Towards Measured Boot Out of the Box
Offered By: Linux Foundation via YouTube
Course Description
Overview
Syllabus
Intro
Security of the boot chain is vital
UEFI Secure Boot
No way to prove verification happened
Compromised servers
Modified laptops
Can't protect against hardware attacks
Trusted Platform Module
Small chip
Platform Configuration Registers
Trusted GRUB
Traditional approach
Unimportant configuration changes alter values
Use the logfile
Log entry contains description of binary and hash of binary
Log entry contains text and hash of text
Policy describes regular expressions
Coreos builds policy automatically on OS release
Use UEFI variables
Disk encryption keys
No secure boot support
Incompatible with runtime UEFI
Ship bootloader support Ship known-good measurements Integration with firmware updates Deterministic initramfs generation
Taught by
Linux Foundation
Tags
Related Courses
TPM-FAIL - TPM Meetings Timing and Lattice AttacksTheIACR via YouTube Look at ME! - Intel ME Investigation
media.ccc.de via YouTube Hacking With a TPM
media.ccc.de via YouTube What Is Needed to Build Trusted Infrastructures
Red Hat via YouTube Keylime - An Open Source TPM Project for Remote Trust
Linux Foundation via YouTube