Hi,
I think it would be nice to allow stage 1 to check the hash of stage 2 in order to support secure boot. I'm not a macos expert but IIUC currently an evil maid could boot from a usb [0], mount the efi partition, and replace the stage 2 with a malicious binary without entering the admin password. All that renders locking of downstream u-boot and grub moot. It would be nice to be able to simply set the hash of stage 2 via a config variable.
[0] If booting from usb requires a full-security mode, then I suppose one could boot from an official macos installers, install a separate macos, perform the attack, and then clean up the macos afterwards.
Hi,
I think it would be nice to allow stage 1 to check the hash of stage 2 in order to support secure boot. I'm not a macos expert but IIUC currently an evil maid could boot from a usb [0], mount the efi partition, and replace the stage 2 with a malicious binary without entering the admin password. All that renders locking of downstream u-boot and grub moot. It would be nice to be able to simply set the hash of stage 2 via a config variable.
[0] If booting from usb requires a full-security mode, then I suppose one could boot from an official macos installers, install a separate macos, perform the attack, and then clean up the macos afterwards.