|
Message-ID: <66402D07.6010804@gmail.com> Date: Sat, 11 May 2024 21:44:23 -0500 From: Jacob Bachmeyer <jcb62281@...il.com> To: oss-security@...ts.openwall.com CC: Corey Lopez <Corey.lopez09160587@...mail.com> Subject: Re: Microsoft Device Firmware Configuration Interface (DFCI) in Linux efivars directory Solar Designer wrote: > Hi, > > Corey's message is confused and there's no indication in it whether the > system was compromised, so that part doesn't need further discussion, > but as a moderator I don't mind someone explaining Linux's (and other > systems') exposure of the EFI variables and DFCI and what it means for > security as well as what it does not. > While he is definitely somewhat confused, he claims at the start to have detected a compromise, but does not give details about the indications that led him to that conclusion. As far as I can tell from a quick perusal, (landing at <URL:https://microsoft.github.io/mu/dyn/mu_feature_dfci/DfciPkg/Docs/Scenarios/DfciScenarios/>) it seems that DFCI "Zero Touch" is actually tightly bound to Microsoft cloud services, and there is supposed to be a local option to remove the zero touch certificate (thus disabling it more-or-less permanently) if DFCI is not in use on the machine. The example implies that the UEFI configuration tool ("BIOS setup") should provide this option. -- Jacob
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.