated Boot and Disk Encryption on Linux (2021)

54 pointsby iscream269 months ago

9 comments

bubblesnort9 months ago
This is of course a slippery slope argument, but not neccesarily wrong: I think systemd is moving a FLOSS operating system towards one that has source but comes in binaries. You get an initrd that&#x27;s not built by you, tucked in a kernel also not built by you, runs the userspace from an immutable image also not built by you, which can be updated with binary deltas also not built by you, etc...<p>This makes sense from the perspective of making a kitchen appliance for the home consumer market. It makes no sense at all from the perspective of making a Unix-like operating system with four freedoms from scratch and ensure it stays that way.
评论 #41427378 未加载
评论 #41425398 未加载
transpute9 months ago
If you&#x27;re interested in this topic, the 5th &quot;System Boot and Security&quot; LPC microconference&quot; is on Sep 18, <a href="https:&#x2F;&#x2F;lpc.events&#x2F;event&#x2F;18&#x2F;sessions&#x2F;201&#x2F;#20240918" rel="nofollow">https:&#x2F;&#x2F;lpc.events&#x2F;event&#x2F;18&#x2F;sessions&#x2F;201&#x2F;#20240918</a><p><pre><code> Developing trustworthy Linux-based systems in an open-source way Common git repo for hosting Boot-firmware Accelerating Linux Kernel Boot-Up for Large Multi-Core Systems Leveraging and managing SBAT revocation mechanism on distribution level Using U-boot as a UEFI payload Measured Boot, Secure Attestation &amp; co, with systemd Secure Launch - DRTM solution on Arm platforms no more bootloader: please use the kernel instead OF != UEFI</code></pre>
评论 #41426359 未加载
thro19 months ago
But.. isn&#x27;t true that some Intel SSD Hardware Encryption is not (known to be) broken so far (unlike Samsung, WD, Crucial etc.)?<p>( <a href="https:&#x2F;&#x2F;www.tomshardware.com&#x2F;news&#x2F;crucial-samsung-ssd-encryption-bypassed,38025.html" rel="nofollow">https:&#x2F;&#x2F;www.tomshardware.com&#x2F;news&#x2F;crucial-samsung-ssd-encryp...</a> <a href="https:&#x2F;&#x2F;community.wd.com&#x2F;t&#x2F;what-do-you-think-of-the-security-flaws-in-the-western-digital-security-encryption-on-our-harddrives&#x2F;172354" rel="nofollow">https:&#x2F;&#x2F;community.wd.com&#x2F;t&#x2F;what-do-you-think-of-the-security...</a> <a href="https:&#x2F;&#x2F;www.zdnet.com&#x2F;article&#x2F;flaws-in-self-encrypting-ssds-let-attackers-bypass-disk-encryption&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.zdnet.com&#x2F;article&#x2F;flaws-in-self-encrypting-ssds-...</a> <a href="https:&#x2F;&#x2F;techreport.com&#x2F;news&#x2F;256-bit-aes-encryption-broken-in-sandforce-ssd-controllers&#x2F;" rel="nofollow">https:&#x2F;&#x2F;techreport.com&#x2F;news&#x2F;256-bit-aes-encryption-broken-in...</a> <a href="https:&#x2F;&#x2F;security.stackexchange.com&#x2F;questions&#x2F;134564&#x2F;how-secure-is-hardware-full-disk-encryption-fde-for-ssds" rel="nofollow">https:&#x2F;&#x2F;security.stackexchange.com&#x2F;questions&#x2F;134564&#x2F;how-secu...</a> and some Defcon(?) files I can&#x27;t find now - no success with Intel ? )
评论 #41425005 未加载
michaelt9 months ago
<i>&gt; Instead of stealing your laptop the attacker takes the harddisk from your laptop while you aren&#x27;t watching [...] makes a copy of it, and then puts it back.</i><p>I&#x27;ve never understood why people keep making this incredibly weak argument for secure boot.<p>Secure boot makes sense for a college computer lab, where any disk encryption is better than nothing, and you can&#x27;t give everyone the password or it&#x27;d defeat the point.<p>Secure boot makes sense if you&#x27;re a Microsoft-only company, as it&#x27;s a closed-source OS anyway and Microsoft have the code-signing keys. It means your users only have one password to type in - and helpdesk can reset it remotely if a user forgets.<p>Secure boot makes sense if you&#x27;re making something like an xbox or tivo where you want disk encryption but you can&#x27;t give the owner the password, as they&#x27;re the adversary you&#x27;re trying to protect against.<p>And yet people instead ignore these benefits, and go for this spy thriller nonsense as if people are going to be crawling through the air vents and abseiling from the ceiling to interfere with my computer? If you&#x27;re going to pretend to be James Bond you&#x27;d better also be learning ballroom dancing, kung fu, skiing and foreign languages.
评论 #41423813 未加载
