On Wed, Mar 11, 2015 at 2:22 AM, Tobias Hunger <tobias.hun...@gmail.com> wrote:
>> If you're concerned about bootloader configuration modification as a
>> threat vector, then it needs to go on an encrypted volume. This
>> suggests an initial bootloader configuration that only enables the
>> user to supply a passphrase/key file to unlock that volume, and then
>> load a new bootloader configuration file.
>
> I am still hoping secure boot and sd-boot will solve this issue
> mid-term by making sure all the early boot components are signed
> properly.

The bootloader configuration files aren't signed. Maybe the should be.
And maybe done away with in favor of dynamic discovery and "hot" keys
for indicating common boot options. Any general purpose solution
should account for degraded bootable raid, which means each ESP needs
to be identical. Either each ESP bootloader looks to a single location
on raid for configuration, or uses dynamic discovery, or some system
of sequentially updating each ESP needs to be devised.


-- 
Chris Murphy
_______________________________________________
systemd-devel mailing list
systemd-devel@lists.freedesktop.org
http://lists.freedesktop.org/mailman/listinfo/systemd-devel

Reply via email to