This assumes that:
- Machine is powered off
- No UEFI backdoors
- No Reflashing the firmware
- No clearing the NVRAM (The point is to modify/read a small amount of NVRAM, instead of resetting it)
- Device requires password to POST (Enforced by BIOS/UEFI)
- Physical access
And I think this might be an XY problem, so:
I'm trying to use the TPM PCRs 0 and 7 to have disk encryption. Currently, I have to enter a TPM pin (set using systemd-cryptenroll
) during Linux boot. I want to set up a POST password instead, so the attack surface is reduced (My device allows to boot from external devices even if UEFI password is set).
If the Secure Boot keys are wiped, then the device should be rendered unusable. But if the attacker can somehow reset just the UEFI password through modifying NVRAM, then he can gain full access. What I'm asking is:
Is there some form of encryption in the NVRAM in place if I add a UEFI password?
Device is Lenovo IdeaPad S340-14IIL
EDIT: Added PCR 1, so now I'm using PCRs 0,1,7. I think this is plenty safe.