IHawkMike

joined 2 years ago
[–] IHawkMike 3 points 3 days ago

As another poster mentioned, QubesOS with anti evil maid will work, but that's the defense against state actors too and is overkill for this threat model.

BitLocker or any FDE using SecureBoot and PCR 7 will be sufficient for this (with Linux you also need PCRs 8+9 to protect against grub and initramfs attacks). Even if they can replace something in the boot chain with something trusted, it'll change PCR 7 and you'd be prompted to unlock with a recovery key (don't blindly enter it without verifying the boot chain and knowing why you're being prompted).

With Secure Boot alone, the malicious bootloader would still need to be trusted (something like BlackLotus).

Also make sure you have a strong BIOS password and disable boot from USB, PXE, and anything else that isn't the specific EFI bootloader used by your OS(es).

[–] IHawkMike 5 points 3 days ago

Yeah this article is complete garbage. Who upvotes this stuff?

[–] IHawkMike 64 points 4 days ago (25 children)

I will never understand how anyone could come to thinking aspic was a good idea.

https://en.m.wikipedia.org/wiki/Aspic

[–] IHawkMike 3 points 5 days ago

And what about taking a nice drive down Jean Baptiste Pointe du Sable Lake Shore Drive?

[–] IHawkMike 0 points 1 week ago

Thanks for the spoiler. Unsubscribing.

[–] IHawkMike 3 points 1 week ago* (last edited 1 week ago) (1 children)

Not that it's my first recommendation for security reasons, and I would never do this in prod, but you can just add the self-signed cert to the local trusted root CA store and it should work fine. No reg changes needed.

If you do this, put it in the store of the user running the client, not LocalMachine. Then you just need to make sure you connect as something in the cert's SAN list. An IP might work (don't know since I never try to put IPs in the SAN list), but just use a hosts entry if you can't modify local DNS.

Edit: after reading the full OP post (sorry), I don't think it's necessarily the self-signed cert. If the browser is connecting with https:// and presenting a basic auth prompt, then https is working. It almost sounds like there is a 301/302 redirect back to http after login. Check the Network tab of the browser's dev pane (F12) to see what is going on.

[–] IHawkMike 13 points 1 week ago (1 children)

Wow Forbes cybersecurity reporting is absolute dog shit. So much text to say absolutely nothing useful.

Anyway, this is just an AITM redirection onto a malicious site in the middle that pretends to be the MFA portal and intercept the session cookie.

[–] IHawkMike 1 points 1 week ago

I'm guessing most of the younger crowd here has never seen When Harry Met Sally.

https://youtu.be/iEV_pQIf3Og

[–] IHawkMike 12 points 2 weeks ago* (last edited 2 weeks ago)

Microsoft uses TPM PCRs 7+11 for BitLocker which is more secure than the Linux implementations mentioned in the article.

PCR 7 is the Secure Boot measurement which means it can't be unlocked unless every signed boot component has not been tampered with up to the point of unlock by the EFI bootloader. PCR 11 is simply flipped from a 0 to a 1 by the bootloader to protect the keys from being extracted in user land from an already booted system.

The article is correct that most Linux implementations blindly following these kinds of "guides" are not secure. Without additional PCRs, specifically 8 and 9 measuring the grub commands (no single-user bypass) and initrd (which is usually on an unencrypted partition), it is trivial to bypass. But the downside of using these additional PCRs is that you need to manually unlock with a LUKS2 password and reseal the keys in TPM whenever the kernel and or initrd updates.

Of course to be really secure, you want to require a PIN in addition to TPM to unlock the disk under any OS. But Microsoft's TPM-only implementation is fairly secure with only a few advanced vulnerabilities such as LogoFAIL and cold boot attacks.

[–] IHawkMike 11 points 2 weeks ago (2 children)

most of those drinks are specifically designed with the ice in mind

Citation Needed

[–] IHawkMike 3 points 2 weeks ago

I use it for providing a text summary of YouTube videos that I can parse quickly. Because everything has to be a gorram video these days.

[–] IHawkMike 3 points 2 weeks ago

Or at least mark it NSFW. 😅

 

Berlin artist Simon Weckert used 99 phones and a handcart to create a "virtual traffic jam" on Google Maps

 

Sure it's almost worthless with blackout restrictions if you're in your team's market. But free is free and it sometimes comes in handy when traveling.

Redeem by April 1st.

40
submitted 1 year ago* (last edited 1 year ago) by IHawkMike to c/[email protected]
 

A stick!

view more: next ›