Is your feature request related to a problem? Please describe.
I tested some /boot/ replay attacks against heads with a Nitrokey in HOTP mode. Usually they resulted in PCR XYZ mismatch and spawned an emergency shell on default boot.
Selecting "Show OS boot menu" resulted in no error at all and just returned me to the previous menu.
Describe the solution you'd like
Some error clearly saying that the user might be victom to a replay attack.
Describe alternatives you've considered
Current situation: Cryptic messages or none at all.
Additional context
To test, I reused an old signed /boot/kexec_hashes.txt with the corresponding files. I kept the other kexec_* files.
Is your feature request related to a problem? Please describe.
I tested some
/boot/replay attacks againstheadswith a Nitrokey in HOTP mode. Usually they resulted inPCR XYZ mismatchand spawned an emergency shell on default boot.Selecting "Show OS boot menu" resulted in no error at all and just returned me to the previous menu.
Describe the solution you'd like
Some error clearly saying that the user might be victom to a replay attack.
Describe alternatives you've considered
Current situation: Cryptic messages or none at all.
Additional context
To test, I reused an old signed
/boot/kexec_hashes.txtwith the corresponding files. I kept the otherkexec_*files.