On 7/6/2021 8:57 AM, Jan Kiszka wrote:
On 04.07.21 11:03, Cedric Hombourger wrote:
Our concept is twofold: (1) use SecureBoot to make sure we are booted
from a trusted boot-loader + trusted Linux kernel (both are signed with
keys loaded into the trust store) (2) extend the root of trust by
mounting a LUKS encrypted volume with the key in the TPM and sealed with
selected PCRs. In an A/B scheme, we may have the same encryption key
placed both in slot[A] and slot[B] but sealed as follows:
I do get the point of using measurements to keep the platform open for
non-secure boots but protect the secretes to define boot chains. But I
do not get the use case of booting only well-defined secure images and
then additionally measuring them on top to unlock secrets. What's the
added value? The downside is the need to maintain the measuring values
in addition, right?

Our concept is kind of similar to Microsoft's BitLocker

They use SecureBoot to make sure you only boot something they have signed

They use MeasuredBoot and place all measurements of their boot components into PCR[7] where the BitLocker key is sealed against PCR[7] (they don't seem to bother tracking which boot component was tampered since a single PCR is used while they most likely have multiple boot components)

See https://docs.microsoft.com/en-us/windows-hardware/test/hlk/testref/trusted-execution-environment-efi-protocol and https://docs.microsoft.com/en-us/windows-hardware/design/device-experiences/oem-bitlocker

In their case, they seem to suspend BitLocker when they apply firmware updates

In our case, we have an A/B scheme and use different non-volatile slots in the TPM for each system (A/B) to store our encryption key. We have them sealed against PCR measurements of their respective boot components.

Once we have our LUKS volumes mounted, we also poisoned PCRs that were used to seal our secret

Does that help?

We can certainly have a discussion if more clarifications are needed or if you feel we could achieve something somewhat similar by some other means

Cedric


Jan


--
You received this message because you are subscribed to the Google Groups "EFI Boot 
Guard" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/efibootguard-dev/5e00f908-b57d-3fbb-3ffd-3fe3222cc641%40mentor.com.

Reply via email to