←back to thread

658 points transpute | 3 comments | | HN request time: 0.002s | source
Show context
PrimeMcFly ◴[] No.35844325[source]
There is no reason to use a manufacture key anyway, at least for SecureBoot.

Obviously it isn't in everyone's skillset, but if you have the means there is nothing preventing you from generating and using your own key.

Honestly it seems like a good basic security precaution, not only to prevent against leaks like this, but also to counteract any backdoors (although kind of a moot point with chipmakers).

replies(3): >>35844568 #>>35844657 #>>35844906 #
dathinab ◴[] No.35844568[source]
Yesn't

1. some EFIs are broken in ways that make using private platform keys hard or impossible

2. there are PCIe cards which need option ROMs to be executed (most commonly that dedicated GPUs), this ROMs are not always but often signed by one of the Microsoft Keys and removing it from the trust db will prevent the ROMs from running and lead to all kinds of problems, e.g. not having any video and in turn not being able to undo to EFI setting/disable secure boot. You can make sure the specific ROMs are whitelisted, but then you need to be very very careful about e.g. graphics drivers updating the GPU firmware and similar. And putting the right data in the trust db isn't easy either.

replies(2): >>35844680 #>>35845787 #
jonas-w ◴[] No.35845787[source]
Is there a way to know if it is safe to enroll my own keys? I always wanted to, but always didn't do it, because I often read that it can make the system unbootable.
replies(2): >>35846326 #>>35846586 #
Arnavion ◴[] No.35846326[source]
The question is whether you have any mandatory UEFI drivers or not. If they're in the ESP you can just look there to check, but UEFI drivers can also be loaded from PCI cards or baked in the firmware itself.

If you're using a TPM for Secure Boot, you can use the commands in https://github.com/Foxboron/sbctl/wiki/FAQ#option-rom to know for sure.

replies(1): >>35846566 #
1. jonas-w ◴[] No.35846566[source]
Thanks, I'm not seeing these lines in the eventlog, thats good. Are these the only things that could brick my laptop, or are there any other known "security features" that vendors implement?
replies(1): >>35846632 #
2. dathinab ◴[] No.35846632[source]
option ROMs are not quote "security features" they are more like legacy x86 thing which if they get corrupted (e.g. modified by malware) would be a complete security nightmare of having malware in a way which can access most things and can't be detected at all (slightly oversimplified).

Because of this validating option ROMs is _very_ important to a point some would argue it's more important then validating that e.g. your Linux kernel has not been modified

Honestly option ROMs IMHO should not exist in the way they do (for security reasons), but they outdate secure boot by quite a bit and like many of this "old legacy features a lot of things depend on" are just really hard to get right of.

Through without question the design this ended up with has a terrible UX.

But most laptops with a reasonable EFI implementation and no dedicated graphics card do luckily not have option ROMs (through their firmware update tool might have something similar, but you can just not use it).

replies(1): >>35881572 #
3. jonas-w ◴[] No.35881572[source]
Thanks for the clarification!