summaryrefslogtreecommitdiffstats
path: root/docs/howtos/x60_security.html
diff options
context:
space:
mode:
Diffstat (limited to 'docs/howtos/x60_security.html')
-rw-r--r--docs/howtos/x60_security.html24
1 files changed, 20 insertions, 4 deletions
diff --git a/docs/howtos/x60_security.html b/docs/howtos/x60_security.html
index fc631bf..6abda98 100644
--- a/docs/howtos/x60_security.html
+++ b/docs/howtos/x60_security.html
@@ -42,6 +42,7 @@
<h1 id="software_requirements">Software requirements</h1>
<ul>
<li>none (at least in the scope of the article as-is)</li>
+ <li>You probably want to encrypt your GNU/Linux install using LUKS</li>
</ul>
<h1>
@@ -171,12 +172,12 @@
Not covered yet:
</h2>
<ul>
- <li>Disable cardbus/pcmcia (has fast/direct memory access)</li>
+ <li>Disable cardbus (has fast/direct memory access)</li>
<li>Disable firewire (has fast/direct memory access)</li>
<li>Disable flashing the ethernet firmware</li>
<li>Disable SPI flash writes (can be re-enabled by unsoldering two parts)</li>
<li>Disable use of xrandr/edid on external monitor (cut 2 pins on VGA)</li>
- <li>Disable docking station</li>
+ <li>Disable docking station (might be possible to do it in software, in coreboot upstream as a Kconfig option)</li>
</ul>
<p>
Go to <a href="http://media.ccc.de/browse/congress/2013/30C3_-_5529_-_en_-_saal_2_-_201312271830_-_hardening_hardware_and_choosing_a_goodbios_-_peter_stuge.html">http://media.ccc.de/browse/congress/2013/30C3_-_5529_-_en_-_saal_2_-_201312271830_-_hardening_hardware_and_choosing_a_goodbios_-_peter_stuge.html</a>
@@ -191,13 +192,25 @@
</h2>
<ul>
<li>
- Intrusion detection: randomized seal on screws (need to research)
+ Intrusion detection: randomized seal on screws<br/>
+ Just put nail polish with lot of glider on the important screws, take
+ some good pictures. Keep the pictueres and make sure of their integrity.
+ Compare the nail polish with the pictures before powering on the laptop.
</li>
<li>
Tips about preventing/mitigating risk of cold boot attack.
+ <ul>
+ <li>soldered RAM?</li>
+ <li>seal RAM door shut (possibly modified lower chassis) so that system has to be disassembled (which has to go through the nail polish)</li>
+ <li>wipe all RAM at boot/power-off/power-on? (patch in coreboot upstream?)</li>
+ <li>ask gnutoo about fallback patches (counts number of boots)</li>
+ </ul>
</li>
<li>
Software-based security hardening (GRUB trust/cryptomount, kernel LUKS/ecryptfs, etc).
+ <ul>
+ <li>modify grub to delay password attemps by a few seconds, and fail after a set time (and record all attemps in a counter, writing that to nvram)</li>
+ </ul>
</li>
<li>
General tips/advice and web links showing how to detect physical intrusions.
@@ -205,6 +218,9 @@
<li>
For example: <a href="http://cs.tau.ac.il/~tromer/acoustic/">http://cs.tau.ac.il/~tromer/acoustic/</a>
</li>
+ <li>
+ https://gitorious.org/gnutoo-for-coreboot/grub-assemble/source/a61f636797777a742f65f4c9c58032aa6a9b23c3:
+ </li>
</ul>
<h1>
@@ -226,7 +242,7 @@
Risk level
</h2>
<ul>
- <li>Modem: highest</li>
+ <li>Modem (3g/wwan): highest</li>
<li>Intel wifi: Near highest</li>
<li>Atheros PCI wifi: unknown, but lower than intel wifi.</li>
<li>Microphone: only problematic if the computer gets compromised.</li>