Use a UEFI locked down variable to allow self-signed forks of System informer to use the original signed driver #1818
DavidXanatos
started this conversation in
General Discussion
Replies: 1 comment 2 replies
-
UEFI variables can be created and changed by unauthenticated users without administrative access? |
Beta Was this translation helpful? Give feedback.
2 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Windows uses a locked down UEFI variable to persistently set a protection option for the lsass.exe as described here: https://learn.microsoft.com/en-us/windows-server/security/credentials-protection-and-management/configuring-additional-lsa-protection
I was wondering if you could consider using an analogous approach to empower users to make the choice if they want to allow self-signed system informer forks to use the original signed driver.
Setting a Variable from the UEFI environment using a special tool would be quite the statement of undeniable ownership over the system.
On a quick glance over the UEFI specification I'm not sure if the mechanism used for lsass.exe would work here as we would want something inverse, i.e. only to be set from a UEFI tool not only to be cleared by one.
So in case that's not doable this way, one could go the overkill route and enroll an own certificate as the Platform Key and system informer would then test the *.sig files also against that key.
What do you think would that be a secure enough to allow lore freedom to the users?
Beta Was this translation helpful? Give feedback.
All reactions