Главная
Study mode:
on
1
Intro
2
Security of the boot chain is vital
3
UEFI Secure Boot
4
No way to prove verification happened
5
Compromised servers
6
Modified laptops
7
Can't protect against hardware attacks
8
Trusted Platform Module
9
Small chip
10
Platform Configuration Registers
11
Trusted GRUB
12
Traditional approach
13
Unimportant configuration changes alter values
14
Use the logfile
15
Log entry contains description of binary and hash of binary
16
Log entry contains text and hash of text
17
Policy describes regular expressions
18
Coreos builds policy automatically on OS release
19
Use UEFI variables
20
Disk encryption keys
21
No secure boot support
22
Incompatible with runtime UEFI
23
Ship bootloader support Ship known-good measurements Integration with firmware updates Deterministic initramfs generation
Description:
Explore the critical importance of measured boot in Linux distributions and learn why mainstream adoption has been lacking in this 39-minute conference talk by Matthew Garrett from CoreOS. Delve into the reasons behind the slow adoption, the pressing need for improvement, and the necessary steps to achieve better security. Discover how traditional measurement models fall short and how fine-grained, reproducible measurement can be implemented. Gain insights into innovative uses of Trusted Platform Modules (TPMs) for enhancing overall system quality. Learn about additional measures distributions can take to simplify trusted boot deployment for users. Examine topics such as UEFI Secure Boot, compromised servers, hardware attacks, and the role of Platform Configuration Registers. Understand the benefits of using logfiles, policy descriptions, and UEFI variables in improving boot chain security.

Towards Measured Boot Out of the Box

Linux Foundation
Add to list
0:00 / 0:00