December 25, 2019

213 words 1 min read

Making Trusted Boot Practical on Linux

Making Trusted Boot Practical on Linux

TPMs can be used to record the state of the boot process, and that information can in turn be used to restrict access to secrets (such as disk encryption keys) in order to protect them against a compr …

Talk Title Making Trusted Boot Practical on Linux
Speakers Matthew Garrett (Staff Security Developer, Google)
Conference Open Source Summit Europe
Conf Tag
Location Prague, Czech Republic
Date Oct 21-27, 2017
URL Talk Page
Slides Talk Slides
Video

TPMs can be used to record the state of the boot process, and that information can in turn be used to restrict access to secrets (such as disk encryption keys) in order to protect them against a compromised boot environment. Unfortunately this is easier said than done in Linux environments, as kernels are updated frequently and ramdisks are generated at install time. Keeping track of the expected values and ensuring that secrets aren’t locked away from users becomes massively more difficult. Thankfully, there is hope. A Microsoft-authored specification combines UEFI Secure Boot with TPM-based measured boot to reduce the number of individual measurements, making the problem much simpler. But the initramfs remains a problem. This presentation will cover the use of PCR 7 to provide TPM-based security without fragility, and propose solutions for handling trustworthy initramfs images.

comments powered by Disqus