[u-u] A question about boot

D. Hugh Redelmeier hugh at mimosa.com
Thu Jan 5 09:33:47 EST 2017


| From: David Collier-Brown <davec-b at rogers.com>

| Who can talk about (intel or arm) boot? I'm looking at a problem that can be
| solved by setting up a device at boot time and not letting the OS have the
| privilege or perhaps the physical ability to change it...

Not enough information for me to understand the constraints.

What's your threat model?  

- Are you scared of the OS, the user of the OS, or something else?

- Are you scared of random misbehaviour or an intentional attack

- Can you control physical access to all or part of the system?

What would enforce change prevention?  Some things come to mind:

- the device itself could be set in an unchangeable mode after setup

  + eg. a physical switch that latches until "reset" (but this becomes
    a recursive problem:  how to prevent the OS from resetting the
    device).

- security through obscurity: ability to change the device is hidden
  behind a secret handshake only known to the initiates.  We generally
  distrust this kind of approach.

- security through a layer of indirection that implements the
  protection policy that you require

  + put a little controller (Raspberry Pi?) between the device and the
    computer.  You would probably need physical protection of the device
    from the Bad Guys (an OS?  A bad operator?)

  + run the OS under a VM system that implements the policy.

  + Conventional PCs have a mysterious "SMM" that overrides anything
    that the OS thinks it can do.  It is part of the firmware commonly
    called the BIOS and isn't easily mucked with by mortals.  With a
    high enough budget, SMM might be a useful vector.

But maybe you already have a solution in mind, with some blank bits,
and haven't sketched this for us.


More information about the u-u mailing list