this post was submitted on 27 Aug 2024
69 points (98.6% liked)
Linux
48178 readers
1541 users here now
From Wikipedia, the free encyclopedia
Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).
Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.
Rules
- Posts must be relevant to operating systems running the Linux kernel. GNU/Linux or otherwise.
- No misinformation
- No NSFW content
- No hate speech, bigotry, etc
Related Communities
Community icon by Alpár-Etele Méder, licensed under CC BY 3.0
founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
No point in putting locks on your house, because an attacker can just drive their car through your front door.
The attacks you mention have their own ways of being detected: usually eyeballs. But eyeballs can't help you against something hiding in your bootloader. So Secure Boot was made.
And I don't really follow your dual boot claim. If you don't trust one of the OSes, and you boot it up on your hw, you're already hosed. At that point it can backdoor your bootloader and compromise your other OS. Secure Boot prevents malicious OSes from being booted, it can't help you if you willingly boot a malicious OS.
Okay, so my original post I think I was thinking of TPM rather than Secure Boot. TPM would protect against a hostile OS, I think. I think most of my greviences mentioned above are to do with TPM rather than Secure Boot. But they still apply to either.
There are ways to put keyloggers in devices stealthily to where they're not perceptible to a normal person. For example, they could replace one of the USB leads in your bag with one that transmits keystrokes over bluetooth. If you're at home, a maid could just plug a keylogger behind your desktop because most people don't check behind their system when they boot it.
It all feels like a wierd threat model to me. You can either assume that physical access is or isn't covered by it. If you are worried about physical access (beyond your device being stolen), there is a lot more you need to do to secure it. "It's better than nothing" isn't really that convincing to me with regards security models; either you're protected or you aren't.
I'm actually not sure what TPM can guard against, but I think you're right, I think if a malicious OS borked with the bootloader, TPM would catch it and complain before you decrypt the other OS.
Yeah, physical access usually means all bets are off, but you still lock your doors even though a hammer through a window easily circumvents it. Because you don't know what the attacker is willing to do/capable of. If you only ever check for physical devices, you'll miss the attack in software, similarly if you only rely on Secure Boot you'll miss any hardware based attacks. It's there as a tool to plug one attack vector.
Also, my guess is the most common thing this protects against are stupid employees plugging a USB they found in the parking lot into their PC. If they do it while the OS is running, IT can have a policy that blocks it from taking action. But if they leave it there during a reboot, IT is otherwise helpless.