Would it make the most sense to put locking option in coreboot's
board-specific code, since the method varies between boards? Could a common
ACPI call for it be provided that could be called by a payload or OS later
if it's present?

-Matt


On Sun, Feb 17, 2019 at 8:48 PM Frank Beuth <[email protected]> wrote:

> On Sun, Feb 17, 2019 at 12:24:38PM +0100, Nico Huber wrote:
> >I'm not sure if I quite follow. You mean the locking that prevents you
> >from installing a retrofitted coreboot? That's not a lock that prevents
> >malware from anything (because of existing exploits). There are ways to
> >install coreboot on such systems without external programmer. It's just
> >sometimes a very uncomfortable, hacky way and if it fails you'll need an
> >external programmer anyway. But nothing is too uncomfortable for crimi-
> >nals. They just have to figure it out once and then profit per every-
> >body's unit (not just there own unit).
>
> I see, this explains a lot and goes a long way to resolving the original
> issue
> ("installing Coreboot makes me less secure because it enables software
> reflashing").
>
> > [Coreboot] offers only
> >locking options that make sense in certain use cases.
>
> Most of the locking options that have been discussed in this thread so far
> are
> rather hacky (often requiring writing new code) and not part of any
> Coreboot or related (e.g SeaBIOS) software package.
>
> For Coreboot and related packages, you previously mentioned
> LOCK_SPI_FLASH_RO
> and some unspecified locking options in the FILO payload. Are there any
> others?
> _______________________________________________
> coreboot mailing list -- [email protected]
> To unsubscribe send an email to [email protected]
>
_______________________________________________
coreboot mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to