But those issues would not arise without the counter being incremented in the first place. With unlocked bootloaders, this should be a choice.
Conversation
Rollback is disabled before it updates the anti-rollback counter.
1
It still hurts custom rom users. I already don't care about my safetynet state, why should I be locked to an android 13 bootloader for security issues that I choose to not care about?
1
3
Rollback protection is part of verified boot. It has existed for the SoC boot chain, secure element and the OS itself for many years. Pixels have used it for the OS and secure element for years. It wasn't used in practice for SoC boot chain due to being a development annoyance.
1
2
An important security feature not being fully implemented due to it being a development annoyance is problematic. GrapheneOS is an aftermarket OS focused on Pixels and we wanted this feature to start being used properly and complained about it not being done on the past devices.
2
1
Not everyone using an aftermarket OS wants to roll back the security model and disable security features. Proper verified boot is a small part of what we expect potential hardware partners to implement. It's not proper verified boot if firmware bypasses aren't fixed like this.
1
You're welcome to use something other than GrapheneOS if you don't want the standard security model and hardware-based security features intact. Rollback protection is a basic security feature and has already been used for years, just not for the early SoC boot chain in practice.
2
And ultimately, that's why I don't use GrapheneOS.
But it could be a great OS if it didn't insist on denying owners control of their devices, so it's a shame.
It's looking like this case wasn't even a security fix, just DRM.
1
Verified boot is an important security feature primarily used to make privileged persistence much more difficult for an attacker. If they can simply write out a vulnerable SoC boot chain, it doesn't work. It's secondarily used for anti-tampering and the same thing applies to it.
2
This firmware also contains the TEE code. Secure element is separate and has separate rollback protection for itself. Both TEE and secure element are part of providing hardware support to make encryption better, and both the TEE and secure element provide hardware keystores too.
If you don't have rollback protection, then an attacker can downgrade the TEE and secure element firmware to the oldest published version to have the weakest possible target to attack. TEE is part of SoC firmware and is covered by this SoC rollback protection version.
1
Just chiming in: Is TEE strictly necessary or can a ROM just decide to not use it at all?
1


