Security: Difference between revisions
(→Ideas) |
|||
Line 39: | Line 39: | ||
! SeaBIOS | ! SeaBIOS | ||
! Depthcharge | ! Depthcharge | ||
! Tianocore | |||
|- | |- | ||
! Password verification | ! Password verification | ||
Line 45: | Line 46: | ||
| No | | No | ||
| ? | | ? | ||
| | |||
|- | |- | ||
! Signature verification | ! Signature verification | ||
Line 51: | Line 53: | ||
| No | | No | ||
| style="background:lime" | Yes | | style="background:lime" | Yes | ||
| | |||
|- | |- | ||
! Can open encrypted partition | ! Can open encrypted partition | ||
Line 57: | Line 60: | ||
| No | | No | ||
| No | | No | ||
| | |||
|} | |} | ||
Revision as of 01:04, 17 January 2016
This page explains how coreboot can help with various security aspects of your system, compared to closed-source, legacy BIOS/EFI/firmware implementations.
Free software
Security fixes
Fixes can take months before being available on non-free firwmares, if you are lucky enough to have them. With free software boot fimrwares, security issues can be fixed, and in coreboot many are.
Examples:
Security fixes are usually mentioned in coreboot ChangeLog on the blog.
Coreboot
Note that while coreboot itself is free software, many boards still use blobs. Some however don't require any.
Auditable code
Because the boot firmware is the first code that executes on the main CPU, it's an interesting target for rootkits:
- The code that runs first has to load what runs next, so it can patch it. That patch can then in turn patch what's next and so on.
- The code that runs first can setup SMM. SMM is more powerful than ring0. non-free boot firmwares have a tendency to put a lot of code to run in SMM. In contrast coreboot keep it to a minimum.
Given the above, being able to know what your boot fimrware does is very important.
Reproducible builds
Coreboot is working on reproducible builds. That will permit to verify that a given binary corresponds to a given source code.
However this isn't sufficient to verify that you are running the right binary:
Dumping the flash chip externally is strongly advised for that, since some chipsets makes it too easy for the SMM code to give back (to flashrom) another binary than the one in the flash chip.
Existing security features
Given that, with coreboot, the hardware initialization is separated from the boot logic, many security features are implemented by payloads. Nevertheless, coreboot implement some security features.
Coreboot | GRUB | SeaBIOS | Depthcharge | Tianocore | |
---|---|---|---|---|---|
Password verification | No | Yes | No | ? | |
Signature verification | Yes | Yes | No | Yes | |
Can open encrypted partition | No | Yes | No | No |
Ideas
RAM wiping after each boot
This is not very useful: The most interesting time would be right before power-off, which could be implemented in SMM. Unfortunately a cautious attacker just pulls the plug.
To prevent reading data after a reboot, a payload could be adapted to clean out memory. Using applications that manage sensible data sensibly (ie. wipe after use) is still a better solution.
Current BIOS issues
RAM wiping
- http://citp.princeton.edu/memory/
- Coreinfo as demo payload for coreboot, showing your RAM contents after a cold boot.
SMI issues
- http://www.ssi.gouv.fr/fr/sciences/fichiers/lti/cansecwest2006-duflot.pdf
- http://tracker.coreboot.org/trac/coreboot/ticket/42
ATA issues
- http://coreboot.org/pipermail/coreboot/2005-May/011686.html
- http://www.heise.de/ct/english/05/08/172/
Firewire issues
- http://md.hudora.de/presentations/firewire/
- http://www.hermann-uwe.de/blog/physical-memory-attacks-via-firewire-dma-part-1-overview-and-mitigation