Improving Platform Security With UEFI Secure Boot And UEFI Variables

8m ago
10 Views
1 Downloads
692.24 KB
20 Pages
Last View : Today
Last Download : 3m ago
Upload by : Bennett Almond
Transcription

presented by Improving Platform Security with UEFI Secure Boot and UEFI Variables UEFI Spring Plugfest – March 29-31, 2016 Presented by David Chen (Insyde Software) Updated 2011-06-01 UEFI Plugfest – March 2016 www.uefi.org 1

Agenda UEFI Plugfest – March 2016 Introduction UEFI Variables New Secure Boot Model Call For Action www.uefi.org 2

Introduction UEFI Plugfest – March 2016 www.uefi.org 3

Variables may be attacked POST RT VarA VarB UEFI Plugfest – March 2016 www.uefi.org 4

Current Secure Boot Model User Mode Setup Mode Enroll PKpub PKpub NULL SetupMode 1 SecureBoot 0 1. Delete PKpub 2. Platform-Specific PKpub Clear Secure Boot Ready To Go Secure Boot Off UEFI Plugfest – March 2016 PKpub ! NULL SetupMode 0 SecureBoot 1 www.uefi.org 5

UEFI Variables UEFI Plugfest – March 2016 www.uefi.org 6

Protect the Variables Set Variable without RT attribute BS RT BS Variable Lock Critical Variables UEFI Plugfest – March 2016 www.uefi.org 7

UEFI Secure Boot Database 2.3.1 db Update Enable 2.4 If signed by key in dbt, dbt Check cert’s timestamp! Update Enable 2.5 Update Enable If signed by key in dbr, dbr loader can Run for recovery! 2.3.1 2.3.1 2.3.1 PK KEK Update Enable If signed by key in db, driver/loader can Run! dbx If signed by key in dbx, driver/loader forbidden! Update Enable UEFI Plugfest – March 2016 www.uefi.org 8

Scenario to use dbt Before UEFI Specification v2.4 KeyPriv Images (signed earlier) dbx If signed by key in dbr, loader can Run for recovery! Images (signed later) Certification UEFI Plugfest – March 2016 www.uefi.org 9

Scenario to use dbt After UEFI Specification v.2.4 KeyPriv Images (signed earlier) dbt Images (signed later) Certification UEFI Plugfest – March 2016 www.uefi.org 10

UEFI Variables Secure Boot Modes UEFI Plugfest – March 2016 SetupMode 2.3.1 AuditMode 2.5 DeployedMode 2.5 www.uefi.org 11

New Secure Boot Model UEFI Plugfest – March 2016 www.uefi.org 12

Why Audit/Deployed Mode? Customers (ex: data center, government, etc.) have different requirement for secure boot database. But the Secure Boot Database isn’t easy to be customized with the old model! UEFI Plugfest – March 2016 www.uefi.org 13

Audit Mode User Mode PKpub ! NULL AuditMode 0 (RW) SetupMode 0 SecureBoot 1 Log more info to IEIT Audit Mode Set AuditMode to1 1. Delete PKpub 2. Platform-Specific PKpub Clear Enroll PKpub PKpub NULL AuditMode 0 (RW) SetupMode 1 SecureBoot 0 UEFI Plugfest – March 2016 www.uefi.org PKpub NULL AuditMode 1 (RO) SetupMode 1 SecureBoot 0 14

Deployed Mode PKpub ! NULL AuditMode 0 (RO) DeployedMode 1 (RO) SetupMode 0 SecureBoot 1 Platform-Specific DeployedMode Clear Set DeployedMode to1 User Mode 1. Delete PKpub 2. Platform-Specific PKpub Clear Setup Mode PKpub ! NULL AuditMode 0 (RW) DeployedMode 0 (RW) SetupMode 0 SecureBoot 1 Deployed Mode Enroll PKpub Enroll PKpub PKpub NULL AuditMode 0 (RW) DeployedMode 0 (RO) SetupMode 1 Set AuditMode to1 SecureBoot 0 PKpub NULL AuditMode 1 (RO) DeployedMode 0 (RO) SetupMode 1 SecureBoot 0 Audit Mode UEFI Plugfest – March 2016 www.uefi.org 15

