Re: physical access, it seems not a technical problem. I.e. keep laptop with you, hire a guard, etc. I'm not very technical, but could the hash be stored in usb stick or online?
Maybe construct yourself a "computer safe" to make it harder for people to get access while you're away? I.e. increase the time/difficulty for them. On Tue, Oct 17, 2017 at 6:21 AM, flipchan <flipc...@riseup.net> wrote: > Hey I also run libreboot :) > > I have read research about signing all the components and then verifying > all that while you both , anyhow I think this would be very problematic > with the new karl implementation that has taken place in openbsd 6.2 > > On October 14, 2017 4:26:21 PM GMT+02:00, "Bryan C. Everly" < > br...@bceassociates.com> wrote: > >Hi misc@, > > > >In playing around with Libreboot and Coreboot, my belief that physical > >access to the hardware really ups an attacker’s ability to win against > >most > >security has been massively reinforced. For example, someone with > >enough > >practice could take my Thinkpad T500 apart, force flash the BIOS (as I > >have > >been doing), reassemble it and put it back on my desk in ten to fifteen > >minutes (or maybe faster). The payload they flash could easily include > >a > >root kit and keylogger which would mitigate the advantage of Full Disk > >Encryption (because they could grab your passphrase keystrokes and send > >them off to the mother ship). So my happy little bubble that FDE would > >give > >me protection against all but a brute force attack has been popped. > > > >Here’s my thought. What if we modified our boot code to do a hash of > >the > >BiOS and stored it persistently across boots? Then we could compare it > >this time to the last value and take some action / issue some warning > >that > >something changed. It would be mildly annoying if you actually did just > >update your BIOS to a new version but that would be a small trade off > >in my > >mind at least. > > > >The sticking point is this - where do you store the previous hash? If > >we > >stored it outside of the FDE container, the attacker could just rewrite > >it > >on boot and we wouldn’t be able to detect a change. Put it inside the > >FDE > >and you would have to type your passphrase (sending it to the attacker) > >to > >read it. > > > >So now to my ask - would a feature like this be of any interest to > >others? > >If so, any thoughts on how to securely persist the hash to solve the > >problem I describe above? > > > >Thanks for any and all feedback. > > > >-- > > > >Thanks, > >Bryan > > -- > Take Care Sincerely flipchan layerprox dev