Boot firmware

From Kicksecure
Jump to navigation Jump to search

todo

Introduction[edit]

Documentation for this is incomplete. Contributions are happily considered! See this for potential alternatives.

Kicksecure BIOS Boot Compatibility[edit]

Kicksecure is compatible with BIOS. Switching to EFI is optional.

Kicksecure EFI Boot Compatibility[edit]

Kicksecure is compatible with EFI. Disabling EFI is optional. However, if the user keeps EFI enabled, then DKMS key enrollment is recommended, which is documented on the Secure Boot wiki page.

Kicksecure coreboot Compatibility[edit]

Untested. But if coreboot is compatible with Debian on the motherboard, then Kicksecure should also be functional.

BIOS vs EFI[edit]

Some motherboards only support BIOS and do not yet have EFI support. Others support only EFI and no longer have BIOS support.

Some motherboards support both, BIOS and EFI. The user can choose either in the firmware setup.

What should be preferred? If only one option is available, use whatever is available.

What if the user can select BIOS versus EFI?

EFI (Extensible Firmware Interface) is significantly more complex than BIOS (Basic Input/Output System). One key difference is EFI's reliance on NVRAM (Non-Volatile Random-Access Memory), which functions similarly to a hard drive but is actually a chip integrated into the computer's motherboard.

In BIOS-based systems, all information required to boot the system could be stored on an external device, such as a USB hard drive. EFI, however, operates differently. It typically writes part of the essential boot information to the NVRAM, which is specific to each motherboard.

This architectural difference has important implications for system migration. When a user wants to transfer their hard drive from one computer to another (due to hardware issues or upgrades, for example), they may encounter problems. Unlike with BIOS systems, an EFI-based hard drive will likely be unbootable on the new hardware because it lacks the specific NVRAM data from the original motherboard.

Kicksecure's ISO installer (based on Calamares) attempts to mitigate this issue. [1]

EFI comes with a lot more challenges for Linux distributions. See footnote for details. [2] Among these challenges is Secure Boot. See Secure Boot user documentation and Complexities and security concerns of Secure Boot in the context of Linux distributions.

forum discussion: BIOS vs EFI vs coreboot vs librebootarchive.org

payload SeaBios or TianoCore

https://docs.dasharo.com/unified-test-documentation/dasharo-security/206-secure-boot/archive.org

See Also[edit]

Footnotes[edit]


Unfinished: This wiki is a work in progress. Please do not report broken links until this notice is removed, use Search Engines First and contribute improving this wiki.

We believe security software like Kicksecure needs to remain Open Source and independent. Would you help sustain and grow the project? Learn more about our 12 year success story and maybe DONATE!