评论 #41425613 未加载
评论 #41423994 未加载
评论 #41423903 未加载
fsflover9 months ago
I&#x27;m surprised that the author doesn&#x27;t mention Pureboot [0] or even Heads [1], the most user-friendly [2] way to use TPM on Linux and authenticate the boot process along with &#x2F;root, &#x2F;boot directories.<p>Also, there is no Microsoft involved in my laptop, i.e., the author&#x27;s statement<p>&gt; Microsoft&#x27;s certificates are basically built into all of today&#x27;s PCs<p>is wrong. I enjoy the coreboot with Heads on my Librem 14 with my own keys.<p>[0] <a href="https:&#x2F;&#x2F;docs.puri.sm&#x2F;PureBoot.html" rel="nofollow">https:&#x2F;&#x2F;docs.puri.sm&#x2F;PureBoot.html</a><p>[1] <a href="https:&#x2F;&#x2F;github.com&#x2F;osresearch&#x2F;heads">https:&#x2F;&#x2F;github.com&#x2F;osresearch&#x2F;heads</a><p>[2] <a href="https:&#x2F;&#x2F;puri.sm&#x2F;posts&#x2F;pureboot-101-first-boot-first-update-and-detecting-software-tampering&#x2F;" rel="nofollow">https:&#x2F;&#x2F;puri.sm&#x2F;posts&#x2F;pureboot-101-first-boot-first-update-a...</a>
评论 #41423468 未加载
评论 #41432238 未加载
ruthmarx9 months ago
The way to do this IMO is:<p>Have the bootloader boot automatically into an encrypted guest OS, and have it obtain the key transparently from the TPM. This way the hard drive can not be read outside of the machine. The guest OS allows easy login, can be used to let people borrow your pc in a trusted way, and can also serve as plausible deniability when asked to log in in front of authorities or otherwise being intimidated or forced.<p>Then configure the bootloader to boot an alt OS or show a boot menu for a specific key combo, and enter a passphrase to boot into the real, &#x27;hidden&#x27; OS.
OSI-Auflauf9 months ago
Lennart is technically doing good work. While his tools are less complicated than the current hilariously convoluted standard boot process, they are still too complicated to use well.<p>He also misses the point with the attack scenarios. If you luks encrypt your data and choose a good passphrase, the brunt is done against theft. Protecting against bad passwords is futile in the long run. (Will elaborate if requested.) That someone images your drive for offline bruteforce or manipulates your boot binaries is rare. The true benefit of signed boot chain is to have security patches work reteoactively, &quot;compromise recovery&quot;. Automated attacks and malware from the internet side are way more common.<p>Imagine one of your daemons is compromised. As long as it does not escalate privileges, it can only gain persistence via corruptable data files or config accessible to itself. Now a patch comes along that closes the hole that reinfects the daemon. The malware will not start on daemon restart.<p>With signed booting you can bring that to the kernel and root.<p>Signed booting with rollback protection into a known good state. As long as the malware is not part of that system it won&#x27;t run on launch.<p>But who signs my stuff, especially my own scripts and automation? Me of course, if I had good tooling.<p>If that became normal malware would just steal the key.<p>A TPM or other keybearer device lets you conditionally unlock a signing key.<p>So to sign, you can boot your system into a runlevel &#x2F; target &#x2F; ... that does not run auxiliary scripts from writable locations. If that state is measured by the TPM, you can sign.<p>With good enough tooling this is workable.<p>If implemented well, this even helps maintenance of the system.<p>In the state of things now, its a horrible convoluted mess that doesnt give extra security but 10 more points at which you can break your boot.<p>+ UEFI itself is again a complexity monster full of holes on very many machines. The whole x86 preboot stack amd or intel is a horrible complexity monster.
评论 #41424902 未加载
评论 #41424752 未加载
fsflover9 months ago
&gt; the attacker takes the harddisk from your laptop while you aren&#x27;t watching<p>&gt; You&#x27;ll never notice they did that.<p>Won&#x27;t you be safe if you put a colorful nail polish to your laptop screws and take picture of its pattern? Then you regularly compare the actual pattern with your picture.
评论 #41426502 未加载
评论 #41423630 未加载
评论 #41423765 未加载
hcfman9 months ago
Is this for real? Is the initramfs not signed and authenticated? if that was the case it would be a very serious and obvious flaw I would have thought.
评论 #41424790 未加载