mastouille.fr est l'un des nombreux serveurs Mastodon indépendants que vous pouvez utiliser pour participer au fédiverse.
Mastouille est une instance Mastodon durable, ouverte, et hébergée en France.

Administré par :

Statistiques du serveur :

584
comptes actifs

#uefi

1 message1 participant0 message aujourd’hui

"If it’s smart, it’s vulnerable"

Schöne neue IT-Welt:

"Durch die #Sicherheitslücken haben es die Forscher geschafft, eine Root-Shell auf einem #Bose-Lautsprecher zu erhalten, und dann davon in ein #Autoradio von #Panasonic einzubrechen. Somit kann man sich von einem #AirPlay- und #CarPlay-Gerät zum nächsten hacken."

"Außerdem beschwerten sich die Forscher, dass #Apple ein Rate-Limit zum Übermitteln von #Schwachstellen hat – nach 16 CVEs gibt es die Meldung, man könne weitere Lücken erst am nächsten Tag melden."

"In einer Live-Demo zeigte er, wie man [...] eine Socket-Kommunikation trotz geblocktem Port bei der #Defender-Firewall durchführen kann, komplett vorbei am #Betriebssystem. Auch bei #UEFI-Malware bleibt es also ein ewiges Katz-und-Maus-Rennen."

heise.de/news/Black-Hat-If-it-

heise online · Black Hat: If it’s smart, it’s vulnerablePar Lukas Grunwald

Black Hat: If it’s smart, it’s vulnerable

Auf der Security-Konferenz Black Hat gab es viele neue Angriffsmethoden zu sehen. Doch laut Keynote ist Optimismus angesagt: Software wird immer sicherer.

heise.de/news/Black-Hat-If-it-

heise online · Black Hat: If it’s smart, it’s vulnerablePar Lukas Grunwald

UEFI Secure Boot Signing with Debusine

How do you handle Secure Boot signing for Debian-based systems?

We've just published a detailed write-up on how Freexian uses Debusine to manage UEFI Secure Boot signing for Debian 10 ELTS.
If any part of your work touches Secure Boot, package signing, or reproducible infrastructure for Debian distributions, it’s a relevant read.

It covers:
* How signing workers are set up
* Secure Management of private keys
* Workflows to automate the tasks involved
* Future plans for extending the signing system and for better key protection

Read the post: freexian.com/blog/debusine-sec

If you're working on a Debian derivative and facing similar challenges, we’d love to hear from you: sales@freexian.com

Freexian · Secure boot signing with DebusineDebusine aims to be an integrated solution to build, distribute and maintain a Debian-based distribution. At Debconf 25, we talked about using it to pre-test uploads to Debian unstable, and also touched on how Freexian is using it to help maintain the Debian LTS and ELTS projects. When Debian 10 (buster) moved to ELTS status in 2024, this came with a new difficulty that hadn’t existed for earlier releases. Debian 10 added UEFI Secure Boot support, meaning that there are now signed variants of the boot loader and Linux kernel packages.

For the ~six of y’all that might be interested in the GUID partitioning table storage partitioning — used on many modern systems including macOS, OpenVMS I64 on Integrity Itanium, most anything using EFI or UEFI consoles, and others — here is the Apple Technical Note TN2166
Secrets of the GPT document:

developer.apple.com/library/ar

This being one of the better GPT introductions available.

This and related technical discussions also have all unfortunately been buried by that unrelated AI stuff.

developer.apple.comTechnical Note TN2166: Secrets of the GPTTN2166: Describes the new partition map format used by Intel-based Macintosh computers.
#efi#macos#uefi
A répondu dans un fil de discussion

@whynothugo @stefano
On FreeBSD, ESP "at least usually" DOES NOT contain whole /boot, but mounted in (by recent default [not from the beginning of UEFI support]) /boot/efi/.

So there would be "plain" /boot/efi/EFI/boot, /boot/efi/EFI/freebsd,...) inside (if done so) encrypted (with GELI) /boot/.

#FreeBSD #boot #encrypted #UEFI

Edit: My sleepy eyes missed to include single "DOES NOT".