GRUB2 security changes in Fedora

[…]Include Grub’s “verify,” “cryptodisk,” “luks” and <others here> modules in grubx64.efi of the ‘grub2-efi-x64’ package.  Users utilising secure boot functionality on the UEFI platform cannot insert modules that aren’t in grubx64.efi. Paradoxically, this means that security-conscious users cannot use grub’s verify module, or employ (near) full disk encryption using cryptodisk and luks. The security benefits of signature verification would reach more users if Fedora automated it by incorporating the process into grub2-mkconfig. For the long-term, to grant flexibility with grub2 modules on secure boot instances, it may be advisable to sign the .mod files in the ‘grub2-efi-x64-modules’ package, modify grub2-mkconfig (or -install) to copy the necessary modules into the EFI partition when required by the user’s configuration and then allow inserting of signed modules in secure boot instances.[…]

https://fedoraproject.org/wiki/Changes/Include_security_modules_in_efi_Grub2

https://www.phoronix.com/scan.php?page=news_item&px=GRUB2-New-EFI-Modules-For-F31

 

MAC address of targets of ASUS ShadowHammer attack

Re: https://firmwaresecurity.com/2019/03/26/asus-releases-diagnostic-tool-for-windows/

https://skylightcyber.com/2019/03/28/unleash-the-hash-shadowhammer-mac-list/

https://skylightcyber.com/2019/03/28/unleash-the-hash-shadowhammer-mac-list/list.txt

Positive Technologies: Intel VISA: Through the Rabbit Hole, slides available

Re:  https://firmwaresecurity.com/2018/12/19/positive-technologies-intel-visa-through-the-rabbit-hole/

Click to access bh-asia-Goryachy-Ermolov-Intel-Visa-Through-the-Rabbit-Hole.pdf

PoC||GTFO 0x19 released

https://www.alchemistowl.org/pocorgtfo/

Click to access pocorgtfo19.pdf

Open Source Firmware track at LinuxFestNorthWest 2019

LinuxFestNorthWest.org is the annual Linux conference for Washington state and the Pacific NorthWest area. This year, there’s an “Open Source Firmware” track, for the first time.

UEFI Boot for Mere Mortals
Why Open Source is Critical For Platform Firmware
Defending Out-of-Band Management Attacks
Network Boot in a Zero-Trust Environment
Open-Source Host Firmware Directions
The Fight for a Secure Linux BIOS… Past, Present and Future

https://www.linuxfestnorthwest.org/conferences/2019/schedule/events

https://www.linuxfestnorthwest.org/conferences/2019

LFNW logo

Spring 2019 UEFI Plugfest: schedule announced

State of the UEFI Forum
UEFI Self Certification Tests (UEFI-SCT) and Firmware Test Suite (FWTS)
UEFI Updates and Open Source Firmware evolutions on Arm
10:30 Risks to UEFI firmware due to growing attack surfaces
From Runtime to Compile Time: Improving ASL Through Enhanced Namespace Resolution
Microsoft UEFI Update
Hardening Firmware Components with Host-based Analysis
Half Duplex controller support and Multi IO support in SPI framework
Improving UEFI Network Stack Performance
Case Study: Removing SMM from Intel Platforms
Support Secure UEFI and OPTEE OS together on Arm
Role Modeling Open Source Best Practices in Firmware
Using Capsules for Firmware Configuration Update
UEFI topics for the manufacturing efficiency/second half hour of lunch
How Writing Portable UEFI Drivers Improves Reliability (and Helps Me)
Redfish Implementation for UEFI
Redfish Host Interface: UEFI and OS implications

https://uefi.org/node/3925

Click to access 2019%20Spring%20Schedule%2027March%202019%20final.pdf

Google: Mitigating risk in the hardware supply chain

Google has a new blog post talking about supply-chain security and their Titan chip.

[…]One area where we’ve put a lot of thought, and which we continue to focus on, is the security of our hardware supply chain. Today, I’d like to go into a few of the things we do specifically in this area.[…]

https://cloud.google.com/blog/products/identity-security/mitigating-risk-in-the-hardware-supply-chain

titan-327ow.PNG

 

bcdedit-revert-uefi-gpt-boot-order: Powershell script to modify the UEFI/GPT boot order