Call For Action UEFI Plugfest – March 2016 www.uefi.org 16

Call For Action Critical variables need to be protected Customers need more flexible customized secure boot databases Update your spec to adopt new secure implementation to enhance your platform’s security UEFI Plugfest – March 2016 www.uefi.org 17

Thanks for attending the UEFI Spring Plugfest 2016 For more information on the Unified EFI Forum and UEFI Specifications, visit http://www.uefi.org presented by UEFI Plugfest – March 2016 www.uefi.org 18

Backup UEFI Plugfest – March 2016 www.uefi.org 19

UEFI Variables Secure Boot Databases 2.3.1 2.3.1 2.3.1 Platform Key (PK) Key Exchange Key Database (KEK) Secure Boot Signature Database (db) Secure Boot Blacklist Signature Database (dbx) 2.4 Secure Boot Timestamp Signature Database (dbt) 2.5 Secure Boot Authorized Recovery Signature Database (dbr) 2.3.1 UEFI Plugfest – March 2016 www.uefi.org 20

Secure Boot Databases Platform Key (PK) Key Exchange Key Database (KEK) Secure Boot Signature Database (db) Secure Boot Blacklist Signature Database (dbx) Secure Boot Timestamp Signature Database (dbt) Secure Boot Authorized Recovery Signature Database (dbr) UEFI Plugfest -March 2016 www.uefi.org 20 2.3.1 2.3.1 2.5 2.4 .

Related Documents:

UEFI Driver Writer’s Guide UEFI Driver Development Guides Documentation EFI Development Kit (EDK II) Open Source UEFI Development Kit (UDK2010) UEFI Self Certification Test (SCT) UEFI 2.3.1 Developer Platforms & Debug Tools UEFI Driver Wizard Development UEFI Plugfest – February 2012 www.uefi.org 16

UEFI Capsule Publish UEFI Capsule Distribute UEFI Capsule Process UEFI Capsule Linux* Vendor Firmware . Run Time (RT)? OS-Present App Final OS Environment Final OS Boot Loader OS-Absent App Transient OS . using configuration data and small libraries.

configurations: UEFI Mode and Legacy BIOS Mode. Certain boot options described in this guide require that you select a specific boot mode. By default, the boot mode is set to UEFI Mode. The system must boot in UEFI Mode to use the following options: Secure Boot, UEFI Optimized Boot, Generic USB Boot, IPv6 PXE Boot, iSCSI Boot, and Boot from URL

Consistent Configuration Infrastructure. The UEFI spec defines a methodology of describing the platform configuring data in a standard way. The rendering of the data is left to the platform vendor. This allows UEFI to bring all the platform configurations like BIOS, Storage and Network options under a

Requirements You are an system administrator, or a systems-level security researcher. You know architectural fundamentals of: Intel hardware, IBM PC BIOS/OpROM firmware, and UEFI firmware - This isn't an introduction to UEFI. You can use a shell (bash, cmd.exe) and write scripts (batch files) for them. You can use Python to run scripts. Optional: Python, C, and C programming language skills to

UEFI (Not!BIOS) Extensible Firmware Interface Specification (Not!OS) Pre-boot code (Not!Uboot) EDK II based platform firmware Option ROM (Not!UEFI) Legacy 16-bit executable blob rather than UEFI Driver (Not!BIOS) Vendor code loaded from device flash (Not!PlatformFlash) Expansion ROM BAR or flash on peripheral devices 22

UEFI Driver Signing Adds policy around UEFI and its 3 rd party image extensibility – Admixture of OS loaders, apps, and drivers in system – Gives IT control around these executables – Detects/prevents malware Technology includes – Supports “known-good” and “known-bad” signature databases – Policy-based updates to list

AGMA and/or DIN standards IMPERIAL Series Load Rating Drum Capacity METRIC Series Power Supply Line Speed Clutch Load Rating Drum Capacity Power Supply Line Speed Clutch PERFORMANCE 4WS9M18 4WS16M20 4WS26M26 4WS1M6 4WS3M10 4WS6M12 10,000 lbs 16,000 lbs 26,200 lbs 1,500 lbs 3,700 lbs 6,400 lbs 5–10 hp 7.5–15 hp 10–25 hp.5–1.5 hp 1–3 hp .