-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Hi,
There's a couple of Anti Evil Maid improvements[0] that might hit
current-testing soon. The most interesting of these:
1. Automated resealing
Basically, you save your text secret to
/var/lib/anti-evil-maid/aem/secret.txt and/or your graphical secret to
/var/lib/anti-evil-maid/aem/secret.png. Then the init scripts will
take care of resealing if necessary, using the recommended PCRs as
configured in /etc/anti-evil-maid.conf[1].
"aem" above actually refers to your device label, so you can manage
multiple devices: See the new anti-evil-maid-install usage message[2].
2. Prevention of another attack
External AEM devices (not within physical reach of an attacker) have the
advantage that we don't need to mount an untrusted filesystem containing
the sealed secrets in dom0. But the unseal script didn't actually check
that only one fs with an AEM label was present: Similarly to QSB #21[3],
an attacker could create their own malicious fs (e.g. on the main
storage drive), use a hypothetical exploit against some Linux fs driver
to gain code execution, mount the real AEM fs, and finally continue
unsealing just fine. This has been fixed[4].
3. Compatibility with portable installations
Your TPM's identity (its public endorsement key) is queried and the
trousers data files and sealed secrets are bound to it.
4. No more $GRUB_CMDLINE_AEM_FLAGS needed
rd.antievilmaid.asksrkpass, rd.antievilmaid.png_secret, and
rd.antievilmaid.dontforcestickremoval are all gone, detected
automatically.
In other news: Everything's horrible, SMM rootkits are on Github now[5].
But it might take a few months for these to trickle down to the lowest
of adversaries, maybe? In this interregnum where AEM can't really do
a whole lot anymore, but nothing better is available yet, why not
collect some best practices against casual physical attacks:
- - It's getting pretty damn realistic for an attacker able to run
privileged code, e.g. by booting from a custom medium, to backdoor your
BIOS without tripping Intel TXT, so you should probably set a per-boot
BIOS password (not only a supervisor BIOS password). And never boot an
OS trusted less than Qubes...
- - microSD cards make nice AEM devices (if you're lucky enough to have
a system which can boot from them) because they're tiny and compatible
with rd.qubes.hide_all_usb. Or, even better: Always take your whole
SSD drive with you, to also prevent attacks against dom0 partition
table parsers.
- - <your idea here>
Rusty
[0]
https://github.com/QubesOS/qubes-antievilmaid/pull/9
[1]
https://github.com/rustybird/qubes-antievilmaid/blob/ponies/anti-evil-maid/etc/anti-evil-maid.conf
[2]
https://github.com/rustybird/qubes-antievilmaid/blob/ponies/anti-evil-maid/sbin/anti-evil-maid-install#L12-L44
[3]
https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-021-2015.txt
[4]
https://github.com/rustybird/qubes-antievilmaid/blob/ponies/anti-evil-maid/90anti-evil-maid/anti-evil-maid-unseal#L27-L35
[5]
https://github.com/Cr4sh/SmmBackdoor
-----BEGIN PGP SIGNATURE-----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=3PYG
-----END PGP SIGNATURE-----