Overview
Syllabus
Intro
Security of the boot chain is vital
UEFI Secure Boot
No way to prove verification happened
Compromised servers
Modified laptops
Can't protect against hardware attacks
Trusted Platform Module
Small chip
Platform Configuration Registers
Trusted GRUB
Traditional approach
Unimportant configuration changes alter values
Use the logfile
Log entry contains description of binary and hash of binary
Log entry contains text and hash of text
Policy describes regular expressions
Coreos builds policy automatically on OS release
Use UEFI variables
Disk encryption keys
No secure boot support
Incompatible with runtime UEFI
Ship bootloader support Ship known-good measurements Integration with firmware updates Deterministic initramfs generation
Taught by
Linux Foundation