BIOS vs EFI vs coreboot vs libreboot

I haven’t made up my mind yet. Here are some information which are conflicting.

Some thing for Advanced Security Guide - Whonix.


coreboot / libreboot should be preferred above all else since it is Libre Software / Open Source.

But since coreboot / libreboot has very limited hardware support, the other options also need some documentation / recommendation.

There is no feature like secure boot for coreboot / libreboot yet?


EFI should be discouraged because it is more open and standardized yet it is still obscure closed source like BIOS.

So infections that persist even reinstallations are more likely when using EFI. Therefore, In the question is only EFI vs BIOS, it would mean a clear recommendation for BIOS.


EFI and secure boot should be encouraged. AEM can measure malicious modifications, but secure boot can provide a chain of verification from the processor the the firmware (EFI) to the bootloader to the kernel.

There is an issue when secure boot gets implemented as restricted boot, but one could use the presigned shim bootloader or deploy its own secure boot keys.

Debian is working on secure boot.

https://wiki.debian.org/SecureBoot

Qubes does not have it yet. Other linux operating systems may already support it.

2 Likes

Noted! :slight_smile:

1 Like

Whonix for VirtualBox developer builds now are compatible with both, legacy BIOS booting and EFI booting.

Booting with SecureBoot enabled is also supported.

It is therefore possible to switch VirtualBox settings:

  • EFI: on / off
  • SecureBoot: on / off [requires EFI]

Enabling SecureBoot breaks tirdad.

This is because tirdad isn’t signed by Debian but with the local DKMS yes. That key however isn’t enrolled by default into the system’s keyring (MOK).

If there’s a solution and if enabling SecureBoot (or even EFI) in VMs makes sense yet is yet to be determined.

related:

1 Like

Secureboot on VMs seems absurd, it’s already hard dealing with it on a host. But if you do need any help testing anything related to this out, please @ let me know and I will do!

Would also break LKRG.

EFI still causing issues up to this day.

EFI inside VirtualBox breaks Debian Installer (the traditional one, not Calamares):
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1036019

Therefore probably better to not enable EFI by default. Having EFI booting compatibly however is a nice feature.