UEFI Secure Boot 㨠Linux ã®å¾®å¦ãªé¢ä¿
æ°ãã PC ãç©è²ãããªãã§ãLinux ãèµ·åã§ããã®ãæ°ã«ãªãã®ã§ãUEFI Secure Boot ã«ã¤ãã¦èª¿ã¹ã¦ããã
ã»ãã¥ãªãã£ã§ãããããå®å
¨æ§ã¨å©ä¾¿æ§ã®ãã¬ã¼ããªãã®è©±ã§ã¯ããã®ã ãã©ãä»åã¯å ´åã«ãã£ã¦ã¯ Linux ãå
¨ãèµ·åããªããªãã®ã§è©±ãéãã
ã¾ã åå¼·ä¸ã ãã©ã調ã¹ããã¨ãé 次ã¾ã¨ãã¦ããã
- å®è£
- Insyde H2O
- AMI Aptio
- Phoenix SecureCore? Tiano
UEFI Secure Boot 㯠Windows 8 ä¸ä»£ã® PC ããæè¼ããã¦ããæ©è½ã
http://windows.microsoft.com/ja-JP/windows-8/system-requirements
ã»ãã¥ã¢ ãã¼ãã«ã¯ãUEFI v2.3.1 Errata B ããµãã¼ãããUEFI ç½²åãã¼ã¿ãã¼ã¹ã« Microsoft Windows 証ææ©é¢ãå«ã¾ãã¦ãããã¡ã¼ã ã¦ã§ã¢ãå¿ è¦ã§ã
ãã®æ©è½ãæå¹ã«ãªã£ã¦ããã¨ãPC 㧠Windows 8 以å¤ã® OS (Windows XP ã Linux ãªã©) ãèµ·åã§ããªãã®ã ãã
"Designed for Windows 8" ã·ã¼ã«ãè²¼ã£ã¦ãã PC ã§ã¯å·¥å ´åºè·ç¶æ
ã§æå¹ã«ãªã£ã¦ããæ©è½ãªã®ã§ã
ãã®ã¾ã¾ã ã¨ä»å¾ã® PC ã§ã¯ Linux ãæ¨æºã§èµ·åã§ããªããªãã¨ãããæããã話ã
https://sysdev.microsoft.com/ja-JP/Hardware/LPL/
http://download.microsoft.com/download/A/D/F/ADF5BEDE-C0FB-4CC0-A3E1-B38093F50BA1/windows8-hardware-cert-requirements-system.pdf
System.Fundamentals.Firmware.UEFISecureBoot
Target Feature: System.Fundamentals.Firmware
Title: All client systems must support UEFI Secure boot
Applicable OS Versions
ã»Windows 8 (x86)
ã»Windows 8 (x64)
ã»Windows RT
ã»Windows Server 2012
Description
Note: These requirements are "If Implemented" for Server systems and apply only if a Server system supports UEFI Secure Boot.
1. Mandatory. For the purposes of UEFI Secure Boot, the platform shall expose an interface to Secure Boot, whereby the system firmware is compliant with the following sections and sub-sections of UEFI version 2.3.1 Errata B:
a. 7.1
b. 7.2
c. 7.2.1
d. 27.2
e. 27.5 - 27.8 (as further profiled below).
2. Mandatory. Secure Boot must ship enabled Configure UEFI Version 2.3.1 Errata B variables SecureBoot=1 and SetupMode=0 with a signature database (EFI_IMAGE_SECURITY_DATABASE) necessary to boot the machine securely pre-provisioned, and include a PK that is set and a valid KEK database. The system uses this database to verify that only trusted code (for example: trusted signed boot loader) is initialized, and that any unsigned image or an image that is signed by an unauthorized publisher does not execute. The contents of the signature database is determined by the OEM, based on the required native and third-party UEFI drivers, respective recovery needs, and the OS Boot Loader installed on the machine. The following Microsoft-provided EFI_CERT_X509 signature shall be included in the signature database: "CN=Microsoft Windows Production PCA 2011" and "Cert Hash(sha1): 58 0a 6f 4c c4 e4 b6 69 b9 eb dc 1b 2b 3e 08 7b 80 d0 67 8d" which shall use the following SignatureOwner GUID: {77fa9abd-0359-4d32-bd60-28f4e78f784b}, must also be included in the form of either an EFI_CERT_X509_GUID or EFI_CERT_RSA2048_GUID type.
Note: Must NOT contain the following certificate: "CN=Microsoft Windows PCA 2010" and "Cert Hash(sha1): c0 13 86 a9 07 49 64 04 f2 76 c3 c1 85 3a bf 4a 52 74 af 88"
Note II: Windows Server systems may ship with Secure Boot disabled, but all other provisions of this sub-requirement must be met
ã¨ã¯ããããã®æ©è½ã¯ UEFI ã®è¨å®ã§ç¡å¹ã«ã§ãã (PC ã¡ã¼ã«ã¼ã®å®è£
次第) ã®ã§ãä»å¾ã® PC 㧠Linux ãå
¨ã使ããªããªãã¨ããããã§ããªãã
http://blogs.msdn.com/b/b8/archive/2011/09/22/protecting-the-pre-os-environment-with-uefi.aspx
Who is in control?
At the end of the day, the customer is in control of their PC. Microsoftâs philosophy is to provide customers with the best experience first, and allow them to make decisions themselves. We work with our OEM ecosystem to provide customers with this flexibility. The security that UEFI has to offer with secure boot means that most customers will have their systems protected against boot loader attacks. For the enthusiast who wants to run older operating systems, the option is there to allow you to make that decision.
http://blog.canonical.com/2011/10/28/white-paper-secure-boot-impact-on-linux/
we recommend that PCs include a User Interface to easily enable or disable Secure Boot and allow the user to chose to change their operating system.
