Hi all,
AEM requires TXT. Is there a way to have a working, secured measured boot without TXT/AMD SKINIT? Anyway TXT requires me to trust BIOS and same for mechanisms like UEFI secure boot; at least CRTM is supposed to be read-only while SMM, AFAIK, doesn’t have that recommendation/requirement?
Alternatively, is there a way to force enable TXT on non-vPro chipset?
I had actually asked a similar question before, but now I realize I XY problemed myself. I am still talking about the same computer though. B760/TPM2 (fTPM)/UEFI
I remember I saw somewhere on qubes-issues Github tracker that safeboot would be integrated, would combining that with tpm2-totp provide a reasonably secure measured boot solution?
Small edit: Threat model: I want to protect myself against my dualbooted Windows attacking the Qubes install and my threat model does not include firmware reflashing which is obviously insane, such as Equation Group-style HDD firmware reflash. It only includes threats, including limited firmware reflashing, which might be plausibly generalizable, such as BIOS/UEFI firmware reflashing, where an attacker could try to (e.g.) inject into DXE and compromise the bootloader. (and everything goes downhill from there)