• 9tr6gyp3@lemmy.world
    link
    fedilink
    English
    arrow-up
    6
    ·
    edit-2
    6 days ago

    It seems the issue here is that initramfs is not signed, which makes this attack possible.

    If it is signed and an evil maid modifies the initramfs itself, it will break the secure boot process and the user will be notified that their system has been tampered with. This should indicate that the secure boot protection is working.

    If initramfs is not signed and it drops to the debug shell, then the attacker can make any changes to your system without it affecting secure boot, since it has already passed the protection. At least that’s my understanding when I read this.

      • 9tr6gyp3@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        ·
        6 days ago

        Depends on the OS, but you can generally have mkinitcpio handle generating new UKIs after updates and also have it trigger something like sbctl to re-sign images.

    • Laser@feddit.org
      link
      fedilink
      arrow-up
      1
      ·
      6 days ago

      This is true, unfortunately some Linux users have been conditioned to “just turn off Secure Boot” without understanding what this actually means and entails.