Skip to content

daboynb/detect_evil_maid

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

59 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

If you wanna help me

Buy Me A Coffee

Pre-requisistes

  1. You'll need a pc with:

    • uefi enabled
    • secure boot enabled
    • tpm enabled
  2. Set in the bios

    • power-on passowrd
    • bios password

They can be easily bypassed (see bios-pw.org) but if someone will bypass them with a master key, at the next boot you will notice the absence of the prompt that ask for the password.

  1. Linux installation with encrypted /.

Considerations

On a classic setup, or the one above we have two unencrypted partitions, /boot and /efi.
My workarounds to detect the evil maid attack.

  1. The shasum of the partitions dump changes every reboot, so I've decided to check the sha512 of every file in the /boot and /efi partition and compare them every startup. Note -> if you start windows, the script will detect the changes in the windows entries, I personally want it but if you don't; change the first check to exclude the Microsoft folder inside the /efi partition.
  2. Since it calculates all files hashes inside the /boot partition, it detects if a new file got created too .... like a txt containing the password.

With that, if someone will do an evil maid attack we'll notice it and since the script is configured to not power on internet until all checks are passed, the grabbed password will not be transmitted. There're other things to consider.... Two at least: uefi malware and ssd or hdd with a malware in the firmware. So here's my effort trying to mitigate the impossible.

  • extracts ssd infos like Model Number, Serial Number, Firmware Revision etc... and compares them every startup.
  • extracts bios infos like Version, Release Date, Runtime Size, ROM Size etc... and compares them every startup.
  • extracts the hashes from pcr_0 (tpm) that is where bios and extensions are located and compares them every startup.
  • check the tpm slot that have the initrd hash and compare it every startup.

Extras

This script do other things too:

  • updates the system
  • disables internet at boot and enables it only when all checks are passed

The commands that update the system and install the dependencies are for debian based distros, if you have something else replace them with your package manager.

Running

Download the script. Open it and change the variables as you need.

  ssd=/dev/sda # put your hdd or ssd name
  ethernet=eth0 # put your network ethernet interface name 
  wireless=wlan0 # put your wireless interface name

If you want the old eth0 and wlan0 type on terminal:

   sudo sed -i 's/^GRUB_CMDLINE_LINUX_DEFAULT="/&net.ifnames=0 biosdevname=0 /' /etc/default/grub && sudo update-grub 

If you have changed the network interfaces with the command above please reboot before run the script.
When it starts, it installs all the dependencies and create the hashes.
To run on startup on gnome put the check.desktop inside ~/.config/autostart and change the path of check.sh enjoy.

This is my currently setup not a guide, feel free to follow or not. Dual boot windows & linux both encrypted.

Install Windows

  • we need to create two partitions, one for efi and one for c.
  • during the install, when you'll arrive at the partitioning menu delete all partitions and make all the space unallocated
  • press shift and f10
  • on cmd type: diskpart
  • on diskpart type: list disk (to see all disks)
  • on diskpart type: sel disk (the one where you want to install windows)
  • on diskpart type : convert gpt (########### if you have mbr partition table ###########)
  • on diskpart type: create partition efi size=500
  • on diskpart type: create partition primary size=xx the remaining disk size in mb
  • close the cmd, select the c drive and tap install

Post install

This is a personal thing that I do, I don't like to have a windows recovery partition, instead I use a bootable usb if I need it. Your choice to follow or not. Less unencrypted partition we have, less are the probabilities to have problems.

  • open the disks utility, there's will be a third partition
  • open diskpart as admin
  • on diskpart type: list disk (to see all disks)
  • on diskpart type: select disk x (where x is the number of the disk where windows is installed)
  • on diskpart type: list partition (to detect wich one is the third created)
  • on diskpart type: select partition x (where x is the number of the recovery partition grabbed from the command list partition)
  • on diskpart type: delete partition override
  • now if all went well you'll remain with only two partitions, c and efi
  • install veracrypt, chose encrypt the windows system partition and complete the setup

Install Linux

  • boot from the usb your distro and chose install
  • on partition menu :
    • assign the previously created /efi partition as efi
    • create an ext4 partition of 1gb and select as mount point /boot
    • create an ext4 partition with / as mount point and configure it as a volume for physical encryption. Personally I don't use a swap partition, instead I use a swap file. Your choiche.

Post install

  • install grub-customizer
  • open the windows entry and edit it: change /EFI/Microsoft/Boot/bootmgfw.efi to /EFI/VeraCrypt/DcsBoot.efi
  • save the configuration and exit, at reboot you'll be able to choose linux or windows
  • on terminal type: sudo sed -i 's/^GRUB_CMDLINE_LINUX_DEFAULT="/&net.ifnames=0 biosdevname=0 /' /etc/default/grub && sudo update-grub

Know bug if you use the ltsc version of windows (more privacy oriented)

If the Windows search stops working, you can fix that by running the file named 'WinSearch_fix.bat'

Credits for tpm dump

https://github.com/9elements/tpmtool for the extraction of the tpm hashes

Releases

No releases published

Packages

No packages published