Received: by 2002:ab2:6a05:0:b0:1f8:1780:a4ed with SMTP id w5csp2135907lqo; Mon, 13 May 2024 08:46:50 -0700 (PDT) X-Forwarded-Encrypted: i=2; AJvYcCWXH0bHe+v7igIpl/B6KXN3EHrqGWOrffd6pbGURVO7Y233IVJARqeki2CA3yxe3CosMZYVHo67jRy31y3H/bWW+nr11npxLXY2dnV6ww== X-Google-Smtp-Source: AGHT+IEu0ZEPP8b7djE+0aC3sgQdirFKQOONyYzdUZBbzazLieHOADTC1uD5IwHEFYqq8yTI8ef8 X-Received: by 2002:a17:906:fe0e:b0:a5a:5c8f:120d with SMTP id a640c23a62f3a-a5a5c8f12a7mr429154366b.36.1715615210118; Mon, 13 May 2024 08:46:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1715615210; cv=none; d=google.com; s=arc-20160816; b=0YGOBUJbcPTiHkXJAO/FwPyCm+8uTTWnjIIiXwBKaFu1qQB534zaJ8a13jYOiPqDUd 7hGV5gYoOkWrOsWHk7aOKzKLqn3FnZEKe+rQvwxksrhvZpPRj7I8gIHu2ciDNGQO50Z7 80KtgFWQf9wpRyvQ+iD8jRniLIQtQ2G373IwRgpGk9zidCSFBb5qazttTFy9WvFOLISl Mi0Cl6xIt+AsZauJ00LyU8eZKM2KXuQvQ5h8Jk0rT4UCp7JbUwZ0glGSdvw6KDpBs4Kr uqdO2FVbhosDNWPUmsCqJx+vOPQi/QyUiw46vfLFYs4K3WmtghGTEkbsIN1RnslbQPVY T2Cw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=subject:content-transfer-encoding:in-reply-to:references:cc:to :mime-version:user-agent:from:date:message-id:dkim-signature :delivered-to:delivered-to:reply-to:list-id:list-subscribe :list-unsubscribe:list-help:list-post:precedence:mailing-list; bh=q8ZLumqogSKoJetp9ebUgw9ELSx5ZaPz0ltc3WllS7A=; fh=etd91xCsIfZaoC6Dpg17onjO0NFJCIdHWjdOdaUYsqQ=; b=y4NtjWmoGAZOgINK9CiuUVTmqK1E1ixSFZEXDT29sB5yKMqcpf7eU46edIS1Er0gWo YlNhtCKwPMNwdmIAacrZ8YdrJKJwuZBhqi5zIdfwuqe0hCrj3WpIntFP/H9NDWLRxwbZ xV7JwoxqCtb/SccMgqiEYXyHm+KSlvLrhDFfitJfjRuKNtPduvxGTAWqa3C9AmUCb3ht vIyMJ5xV4MExG82qfqFbPFaiKe4iFNT3lHA50qqByGuQxl/MjFB/Nc1LFIP5FdJa2lHX xCL6vmKtWrXbGrRy25yy50tJijQFSgyKHH6OjYEkiRrD/YcAQAhEdjJzwN0rY4TaiRhY jjYQ==; dara=google.com ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@gmail.com header.s=20230601 header.b="Ezukf4r/"; spf=pass (google.com: domain of oss-security-return-30148-linux.lists.archive=gmail.com@lists.openwall.com designates 193.110.157.125 as permitted sender) smtp.mailfrom="oss-security-return-30148-linux.lists.archive=gmail.com@lists.openwall.com"; dmarc=fail (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from second.openwall.net (second.openwall.net. [193.110.157.125]) by mx.google.com with SMTP id a640c23a62f3a-a5a17b21ac6si556057966b.322.2024.05.13.08.46.50 for ; Mon, 13 May 2024 08:46:50 -0700 (PDT) Received-SPF: pass (google.com: domain of oss-security-return-30148-linux.lists.archive=gmail.com@lists.openwall.com designates 193.110.157.125 as permitted sender) client-ip=193.110.157.125; Authentication-Results: mx.google.com; dkim=fail header.i=@gmail.com header.s=20230601 header.b="Ezukf4r/"; spf=pass (google.com: domain of oss-security-return-30148-linux.lists.archive=gmail.com@lists.openwall.com designates 193.110.157.125 as permitted sender) smtp.mailfrom="oss-security-return-30148-linux.lists.archive=gmail.com@lists.openwall.com"; dmarc=fail (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (qmail 5917 invoked by uid 550); 13 May 2024 15:44:12 -0000 Mailing-List: contact oss-security-help@lists.openwall.com; run by ezmlm Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-ID: Reply-To: oss-security@lists.openwall.com Delivered-To: mailing list oss-security@lists.openwall.com Delivered-To: