-
Notifications
You must be signed in to change notification settings - Fork 5
This issue was moved to a discussion.
You can continue the conversation there. Go to discussion →
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Starbook MkVI - Intel][coreboot] OSResearch Heads support? #104
Comments
There's nothing stopping it, would just need to be ported |
This is why I held off on trying to see if I can do the port job myself, since it looked like it could involve a lot more effort than tweaking some options and quick code patches. Anything more, and I would have to familiarize myself with both the coreboot firmware and Heads source code. I'll post an issue on their git repo, see what would be required to port things over. |
4.19 is the latest version of coreboot. 8.40 is the local version number. I'm not familiar with heads, but unlocking all regions sounds like a terrible idea. Mailing lists are a much better place for questions :) |
Just noticed that now! Thanks for the heads up. |
@Sean-StarLabs @Hacksawfred3232 : I updated heads ticket at linuxboot/heads#1388 Might want to contribute/collaborate there for it to happen! |
This comment was marked as outdated.
This comment was marked as outdated.
How Heads uses TPM sealing and unsealing to secure firmware and OS boot componentsSome users have expressed their concerns about locking or unlocking firmware regions for computers with Heads. For example, @Sean-StarLabs said:
@Hacksawfred3232 said:
These are some valid concerns that need to be addressed. In this comment, I will explain how Heads secures firmware and OS boot components with coreboot and TPM sealing and unsealing, and how it trusts the user to be in control. Heads is a system that checks the firmware and the OS boot components of a computer before booting. It uses coreboot measured boot to extend PCR registers and perform remote attestation. It also uses TPM sealing and unsealing to warn the user of any tampering in the firmware or the OS boot components. Coreboot measured boot and platform locking
TPM sealing and unsealing
User control and reownership
This is how Heads uses TPM sealing and unsealing to secure firmware and OS boot components. It verifies |
This issue was moved to a discussion.
You can continue the conversation there. Go to discussion →
I just wanted to know if Heads could be supported as a alternative payload for coreboot on this device? For reference, I glanced over their documentation, and it looks like it could work? But I don't want to risk bricking my laptop to test it.
https://github.com/osresearch/heads
This would pair well with Qubes OS, which is now stable - somewhat. https://www.qubes-os.org/hcl/#star-labs_starbook-mk-vi_i7-1260p_integrated-graphics-iris-xe_hsf3232_r4-1
The text was updated successfully, but these errors were encountered: