2009/2/19 phcoder <phco...@gmail.com>:
> First of all your system is still totally vulnerable to emanation and power
> analysis or hw tampering. By reflashing bios one can bypass all tpm
> protections (don't say it's difficult because it's closed source and so on.
> Look at all closed source obfuscations/pseudo-protections that get cracked
> every day)

This is interesting. I have not thought about the way the BIOS is
protected from tampering. You can probably read the BIOS and verify
the signature with the TPM chip but there is nothing that can attest
the machine actually used this BIOS for booting.

Since the BIOS is not stored in the TPM chip and must be able to reset
the TPM  chip into a good state at least when the power is removed
from the board it must be possible to not use the BIOS at all and
leave the TPM chip in good or resettable state.

The hard part is initializing the hardware without the use of the
original BIOS - the specifics of initializing various chips are not
public, and probably depend on companion hardware and/or trace length
on the particular board as well.


Thanks

Michal


_______________________________________________
Grub-devel mailing list
Grub-devel@gnu.org
http://lists.gnu.org/mailman/listinfo/grub-devel

Reply via email to