Blog 8 in series: Digital Certificates – Models for Trust and Targets for Misuse
Issue #2: Validation of signed UEFI drivers and applications
https://blog.reversinglabs.com/blog/breaking-uefi-firmware-authenticode-security-model
Blog 8 in series: Digital Certificates – Models for Trust and Targets for Misuse
Issue #2: Validation of signed UEFI drivers and applications
https://blog.reversinglabs.com/blog/breaking-uefi-firmware-authenticode-security-model
System76, one of the few Linux-centric OEMs, has started to offer coreboot on some of their systems.
Apparently, the new System76 firmware includes a new ACPI table, though I can’t seem to find that table documented on the ACPI spec list (which appears to have been last updated Summer of 2019).
Add System76 ACPI driver, which adds support for Fn-Fx key combinations, keyboard backlight, and airplane mode LEDs on System76 laptops running open source firmware.
https://github.com/pop-os/system76-acpi-dkms
https://patchwork.kernel.org/patch/11180033/
https://lkml.org/lkml/2019/10/8/851
The DMTF has created a new Redfish Ansibile project:
I think this is the first time I’ve seen Rust code interacting with SMM:
Here’s some new text from the Intel Firmware Engine download page:
Intel® Firmware Engine Versions 5.00- 4.00 and corresponding Platform Installer Packages, which include Leaf Hill version 1.0 -1.1, MinnowBoard Turbot B21 Version 1.0 and Intel® Firmware Engine SDK Release 4.0, will no longer be available after August 31, 2019 and will not be supported with any additional functional, security, or other updates. All versions are provided as is. Intel recommends that users of Intel® Firmware Engine uninstall and discontinue use as soon as possible.
https://firmware.intel.com/learn/intel-firmware-engine/downloads
The slides and the video of this webinar are now available on-demand:
Click to access UEFI%20SDL%20Webinar_Final%20Slides%20-%20PDF.pdf
Apple users: be careful when doing Catalina updates, backup your data first: Ben of 9to5mac has reported some problems of Apple EFI firmware bricking some Apple systems running the latest macOS software:
Major checks:
build type (userdebug, user, eng)
signing keys
SELinux availability and mode
debugging-related properties
Bluetooth configuration
USB/ADB configuration
3G/telephony availability
enabled network interfaces
listening TCP services
ADB authentication
SUID binaries
AIDL services
disk encryption (FDE/FBE) availability
dm-verity availability and mode
Analysis of Qualcomm Secure Boot Chains
https://blog.quarkslab.com/analysis-of-qualcomm-secure-boot-chains.html
From March to September 2019, I had the pleasure to do a six-month internship at Quarkslab to study the boot chains produced by Qualcomm […]
Platform Security Summit conference has started uploading videos from their recent event. A few are up now, such as the XBox talk:
https://www.platformsecuritysummit.com/2019/speaker/chen/
Chrome OS’s Verified Boot is being updated from SHA1 to SHA256.
(Hopefully Android’s Verified Boot is also being updated…)
Chromium Blog Chromium Blog: DM Verity Algorithm Change
One of the foundational security features of Chromebooks is Verified Boot, which protects our users from potentially malicious software being run on their devices. The last chain of verification in this process is to validate the integrity of the root file system (rootfs). This blog post describes a recent enhancement to this rootfs validation to increase the cryptographic strength against attackers. […]
https://blog.chromium.org/2019/10/dm-verity-algorithm-change.html
I just noticed a two-part blog series from 3 authors on OpenPOWER security and Trusted Boot. Including a bit of comparision of Trusted Boot -vs- Secure Boot.
OpenPOWER secure and trusted boot,
Part 1: Using trusted boot on IBM OpenPOWER servers
By Dave Heller, Tim Block
Updated April 26, 2019 | Published February 17, 2017
https://developer.ibm.com/technologies/linux/articles/trusted-boot-openpower
OpenPower secure and trusted boot,
Part 2: Protecting system firmware with OpenPOWER secure boot
By Dave Heller, Nageswara Sastry
Updated April 29, 2019 | Published February 23, 2019
https://developer.ibm.com/technologies/linux/articles/protect-system-firmware-openpower
Currently contains 2 UEFI shell applications. Code only, no documentation yet:
1) imgwrite, a C program that writes a rom.bin in some manner.
2) pciextr, a Pascal program that appears to extract PCI expansion ROMs.
System76, one of the few Linux OEMs, is now offering coreboot as a firmware option:
I’m hoping System76 replies to this question:
Hastily-written news/info on the firmware security/development communities, sorry for the typos.
Hastily-written news/info on the firmware security/development communities, sorry for the typos.
Hastily-written news/info on the firmware security/development communities, sorry for the typos.
Hastily-written news/info on the firmware security/development communities, sorry for the typos.
Hastily-written news/info on the firmware security/development communities, sorry for the typos.
Hastily-written news/info on the firmware security/development communities, sorry for the typos.
Hastily-written news/info on the firmware security/development communities, sorry for the typos.
Hastily-written news/info on the firmware security/development communities, sorry for the typos.
Hastily-written news/info on the firmware security/development communities, sorry for the typos.
Hastily-written news/info on the firmware security/development communities, sorry for the typos.
Hastily-written news/info on the firmware security/development communities, sorry for the typos.
Hastily-written news/info on the firmware security/development communities, sorry for the typos.
Hastily-written news/info on the firmware security/development communities, sorry for the typos.
Hastily-written news/info on the firmware security/development communities, sorry for the typos.
Hastily-written news/info on the firmware security/development communities, sorry for the typos.
Hastily-written news/info on the firmware security/development communities, sorry for the typos.
Hastily-written news/info on the firmware security/development communities, sorry for the typos.
Hastily-written news/info on the firmware security/development communities, sorry for the typos.
Discover the Desktop
Hastily-written news/info on the firmware security/development communities, sorry for the typos.
Hastily-written news/info on the firmware security/development communities, sorry for the typos.
Hastily-written news/info on the firmware security/development communities, sorry for the typos.
Hastily-written news/info on the firmware security/development communities, sorry for the typos.
Hastily-written news/info on the firmware security/development communities, sorry for the typos.
Hastily-written news/info on the firmware security/development communities, sorry for the typos.
Hastily-written news/info on the firmware security/development communities, sorry for the typos.
Hastily-written news/info on the firmware security/development communities, sorry for the typos.
Hastily-written news/info on the firmware security/development communities, sorry for the typos.
Hastily-written news/info on the firmware security/development communities, sorry for the typos.
Hastily-written news/info on the firmware security/development communities, sorry for the typos.
Hastily-written news/info on the firmware security/development communities, sorry for the typos.
Hastily-written news/info on the firmware security/development communities, sorry for the typos.
Hastily-written news/info on the firmware security/development communities, sorry for the typos.
Hastily-written news/info on the firmware security/development communities, sorry for the typos.
Hastily-written news/info on the firmware security/development communities, sorry for the typos.
Hastily-written news/info on the firmware security/development communities, sorry for the typos.
Hastily-written news/info on the firmware security/development communities, sorry for the typos.
News from coreboot world
Hastily-written news/info on the firmware security/development communities, sorry for the typos.
Hastily-written news/info on the firmware security/development communities, sorry for the typos.
Just another WordPress.com site
Hastily-written news/info on the firmware security/development communities, sorry for the typos.
You must be logged in to post a comment.