Skip to content

Secure boot support #4371

@jasperweiss

Description

@jasperweiss

According the secure boot specification, users can enroll their own keys for secure boot.
If the QOS bootloader were signed, users could manually enroll the signing key within the UEFI. That would be a better anti evil maid system since it doesn't require the use of potentially untrusted USB keys.

Since dom0 doesn't contain any 3rd party applications, we can enforce code signing on anything that runs within it.

This blog post mentions secure boot being problematic due to running CA's etc but providing the user with a public key they can enroll manually would be doable.

Edit: I'm aware the developers are generally not very fond of secure boot. Could anyone explain why?
Alternatively a TPM could be used to unseal the drive encryption key.

Pre-OS firmware components are hashed (measured)
Measurements are initiated by startup firmware (Static CRTM)
Measurements are stored in a secure location (TPM PCRs)
Secrets (encryption keys) are encrypted by the TPM and bounded to
PCR measurements (sealed)
Can only be decrypted (unsealed) with same PCR measurements
stored in the TPM
This chain guarantees that firmware hasn’t been tampered with

Sub-issues

Metadata

Metadata

Assignees

No one assigned

    Labels

    C: bootThis issue pertains to boot-related issues in Qubes OS (e.g., system failing to boot).P: defaultPriority: default. Default priority for new issues, to be replaced given sufficient information.meta-issueThis issue serves to collect and organize a group of other issues.securityThis issue pertains to the security of Qubes OS.

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions