-
-
Notifications
You must be signed in to change notification settings - Fork 187
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Heads/Coreboot specific work # #605
Comments
We will scope that out. Let me come back to you. Regarding Intel TXT @marmarek any input? |
We need to discuss the security model with flash chip. |
@zaolin I'm ready! |
AEM in its current form is about boot integrity (xen.gz, vmlinuz, initramfs) only. It is doing that through TXT/DTRM. Heads provide very similar assurance with SRTM + a more convenient verification method (NitroKey with green/red LED or dynamic TOTP). We don't have other usage for TXT in Qubes right now. There are some wild ideas about doing re-attestation after S3, but I think it isn't even properly designed yet. |
@marmarek @zaolin |
Not sure if that's what you mean, but in case it is, this is my view: vboot "RO" and heads will lock the flash (even if we don't yet do that now. should be an easy addition). |
@merge Yes but updates rely then on heads |
sure. just as they do already I guess. |
Yes. The updates should come from Heads reproducible builds anyway and are updatable from whiptail menus already. The user puts a reproducible rom on a usb disk, go to Heads settings menu, selects the flash rom update, and decides if he wants to wipe the currently added cbfs files in its current rom or not. Keeping current configuration (user modified /etc/config overrides and public gpg key) are exported from cbfs regions prior to be reinjected in rom and then flashed back into spi with flashrom. Reflashing modifies measurements and requires the user to seal those in the TPM/Librem Key and reseal a new disk unlock key depending of current board configurations. |
The general goal here is to broader the range of FSP free, neutralized+deactivated Intel ME (and PSP absent) boards supported under Heads umbrella, while taking advantage of coreboot's measured boot support available through VBOOT work merged under coreboot 4.9+. Heads currently uses an in-house measured boot support based on coreboot (4.8.1). Upon completion, it is expected that the following boards will be supported under Heads with latest coreboot. First importance:
Second importance:
General
coreboot 4.8.1 specifics
Tickets needing to be updated/closed with the work being done here: |
"Also, keep in mind assembly is a lot more work for the t530, you have to solder a wire to the opposite chip your flashing every single time and so on to bypass flash protection (cs to vcc)" |
Heads/Coreboot specific work
@zaolin
[Support TXT in Coreboot/Heads, so that QubesOS Anti-Evil Maid can be used with coreboot Open Source Firmware](Explore QubesOS AEM usb boot #502). @marmarek said this was not considered a necessity. A discussion should be engaged between you two before going forward.(see here)Originally posted by @tlaurion in #540 (comment)
The text was updated successfully, but these errors were encountered: