Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Does bitleaker have a log? #6

Open
roboknight opened this issue Oct 9, 2020 · 3 comments
Open

Does bitleaker have a log? #6

roboknight opened this issue Oct 9, 2020 · 3 comments

Comments

@roboknight
Copy link

roboknight commented Oct 9, 2020

I was wondering if bitleaker has some kind of log for when you are attempting to boot windows to discover what the TPM messaging looks like? If so, how can I activate it? If not, do you have any ideas on how to implement one? I don't know what kind of logging grub already has available. My current quick approach would be a video camera I guess.

@roboknight
Copy link
Author

roboknight commented Oct 9, 2020

This is just a note for running bitleaker: If you are trying to boot windows using bitleaker, the following commands will help --

search --no-floppy --file /EFI/Microsoft/Boot/bootmgfw.efi --set temp
set root="($temp)"
chainloader "($temp)/EFI/Microsoft/Boot/bootmgfw.efi"
.
.
.
stuff from bitleaker
.
.
.
boot
.
.
.
more stuff from bitleaker
.
.
.

I just put this note here because I had the hardest time getting windows to boot with secure mode and it was likely because I wasn't setting the root variable, which is needed.

@kkamagui
Copy link
Owner

Hi @roboknight ,

Do you want to see the measurement log of BIOS/UEFI firmware? If so, you can find it with the "sudo dmesg" command after executing Bitleaker. You don't need to record the messages on screen because Bitleaker saves them into the kernel area. ;)

If it's not the exact point that you want to know, feel free to ask me. :)

Best regards,

Seunghun

@roboknight
Copy link
Author

I was trying to see the output that bitleaker leaves. It is very convenient because the output of bitleaker's "SEND/RECV" format shows the same commands as if you were monitoring the TPM with hardware (my usual method... but fTPM I can't do that). And I was able to compare commands between the two and see what PCR registers were being extended and with what values. The value I posted in the other "issue" does seem to be correct across two devices. This tells me that, for the MOST part, the shim doesn't matter. It does matter, though, in two other spots. But THOSE spots are all stored in the log. So I believe your technique will work, and that value you had for PCA hash, is instead, the value that I posted. But it is extended with a SHA1 hash, instead of a SHA256. I was trying to determine how I could calculate this value, just to know for sure what is going on there, but since I'm able to independently verify it two ways, I'm not worried that its the wrong value.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants