New System76 ACPI driver

System76, one of the few Linux-centric OEMs, has started to offer coreboot on some of their systems.

Apparently, the new System76 firmware includes a new ACPI table, though I can’t seem to find that table documented on the ACPI spec list (which appears to have been last updated Summer of 2019).

Add System76 ACPI driver, which adds support for Fn-Fx key combinations, keyboard backlight, and airplane mode LEDs on System76 laptops running open source firmware.

https://github.com/pop-os/system76-acpi-dkms

https://patchwork.kernel.org/patch/11180033/

http://git.infradead.org/linux-platform-drivers-x86.git/commitdiff/fd13c8622a5ad4f7317b64de4f6aa2de1962220e

https://lkml.org/lkml/2019/10/8/851

https://uefi.org/acpi_id_list

Intel Firmware Engine availability changes

Here’s some new text from the Intel Firmware Engine download page:


Intel® Firmware Engine Versions 5.00- 4.00 and corresponding Platform Installer Packages, which include Leaf Hill version 1.0 -1.1, MinnowBoard Turbot B21 Version 1.0 and Intel® Firmware Engine SDK Release 4.0, will no longer be available after August 31, 2019 and will not be supported with any additional functional, security, or other updates. All versions are provided as is. Intel recommends that users of Intel® Firmware Engine uninstall and discontinue use as soon as possible.

https://firmware.intel.com/learn/intel-firmware-engine/downloads

UEFI Forum: How to Create a Secure Development Lifecycle for Firmware

The slides and the video of this webinar are now available on-demand:

Click to access UEFI%20SDL%20Webinar_Final%20Slides%20-%20PDF.pdf

android-device-check: Check Android device security settings

Major checks:
build type (userdebug, user, eng)
signing keys
SELinux availability and mode
debugging-related properties
Bluetooth configuration
USB/ADB configuration
3G/telephony availability
enabled network interfaces
listening TCP services
ADB authentication
SUID binaries
AIDL services
disk encryption (FDE/FBE) availability
dm-verity availability and mode

https://github.com/nelenkov/android-device-check

QuarksLab: Analysis of Qualcomm Secure Boot Chains

Analysis of Qualcomm Secure Boot Chains

https://blog.quarkslab.com/analysis-of-qualcomm-secure-boot-chains.html

From March to September 2019, I had the pleasure to do a six-month internship at Quarkslab to study the boot chains produced by Qualcomm […]

ARM-X Firmware Emulation Framework

https://github.com/therealsaumil/armx/

https://armx.exploitlab.net/

Architecture

Microsoft Secured-core PC requirements

https://www.dell.com/en-us/shop/secured-core-pc/cp/secured-core-pc

https://www.microsoft.com/security/blog/2019/10/21/microsoft-and-partners-design-new-device-security-requirements-to-protect-against-targeted-firmware-attacks/

https://community.amd.com/community/amd-business/blog/2019/10/21/amd-and-microsoft-secured-core-pc

ChromeOS Verified Boot: DM Verity moving from SHA1 to SHA256

Chrome OS’s Verified Boot is being updated from SHA1 to SHA256.
(Hopefully Android’s Verified Boot is also being updated…)

Chromium Blog Chromium Blog: DM Verity Algorithm Change
One of the foundational security features of Chromebooks is Verified Boot, which protects our users from potentially malicious software being run on their devices. The last chain of verification in this process is to validate the integrity of the root file system (rootfs). This blog post describes a recent enhancement to this rootfs validation to increase the cryptographic strength against attackers. […]

https://blog.chromium.org/2019/10/dm-verity-algorithm-change.html

OpenPOWER boot security

I just noticed a two-part blog series from 3 authors on OpenPOWER security and Trusted Boot. Including a bit of comparision of Trusted Boot -vs- Secure Boot.

OpenPOWER secure and trusted boot,
Part 1: Using trusted boot on IBM OpenPOWER servers
By Dave Heller, Tim Block
Updated April 26, 2019 | Published February 17, 2017

https://developer.ibm.com/technologies/linux/articles/trusted-boot-openpower

OpenPower secure and trusted boot,
Part 2: Protecting system firmware with OpenPOWER secure boot
By Dave Heller, Nageswara Sastry
Updated April 29, 2019 | Published February 23, 2019

https://developer.ibm.com/technologies/linux/articles/protect-system-firmware-openpower

Amlogic HDMI Boot Dongle: “Boot from HDMI”?

https://github.com/superna9999/linux/wiki/Amlogic-HDMI-Boot-Dongle

System76 supporting coreboot

System76, one of the few Linux OEMs, is now offering coreboot as a firmware option:

I’m hoping System76 replies to this question: