Pre-boot authentication

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by 128.54.40.158 (talk) at 17:51, 20 August 2008 (Two typos). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.


Pre-Boot Authentication (PBA) serves as an extension of the BIOS or boot firmware and guarantees a secure, tamper-proof environment external to the operating system as a trusted authentication layer. The PBA prevents anything being read from the hard disk such as the operating system until the user has confirmed he/she has the correct password or other credentials.[1]

Benefits of Pre-Boot Authentication

How Pre-Boot Authentication Works

Generic Boot Sequence

1) Basic Input Output System 2) Master Boot Record Partition Table 4) Pre-Boot Authentication 5) Operating System Boots

A PBA environment serves as an extension of the BIOS or boot firmware and guarantee a secure, tamper-proof environment external to the operating system as a trusted authentication layer. The PBA prevents Windows or any other operating system from loading until the user has confirmed he/she has the correct password to unlock the door. That trusted layer eliminates the possibility that one of the millions of lines of OS code can compromise the privacy of personal or company data.

File:Pba001.png
The Boot Sequence with PBA

Misnomer

Sometimes pre-Boot Authentication is a misnomer since a basic OS can be loaded prior to the main operating system in some implementations. Pre-boot authentication can take on a number of forms, it can be a start up (BIOS) password implemented on the Motherboard, or in on the boot volume itself. In the latter instance the boot sector of a hard drive is overwritten with a small executable which starts the decryption of the drive and hands off the credientals to Windows to continue booting. While, the Truecrypt[2] is an full disk encryption system it is also pre-boot authentication since you need to enter a password for the drive to boot.

Pre-Boot Authentication Technologies

Combinations with Full Disk Encryption

Pre-Boot Authentication is generally provided by a variety of full disk encryption vendors, but can be installed separately. Some FDE solutions can function without Pre-Boot Authentication, such as hardware-based full disk encryption. However, without some form of authentication, encryption provides little protection.

Linux-based Pre-Boot Authentication

Linux uses a well-known and proven UNIX-based security model. The enormous pool of developer talent is linked to this subject as a large number of individuals with different desires for an environment are pushing and pulling for the most extensible environment possible. The has made Linux remarkably flexible, with the ability to configure a Linux kernel to easily suit individuals needs. This was key reason that the NSA used Linux as the basis for creating a secure operating system. [3]

As an open source solution, there are a great variety of developers seeking to use Linux for a variety of purposes, and that means a large amount of driver development often available for free. Smartcard or biometric vendors can have their devices ported to Linux at no cost to themselves. That means greater compatibility and flexibility for future development. In addition, Linux is well-known for playing nice with installed OSes and BIOS, as well as being widely accepted worldwide by both large and small entities.

There are at least five common CPU architectures, and Linux runs on all of them. Proprietary OSes have advantages, but are limited to those architectures they are actually designed for. By virtue of the fact that its developers have wide-ranging interests and use cases, Linux has been developed to be completely portable to any widely distributed CPU architecture. [4]

The number of potential conflicts from various security vendors providing their own proprietary operating systems and methodology can interfere with each other and the main Operating System, mean a chaotic mess of race conditions. BIOS incompatibilities, and bootstrap failures.

Authentication Methods

The standard complement of authentication methods exist for Pre-Boot Authentication including:

  1. Something you know (i.e. username / password)
  2. Something you have (i.e. smart card or other token)
  3. Something you are (i.e. biometric data)

References

  1. ^ a b >"Pre-Boot Authentication". Secude. February 21, 2008. Retrieved 2008-02-22.
  2. ^ http://truecrypt.org
  3. ^ NSA & Linux OS
  4. ^ linux kernel monkey log