[[!meta title="Bootless: evil maid mitigator"]]
Bootless is a scheme allowing a computer with encrypted disk to stay without attached bootloader in order to make more difficult to tamper the initialization process. Bootless is a bootloader installed in a removable media and used to initialize computers.
- Repository.
- Tutorial.
- References.
- License: GPLv3+.
- Contact: rhatto at riseup.net.
Design
The user has at least one USB thumb drive which will be used to boot multiple operating systems in multiple machines for multiple different projects/farms (personal, work, hackerspace, etc). User keeps the bootless thumb drive in a safe place protected from physical intrusions.
The bootless
application wraps around grub-mkrescue
to create a USB
bootdisk with preloaded custom configuration and optional kernel and initramfs
images.
Dependencies
- GNU Grub.
- Reference implementation is targeted to Debian like operating systems.
- Optionally use git and git-annex to manage your repository and images.
Installation
Don't want to install another piece of software and prefer to build a bootless rescue disk yourself? Then read about the barebones tutorial.
Just clone
git clone https//git.fluxo.info/bootless
You can also verify the latest commit's OpenPGP signature:
/usr/bin/git -C kvmx verify-commit HEAD
Note that /usr/bin/git
is called to avoid any other git
wrappers or aliases
you might have available on your shell.
You can optionally add the bootless
script it to your $PATH
environment
variable or package it to your preferred distro.
Workflow
Initialize:
bootless init <folder> [repository]
Create an image:
boootless image <folder> [image]
Write image to thumb drive:
boootless write <folder> <device>
Check device/image signatures:
bootless check <folder> <device>
Customization
- Place your custom images into
custom
folder. - Edit
custom/custom.cfg
to suit your needs.
Threat Model
Does bootless mitigate all types of Evil Maid attacks? No.
-
It reduces the attack surface by placing the bootloader and images away from the physical machine and recommending you to use Full Disk Encryption (FDE) to store your operating system, swap and data.
-
Infection is still possible in plenty of unencrypted/unauthenticated software residing in the machine, such as BIOS, network firmware and potential backdoors such as Intel's AMT/ME.
-
The USB stick itself is not a static device: it's has a built-in controller that could be exploited to present to your computer a compromised kernel or initramfs (BadUSB attacks).
Additional mitigations
-
For physical attempts to tamper with your bare metal, you might try to protect and monitor your perimeter.
-
From inside threats such as preloaded backdoors in the hardware, the best you can do is to look for laboratory audits and build and use open hardware.
- Check your boot using something like anti-evil-maid (repository), smartmonster (original repository) or chkboot.