• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Enable or disable Secure Boot?

Scheduled Pinned Locked Moved Problems Installing or Upgrading pfSense Software
11 Posts 5 Posters 5.8k Views
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • I
    Ip Man
    last edited by Feb 16, 2017, 6:14 AM

    I'm preparing for installing pfSense on a new system. Do I have "Secure Boot" enabled or disabled in BIOS? According to the FreeBSD web site https://wiki.freebsd.org/SecureBoot there is no support for Secure Boot yet.

    1 Reply Last reply Reply Quote 0
    • D
      doktornotor Banned
      last edited by Feb 16, 2017, 12:12 PM

      Yeah you should definitely disable that POS.

      1 Reply Last reply Reply Quote 0
      • I
        Ip Man
        last edited by Feb 16, 2017, 6:34 PM

        @doktornotor:

        Yeah you should definitely disable that POS.

        Great! Thank you for being so clear about it.

        1 Reply Last reply Reply Quote 0
        • K
          kpa
          last edited by Feb 16, 2017, 6:40 PM

          It's not useful for anything on a system that you have set up yourself, it's like questioning yourself if you trust yourself to lock the doors of your house when you leave for work in the morning.

          1 Reply Last reply Reply Quote 0
          • I
            Ip Man
            last edited by Feb 16, 2017, 7:08 PM

            @kpa:

            It's not useful for anything on a system that you have set up yourself, it's like questioning yourself if you trust yourself to lock the doors of your house when you leave for work in the morning.

            Yeah, nothing a healthy man of action would do.

            1 Reply Last reply Reply Quote 0
            • P
              pppfsense
              last edited by Feb 19, 2017, 11:56 PM

              @Ip:

              @kpa:

              It's not useful for anything on a system that you have set up yourself, it's like questioning yourself if you trust yourself to lock the doors of your house when you leave for work in the morning.

              Yeah, nothing a healthy man of action would do.

              Close, but not quite so. Secure boot is more against attacks to your BIOS, Boot files and drivers.

              You don't need physical access to modify the Bios, Boot or Driver files, do you?

              It may not prevent the attack, but it simply won't boot your system if it detects changes on any of the protected files (BIOS, Boot & Driver files).
              This is the last step to maintain the integrity of a system. Hard Drive encryption is great, but useless if you can modify the BIOS, boot or driver files to steal the HD password. So, Secure Boot/TPM, plus Hard Drive encryption, does give you a level of trust in the system/files/configuration.

              It is a pain, true, but in this day, the more locks and obstacles against malware/attacks, the better.

              I predict Secure-Boot/TPM/HD-encryption will be the default for any trusted installation of any software in the coming years.
              For people with a firewall in their basement? Maybe not, but I'm pretty sure it will become the norm for co-location, VMs and critical installs.

              1 Reply Last reply Reply Quote 0
              • I
                Ip Man
                last edited by Feb 20, 2017, 10:26 PM Feb 20, 2017, 10:16 PM

                @pppfsense:

                @Ip:

                @kpa:

                It's not useful for anything on a system that you have set up yourself, it's like questioning yourself if you trust yourself to lock the doors of your house when you leave for work in the morning.

                Yeah, nothing a healthy man of action would do.

                Close, but not quite so. Secure boot is more against attacks to your BIOS, Boot files and drivers.

                You don't need physical access to modify the Bios, Boot or Driver files, do you?

                It may not prevent the attack, but it simply won't boot your system if it detects changes on any of the protected files (BIOS, Boot & Driver files).
                This is the last step to maintain the integrity of a system. Hard Drive encryption is great, but useless if you can modify the BIOS, boot or driver files to steal the HD password. So, Secure Boot/TPM, plus Hard Drive encryption, does give you a level of trust in the system/files/configuration.

                It is a pain, true, but in this day, the more locks and obstacles against malware/attacks, the better.

                I predict Secure-Boot/TPM/HD-encryption will be the default for any trusted installation of any software in the coming years.
                For people with a firewall in their basement? Maybe not, but I'm pretty sure it will become the norm for co-location, VMs and critical installs.

