OpenWrt One / project update
Torsten Duwe
duwe at lst.de
Tue Apr 30 05:39:33 PDT 2024
On Mon, 29 Apr 2024 21:05:15 +0100
Daniel Golle <daniel at makrotopia.org> wrote:
> Hi Michael,
>
> On Mon, Apr 29, 2024 at 03:04:37PM -0400, Michael Richardson wrote:
> >
> > {sorry for the long delay, been unwell}
> >
> > Bjørn Mork <bjorn at mork.no> wrote:
> > > Maybe it is possible to deploy the system with secure boot
> > > and a protected IDevId key by default, but allowing the
> > > user/owner to erase the key and disable secure boot? This
> > > way all use cases could be supported, including playing with
> > > the BL2 code etc.
> >
> > It won't work that way. If someone can easily turn off secure
> > boot, then so can malware.
>
> Malware cannot remove or add a physical jumper or press a physical
> button on the board (we got a jumper to write-protect the SPI-NOR
> flash).
Correct, and IIRC a switch to choose which on-board flash to boot from?
This, plus the lockable boot block feature found in about all modern
flash chips is really all it takes to implement a really secure boot. It
is only a question of U-Boot patches, which can be 100% free and open
source software, absolutely no NDA required.
> Believing that secure boot could provide protection from malware also
> misses an important point: Most malware nowadays doesn't even strive
> for persistency but rather relies on exploitable run-time
> vulnerabilities. We are in an always-online world, the classic "boot
> sector virus" is an archaic thing from the 1980s.
Exactly. Thanks for the public reminder!
Torsten
More information about the openwrt-devel
mailing list