> On 14. Oct 2017, at 16:26, Bryan C. Everly <br...@bceassociates.com> wrote:
> 
> Hi misc@,
> 
> In playing around with Libreboot and Coreboot, my belief that physical
> access to the hardware really ups an attacker’s ability to win against most
> security has been massively reinforced.  For example, someone with enough
> practice could take my Thinkpad T500 apart, force flash the BIOS (as I have
> been doing), reassemble it and put it back on my desk in ten to fifteen
> minutes (or maybe faster). The payload they flash could easily include a
> root kit and keylogger which would mitigate the advantage of Full Disk
> Encryption (because they could grab your passphrase keystrokes and send
> them off to the mother ship). So my happy little bubble that FDE would give
> me protection against all but a brute force attack has been popped.
> 
> Here’s my thought. What if we modified our boot code to do a hash of the
> BiOS and stored it persistently across boots?  Then we could compare it
> this time to the last value and take some action / issue some warning that
> something changed. It would be mildly annoying if you actually did just
> update your BIOS to a new version but that would be a small trade off in my
> mind at least.
> 
> The sticking point is this - where do you store the previous hash?  If we
> stored it outside of the FDE container, the attacker could just rewrite it
> on boot and we wouldn’t be able to detect a change. Put it inside the FDE
> and you would have to type your passphrase (sending it to the attacker) to
> read it.
> 
> So now to my ask - would a feature like this be of any interest to others?
> If so, any thoughts on how to securely persist the hash to solve the
> problem I describe above?
> 
> Thanks for any and all feedback.

Isn’t that something like Anti Evil Maid?
http://theinvisiblethings.blogspot.de/2011/09/anti-evil-maid.html?m=1


Niels

Reply via email to