                I don't know if it is possible to access the BIOS without physical access. Maybe it is. I try to protect my system by disabeling the ability to boot from USB and CD-ROM and then setting a strong BIOS password.

                1 Reply Last reply Reply Quote 0
                • P
                  pppfsense
                  last edited by Feb 21, 2017, 1:01 AM

                  @Ip:

                  @pppfsense:

                  @Ip:

                  @kpa:

                  It's not useful for anything on a system that you have set up yourself, it's like questioning yourself if you trust yourself to lock the doors of your house when you leave for work in the morning.

                  Yeah, nothing a healthy man of action would do.

                  Close, but not quite so. Secure boot is more against attacks to your BIOS, Boot files and drivers.

                  You don't need physical access to modify the Bios, Boot or Driver files, do you?

                  It may not prevent the attack, but it simply won't boot your system if it detects changes on any of the protected files (BIOS, Boot & Driver files).
                  This is the last step to maintain the integrity of a system. Hard Drive encryption is great, but useless if you can modify the BIOS, boot or driver files to steal the HD password. So, Secure Boot/TPM, plus Hard Drive encryption, does give you a level of trust in the system/files/configuration.

                  It is a pain, true, but in this day, the more locks and obstacles against malware/attacks, the better.

                  I predict Secure-Boot/TPM/HD-encryption will be the default for any trusted installation of any software in the coming years.
                  For people with a firewall in their basement? Maybe not, but I'm pretty sure it will become the norm for co-location, VMs and critical installs.

                  I don't know if it is possible to access the BIOS without physical access. Maybe it is. I try to protect my system by disabeling the ability to boot from USB and CD-ROM and then setting a strong BIOS password.

                  Of course it is possible to alter the BIOS without physical access.

                  Have you not ever upgraded a BIOS from within Linux/Windows??
                  If your machine gets infiltrated remotely, they can run proper code to change the BIOS, so, in theory, even if you do an OS re-install, the
                  BIOS would still be compromised.

                  How much can they do with the BIOS?
                  Boot from a different source/disk/UEFI image?
                  Change your ILO password maybe?
                  Maybe more now that we have more functionality in UEFI?

                  Remember, it is all software. Just because the BIOS is 'present' at boot time, it does not mean that is 'gone' at run-time.
                  You just need to know how and where to poke!

                  1 Reply Last reply Reply Quote 0
                  • K
                    kpa
                    last edited by Feb 21, 2017, 2:30 AM

                    If you are an attacker with such access to a system where you can alter the boot files/BIOS/firmware you are already at the position where you can do a whole bunch of much more sneakier stuff than try to play games with the BIOS or the firmware of the system, the game is already over and it makes no difference if the system has secure boot or not.

                    1 Reply Last reply Reply Quote 0
                    • H
                      Harvy66
                      last edited by Feb 21, 2017, 5:38 PM

                      @kpa:

                      If you are an attacker with such access to a system where you can alter the boot files/BIOS/firmware you are already at the position where you can do a whole bunch of much more sneakier stuff than try to play games with the BIOS or the firmware of the system, the game is already over and it makes no difference if the system has secure boot or not.

                      Secure boot can prevent those situations from occurring the first place. For one, tt can prevent "drive by" attacks. There is also a class of attack where the boot sequence can get altered, then the next time the system reboots, the malware loads itself first, then lets the OS load. At this point, the attacker can siphon data from your system without you knowing.

                      1 Reply Last reply Reply Quote 0
                      • I
                        Ip Man
                        last edited by Feb 21, 2017, 8:06 PM

                        It is interesting to read about all your views about Secure Boot and security concerns but If I understand it correctly freeBSD and therefore also pfSense have no support for Secure Boot yet so even if there are some benefits of using it the discussion is purely academic from a pfSense perspective.
                        Does a strong BIOS password offer protection even against attacks with no physical access? Perhaps this is an option to be considered?

                        1 Reply Last reply Reply Quote 0
                        1 out of 11
                        • First post
                          1/11
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.
                          This community forum collects and processes your personal information.
                          consent.not_received