Skip to content

Additional sources of entropy under UEFI (at least on Windows systems) #2

@Wack0

Description

@Wack0

Windows (bootloaders and userland) saves a bunch of entropy to UEFI variables, under GUID eaec226f-c9a3-477a-a826-ddc716cdc0e3 (aka EfiIDNamespaceVariable) - this could be used to seed an RNG alongside device path if present:

  • UnlockID (boot services only) and UnlockIDCopy (boot and runtime services) - 32 bytes of data coming out of UEFI CSPRNG services, used to ensure a device-specific secure boot policy (etc) is intended for the correct system, set by bootmgr
  • OfflineUniqueIDEKPub - set in various places, if TPM is present, to the TPM endorsement key public key
  • OfflineUniqueIDRandomSeed - set in various places, if TPM isn't present, to 32 bytes of data coming out of BCrypt CSPRNG

At least some or all of these may be present as long as windows has booted on a system once.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions