Sounds like a misnomer to me.

  • TwilightKiddy@programming.dev
    link
    fedilink
    English
    arrow-up
    4
    ·
    1 day ago

    Well, something has to be. You can have your EFI partition on a separate drive and then the actual drive will be fully encrypted. It’s just as good as we can get, the algorithm for decrypting the data obviously can’t be encrypted.

    I think there are implementations with encryption logic stored in the BIOS or on a separate chip, but don’t quote me on that. And even then, the decryption logic itself will be unencrypted, because, as it happens, computers can’t run encrypted code.

    • Jumuta@sh.itjust.works
      link
      fedilink
      arrow-up
      2
      ·
      edit-2
      1 day ago

      efi partition on a separate disk makes a lot of sense actually, imo the biggest point of fde is that your boot environment doesn’t get fucked with from outside your trusted os, so if you put your efi on a read only CD or something and lock your bios to boot into that, that can’t really be tampered with easily in software

      • TwilightKiddy@programming.dev
        link
        fedilink
        English
        arrow-up
        3
        ·
        1 day ago

        As bad as secure boot is, that’s exactly the use case for it. Frankly, you can both swap the CD and solder a new BIOS flash if you are really interested in boot poisoning, the latter is just a tiny bit harder to do without some sort of trace.

        • Jumuta@sh.itjust.works
          link
          fedilink
          arrow-up
          2
          ·
          1 day ago

          I meant software attacks, if your hardware is compromised it’s pretty much already game over unless you use something esoteric like heads maybe

        • LiveLM@lemmy.zip
          link
          fedilink
          English
          arrow-up
          3
          ·
          edit-2
          20 hours ago

          What do you mean?? Our Motherboards come equipped with the latest and greatest Military Grade™ MD5 RealGood™ Encryption Technology.
          What do you mean it’s not longer considered secure??? Fake news, we’d never lie to you.

      • Ooops@feddit.org
        link
        fedilink
        arrow-up
        2
        ·
        edit-2
        22 hours ago

        You are just moving things. When you change your EFI partition from being unencrypted and asking for your password to the BIOS asking for your password (or other credentials) you just shift the attack surface.

        Somewhere there has to be an unencrypted part to start with.

        Lock your unencrypted ESP down with secure boot and your own keys (shitty as it is that is in fact the one conceptional usecase of secure boot, not that stupid marketing bullshit MS is doing with getting vendors to pre-install Microsoft keys) to prevent tampering and you are good to go.

        • TwilightKiddy@programming.dev
          link
          fedilink
          English
          arrow-up
          1
          ·
          13 hours ago

          If you do this, be sure to make an image of your EFI partition and/or keys and keep it somewhere safe along with whatever is needed to restore the partition. Because if something tempers with it, your computer will stop booting because sighed hashes no longer match the ones calculated and you’ll be locked out of your own system without some sort of way to restore the partition to a safe state.

          @onlinepersona@programming.dev

          • Ooops@feddit.org
            link
            fedilink
            arrow-up
            1
            ·
            edit-2
            1 hour ago

            Yes, preventing the boot process when something tempers with the files is the whole point of secure boot.

            And beside the backups you should always have (remember: no backup, no pity for you…) the keys to sign your EFI files with are on the encrypted disk so the running system can get updated. So deactivating secure boot again, unlocking your encrypted disk from some live boot stick and fixing it is always an option (as is having a live system at hand signed by the same keys if you want to…).