Re: GRUB trusted boot framework

2009-02-27 Thread Robert Millan
On Sun, Feb 22, 2009 at 02:27:25PM +0100, Jan Alsenz wrote: If we could agree on this, then I think we could find a way to extend the GRUB module system to fully allow this. From my point of view the minimal needed features for these systems are: - easy exchange of the MBR binary to be

Re: GRUB trusted boot framework

2009-02-23 Thread Jan Alsenz
phcoder wrote: Jan Alsenz wrote: phcoder wrote: Oh, I want! If I remember correctly, exactly this broke the protection on some game console! Do you refer to Xbox crack based on King kong game? For once their goal is the evil one. For second the problem is a buffer overflow in rendering

GRUB trusted boot framework

2009-02-22 Thread Jan Alsenz
Hello! Alright, lets try to end the pointless (in the sense, that I guess noone here, including myself, will change their opinion anytime soon) TPM discussion and get something done. First I'd say we can agree, that we don't agree on whether/how to use a TPM. I don't know about you, but I can

Re: GRUB trusted boot framework

2009-02-22 Thread phcoder
- hooks for any disk read (not sure if write is necessary) This way how trusted grub does it is an ad-hoc solution which results in a MESS. They just try to hash and rehash everything without design. So if grub is instructed to load all modules in a directory and filesystem is reindexed then

Re: GRUB trusted boot framework

2009-02-22 Thread Jan Alsenz
phcoder wrote: - hooks for any disk read (not sure if write is necessary) This way how trusted grub does it is an ad-hoc solution which results in a MESS. They just try to hash and rehash everything without design. So if grub is instructed to load all modules in a directory and filesystem is

Re: GRUB trusted boot framework

2009-02-22 Thread phcoder
Ok, but your already talking of a specific solution here. My conclusion would be: The hooks need to be able to determine the filename, that is currently read. And then also where it comes from but some files may have different filenames. IMO the solution work independently of the order of files

Re: GRUB trusted boot framework

2009-02-22 Thread Vesa Jääskeläinen
Hi All, Ok. Please keep the fighting of TPM out of this thread ;). Lets keep it to the topic first... (I am already waiting for summary of that other discussion at some point ;)) Jan Alsenz wrote: Next I think we can agree, that some sort of trusted boot chain can be useful. Also there

Re: GRUB trusted boot framework

2009-02-22 Thread Jan Alsenz
phcoder wrote: Ok, but your already talking of a specific solution here. My conclusion would be: The hooks need to be able to determine the filename, that is currently read. And then also where it comes from but some files may have different filenames. IMO the solution work independently of

Re: GRUB trusted boot framework

2009-02-22 Thread phcoder
Do you know if it is possible to determine where the files come from? Well it's possible looking at filename and root drive but it's not reliable (e.g. ata0 can be hd0 but also hd1, when we'll have network support it will be even less obvious. Actually it's something grub2's architecture is

Re: GRUB trusted boot framework

2009-02-22 Thread Jan Alsenz
Vesa Jääskeläinen write: Hi All, Ok. Please keep the fighting of TPM out of this thread ;). Lets keep it to the topic first... (I am already waiting for summary of that other discussion at some point ;)) Jan Alsenz wrote: Next I think we can agree, that some sort of trusted boot chain

Re: GRUB trusted boot framework

2009-02-22 Thread Vesa Jääskeläinen
Jan Alsenz wrote: Vesa Jääskeläinen write: I do like the idea what some protected systems use, they sign the binary (in our case .mod file and kernels of loaded OSes). Now in that scenario it is responsibility of the kernel module loader to first verify the signature for correctness. This way

Re: GRUB trusted boot framework

2009-02-22 Thread Jan Alsenz
Vesa Jääskeläinen wrote: Jan Alsenz wrote: Vesa Jääskeläinen write: I do like the idea what some protected systems use, they sign the binary (in our case .mod file and kernels of loaded OSes). Now in that scenario it is responsibility of the kernel module loader to first verify the signature

Re: GRUB trusted boot framework

2009-02-22 Thread Jan Alsenz
phcoder wrote: Oh, I want! If I remember correctly, exactly this broke the protection on some game console! Do you refer to Xbox crack based on King kong game? For once their goal is the evil one. For second the problem is a buffer overflow in rendering engine, not the not checking part. If

Re: GRUB trusted boot framework

2009-02-22 Thread phcoder
Jan Alsenz wrote: phcoder wrote: Oh, I want! If I remember correctly, exactly this broke the protection on some game console! Do you refer to Xbox crack based on King kong game? For once their goal is the evil one. For second the problem is a buffer overflow in rendering engine, not the not