Pre-boot authentication

From Wikipedia, the free encyclopedia
Jump to navigation Jump to search

Pre-boot authentication (PBA) or power-on authentication (POA)[1] serves as an extension of the BIOS or boot firmware and guarantees a secure, tamper-proof environment external to the operating system as a trusted authentication layer. The PBA prevents anything being read from the hard disk such as the operating system until the user has confirmed they have the correct password or other credentials.[2]

Uses of pre-boot authentication[edit]

Pre-boot authentication Process[edit]

A PBA environment serves as an extension of the BIOS or boot firmware and guarantees a secure, tamper-proof environment external to the operating system as a trusted authentication layer.[2] The PBA prevents Windows or any other operating system from loading until the user has confirmed he/she has the correct password to unlock the computer.[2] That trusted layer eliminates the possibility that one of the millions of lines of OS code can compromise the privacy of personal or company data.[2]

Generic boot sequence[edit]

  1. Basic Input/Output System (BIOS)
  2. Master boot record (MBR) partition table
  3. Pre-boot authentication (PBA)
  4. Operating system (OS) boots

Pre-boot authentication technologies[edit]

Combinations with full disk encryption[edit]

Pre-boot authentication is generally provided[citation needed] by a variety of full disk encryption (FDE) vendors, but can be installed separately[citation needed]. Legacy FDE systems tended to rely upon PBA as their primary control. These systems have been replaced with hardware-based dual-factor systems like TPM chips. However, without some form of authentication, encryption provides little protection.[citation needed] Generally this authentication comes from Active Directory authentication at the GINA step of Windows.

PBA is easily defeated with Evil Maid style of attacks. However, with modern hardware (including TPM) most FDE solutions are able to ensure that removal of hardware for brute-force attacks is no longer possible.[citation needed]

Authentication methods[edit]

The standard complement of authentication methods exist for pre-boot authentication including:

  1. Something you know (e.g. username/password)
  2. Something you have (e.g. smart card or other token)

References[edit]

  1. ^ "Sophos brings enterprise-level encryption to the Mac". Network World. August 2, 2010. Retrieved 2010-08-03.
  2. ^ a b c d e "Pre-Boot Authentication". SECUDE. February 21, 2008. Archived from the original on 2012-03-04. Retrieved 2008-02-22.