moderator for oss-security@lists.openwall.com Received: (qmail 10080 invoked from network); 12 May 2024 02:44:34 -0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1715481866; x=1716086666; darn=lists.openwall.com; h=content-transfer-encoding:in-reply-to:references:subject:cc:to :mime-version:user-agent:reply-to:from:date:message-id:from:to:cc :subject:date:message-id:reply-to; bh=q8ZLumqogSKoJetp9ebUgw9ELSx5ZaPz0ltc3WllS7A=; b=Ezukf4r/wFF4ZgYZtPCx6fKUMTEkg+cBswg70g4aEvgdgeSsi0w3s0ZgLtZfXkYoPb iVuQFEopChyM8oKLaUWKfJ2yZcwl1J3lwL+H/5msQRy0heZutfKpG2SJ9HHCOf22fxpr 5bQ7YdaV/YIdY+wAjrgvWIXm49nGMtoIBBkCIOfcC7OuIwmVSgu+5Yw1La5Tf6sdFe4H lbr7BMfE8LO4qy5rpYO0+0EdzolMrc0N5gnIJKYGWi5V8maELiSc+sPBKPKfawPrcknj 1xRnbFsYniwygrd8VOzYhcreEj1oxeF1yhe4ZdKAju2sprTVJrpY1TFsxqQh3mnd3u1h 9lkg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1715481866; x=1716086666; h=content-transfer-encoding:in-reply-to:references:subject:cc:to :mime-version:user-agent:reply-to:from:date:message-id :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=q8ZLumqogSKoJetp9ebUgw9ELSx5ZaPz0ltc3WllS7A=; b=i9vHnmm3t8kOTKnATuuUQfX0YihG3Dl3y7s+Dx17iZAOZMCZJpSCSUmtLeIjocNcHy jA944kN7S6oK3ieVvWssxdmrX8z+qtVzsT/RiE8Rp+gWJH/wqKyyOaHCqvjnrukT57u7 ki8wZaFJPYPWsjPOwgYxaBUQVJSMxXA+NfWek1d7pzMILE2Ufxn/goKQ3smj0oWA1fkg 2NSDdMPCscPUxz8sTDyXZUqlqGpuqScpUyADv3vOVZtzcX7pNnyPDtMcPB15bbXKjSVe Cnvg25wUrbFTWRqCswVWBktHact5eE7hwTHVWCMXvMH6FtqeAW6pHUbXCpXfmhLADAk9 azkg== X-Gm-Message-State: AOJu0Yz2fobGvkyMuOudyF8fBI9lavjEtU7+5LEDmx85VU6Jrg217/7f U6lWA6RXS7I1uBRtTAr2SgMGKNU1WNrg2RaCG6exT8/rR9v/QaaS7th34pYS X-Received: by 2002:a05:6830:45:b0:6f0:e557:5160 with SMTP id 46e09a7af769-6f0e9148dc9mr7965296a34.17.1715481865549; Sat, 11 May 2024 19:44:25 -0700 (PDT) Message-ID: <66402D07.6010804@gmail.com> Date: Sat, 11 May 2024 21:44:23 -0500 From: Jacob Bachmeyer User-Agent: Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.8.1.22) Gecko/20090807 MultiZilla/1.8.3.4e SeaMonkey/1.1.17 Mnenhy/0.7.6.0 MIME-Version: 1.0 To: oss-security@lists.openwall.com CC: Corey Lopez References: <20240511112123.GA2064@openwall.com> In-Reply-To: <20240511112123.GA2064@openwall.com> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Subject: Re: [oss-security] Microsoft Device Firmware Configuration Interface (DFCI) in Linux efivars directory Solar Designer wrote: > Hi, > > Corey's message is confused and there's no indication in it whether the > system was compromised, so that part doesn't need further discussion, > but as a moderator I don't mind someone explaining Linux's (and other > systems') exposure of the EFI variables and DFCI and what it means for > security as well as what it does not. > While he is definitely somewhat confused, he claims at the start to have detected a compromise, but does not give details about the indications that led him to that conclusion. As far as I can tell from a quick perusal, (landing at ) it seems that DFCI "Zero Touch" is actually tightly bound to Microsoft cloud services, and there is supposed to be a local option to remove the zero touch certificate (thus disabling it more-or-less permanently) if DFCI is not in use on the machine. The example implies that the UEFI configuration tool ("BIOS setup") should provide this option. -- Jacob