This powershell script modifies the UEFI/GPT boot order by finding the first non-Windows entry and moving it to the top of the order. When using UEFI+GPT, the Windows installation (since Windows 7?) creates its own boot device entry (“Windows Boot Manager”, a.k.a. “{bootmgr}”) in the UEFI/GPT boot order list and, obnoxiously, takes the liberty of moving said entry to the top of the list. Under most circumstances, this is fine, and probably desirable. However for systems used for repeated deployment testing, or systems which you want a different bootloader to take priority (such as dual-boot systems, or computer lab systems that can be remotely re-imaged), this is a show stopper. So I needed a way to do this programmatically. This script makes use of the arcane and undocumented {fwbootmgr} identifier implemented by bcdedit to find the first non-Windows boot device entry in the UEFI/GPT boot order list and move it to the top of the list.

https://github.com/mmseng/bcdedit-revert-uefi-gpt-boot-order

Automating Firmware Security with FwAnalyzer

Looking forward to seeing what FwAnalyzer is about!!

by Collin Mulliner – Cruise Automation

Modern devices are complex and their firmware often consists of multiple parts that together make up the software stack of the product. Securing firmware is a lot of work and even basic issues can cause a lot of pain in the long run. Firmware changes over time and is built for different purposes such as development, testing, and production. Simple but bad changes can have a huge effect if put into production catching those changes before shipping or even during development can prevent a lot of issues.
This talk is about FwAnalyzer, a tool to analyze filesystem images for security issues. Analysis is based on configurable rules that model things such as file ownership, permissions, and file content. FwAnalyzer further provides a data extraction engine that is used to gather information from a filesystem and make it accessible via its machine readable report. Overall FwAnalyzer is built to be used by experts for security analysis of existing firmware and for integrating it into the build pipeline to provide direct feedback during development. The talk is based on our experience of dealing with firmware for Linux-based devices built in-house and developed by 3rd parties.

https://qct-qualcomm.secure.force.com/QCTConference/GenericSitePage?eventname=SecuritySummit&page=Summit+Schedule

NoStarch: Rootkits and Bootkits has shipped to the printer

We’ve been waiting for this book for a while!

https://bootkits.io/

Rootkits and Bootkits: all chapters now available in Early Access (~600 p)

Rootkits and Bootkits: new chapter available

Rootkits and Bootkits book update

No Starch Press: Rootkits and Bootkits

Linux Foundation adopts the LVFS Project

Re: https://firmwaresecurity.com/2018/09/08/linux-foundation-taking-over-linux-vendor-firmware-service-lvms/

The Linux Foundation welcomes the Linux Vendor Firmware Service (LVFS) as a new project. LVFS is a secure website that allows hardware vendors to upload firmware updates. It’s used by all major Linux distributions to provide metadata for clients, such as fwupdmgr, GNOME Software and KDE Discover. To learn more about the project’s history and goals, we talked with Richard Hughes, upstream maintainer of LVFS and Principal Software Engineer at Red Hat.[…]

https://www.linuxfoundation.org/blog/2019/03/lvfs-project-announcement/
https://www.linux.com/news/linux-foundation-welcomes-lvfs-project

see-also:
https://github.com/hughsie/fwupd
https://fwupd.org/lvfs/devicelist

ASUS releases diagnostic tool for Windows

Re: https://firmwaresecurity.com/2019/03/25/asus-live-update-utility-security-issues/

https://www.us-cert.gov/ncas/current-activity/2019/03/26/ASUS-Releases-Security-Update-Live-Update-Software

https://www.asus.com/News/hqfgVUyZ6uyAyJe1

[…]Additionally, we have created an online security diagnostic tool to check for affected systems, and we encourage users who are still concerned to run it as a precaution. The tool can be found:
https://dlcdnets.asus.com/pub/ASUS/nb/Apps_for_Win10/ASUSDiagnosticTool/ASDT_v1.0.1.0.zip

 

Airbus Security Lab: Riding the lightning iLO BMC security wrap-up

By: Fabien Perigaud, Alexandre Gazet & Joffrey Czarny

https://airbus-seclab.github.io/

https://insomnihack.ch/conferences/

Click to access INSOMNIHACK2019-Slides-Riding_the_lightning_iLO4_5_BMC_security_wrapup-perigaud-gazet-czarny.pdf

 

See-also: The artwork depicts an electric chair on a dark and ominous background being struck by lightning flowing from Metallica's pointed logo on top. The title is written in smaller white capital letters at the bottom.

ASUS Live Update Utility: security issues

A threat actor modified the ASUS Live Update Utility, which delivers BIOS, UEFI, and software updates to ASUS laptops and desktops, added a back door to the utility, and then distributed it to users through official channels.[…]

ShadowHammer: Malicious updates for ASUS laptops

ASUS Live Update has been having some firmware security issues for a while, see: https://firmwaresecurity.com/2016/06/05/asus-liveupdate-of-uefi-sent-authenticated/