ã ãã©ãSecure Boot ãç¡å¹ã«ããã¨ãä»åº¦ã¯ Windows 8 ãèµ·åã§ããªããªãã±ã¼ã¹ãããããã (åãå®æ©ã§ç¢ºãããç¯å²ã§ã¯ãã®ãããªãã¨ã¯ç¡ãã£ãã®ã§ãæ å ±ããã°æãã¦ãã ãã)ã
ã¤ã¾ãã(ä¸è¨ã®æ
å ±ãæ£ãããªã) Windows 8 㨠Linux ã®ãã¥ã¢ã«ãã¼ããããã«ã¯ãLinux ã§ãåºè·ç¶æ
ã® Secure Boot ã«å¯¾å¿ããå¿
è¦ããããã¨ã«ãªãã
(ãã¥ã¢ã«ãã¼ãã«ããªãã¦ããä»®æ³åã§åããã°ããããããã¨ãã話ã¯èã«ç½®ãã¦ãã)
(ã²ãã£ã¨ããã¨ãWindows 8 ãèµ·åããªããªãã¨ããã®ã¯ãéµãå¤æ´ããå ´åã®è©±ãªã®ãããããªãã)
http://mjg59.dreamwidth.org/12368.html
A system in custom mode should allow you to delete all existing keys and replace them with your own. After that it's just a matter of re-signing the Fedora bootloader (like I said, we'll be providing tools and documentation for that) and you'll have a computer that will boot Fedora but which will refuse to boot any Microsoft code.
Secure Boot ã¸ã®å¯¾å¿ã¯ The Linux Foundation, Ubuntu, RedHat/Fedora, SUSE çãåã
ã®æ¹æ³ã§é²ãã¦ããããã ãã©ãã©ããã¾ã é²è¡ä¸ã®ãããã
The Linux Foundation ã¯ãã¤ã¯ãã½ããã®ç½²åãµã¼ãã¹ã使ã£ã¦ pre-bootloader ãç½²åãã¦ããã£ã¦ããã
pre-bootloader 㧠UEFI Secure Boot ããã¹ããå¾ãé常㮠bootloader ã§èµ·åããããã¨ããã¢ããã¼ããããã
ãã®è©¦ã¿ããã¾ãããã°ããµã¤ã㧠pre-bootloader ãå
¬éãã¦ããããã®ã§ãå
¨ã¦ã® Linux ãã£ã¹ããªãã¥ã¼ã·ã§ã³ã«æ©æµãããããã
The process of obtaining a Microsoft signature will take a while, but once it is complete, the pre-bootloader will be placed on the Linux Foundation website for anyone to download and make use of.
http://www.linuxfoundation.jp/content/jp_linux-foundation-uefi-secure-boot-system-open-source
Microsoft ã®ç½²åãåå¾ããã¾ã§å°ãæéããããã¾ãããããããå®äºããã°ãããªãã¼ããã¼ãã¼ã¯ The Linux Foundation ã® Web ãµã¤ãã«ç½®ãããã ãã§ããã¦ã³ãã¼ããã¦ä½¿ããã¨ãã§ãã¾ãã
ã ãã©ããã¤ã¯ãã½ããã®æç¶ãå¾ ã¡ã§é²ãã§ããªãã¿ããã
Weâre still waiting for Microsoft to give the Linux Foundation a validly signed pre-bootloader.
Ubuntu ã¯ãã¤ã¯ãã½ããã§ã¯ãªã Canonical ã®éµã使ã£ã¦ãã¼ããã¼ãã¼ã«ç½²åãã¦ããæ¹éã
PC ã¡ã¼ã«ã¼ (OEM/ODM) ã«éµã®æè¼ãåãããã¦ãã¦ãUbuntu ããªã¤ã³ã¹ãã¼ã«ãª PC ã§ã¯ Secure Boot ã使ããããã«ãªãã¨ãããã¨ãããã
http://blog.canonical.com/2012/06/22/an-update-on-ubuntu-and-secure-boot/
Canonical has generated an Ubuntu key, and we are in active discussions with partners to implement simple ways for enterprises and consumers to use this key. These conversations have not concluded, and as a result we cannot detail the plans of our OEM partners yet.
ãã ããã¤ã³ã¹ãã¼ã« CD ã§ã¯ããã¯ããã¤ã¯ãã½ããã®éµã使ãã¨ã®ãã¨ã
https://lists.ubuntu.com/archives/ubuntu-devel/2012-June/035445.html
Booting our CDs will rely on a loader image signed by Microsoft's
WinQual key, for much the same reasons as Fedora: it's a key that,
realistically, more or less every off-the-shelf system is going to have,
as it also signs things like option ROMs, and the UEFI specification
only allows an image to be signed by a single key.
RedHat/Fedora ã®ä¸ã®äººã®èãã§ãããã¤ã¯ãã½ããã«ç½²åãã¦ãããã®ãç¾å®çã ã¨ããçµè«ã
http://mjg59.dreamwidth.org/12368.html
The last option wasn't hugely attractive, but is probably the least worst. Microsoft will be offering signing services through their sysdev portal. It's not entirely free (there's a one-off $99 fee to gain access edit: The $99 goes to Verisign, not Microsoft - further edit: once paid you can sign as many binaries as you want), but it's cheaper than any realistic alternative would have been. It ensures compatibility with as wide a range of hardware as possible and it avoids Fedora having any special privileges over other Linux distributions. If there are better options then we haven't found them. So, in all probability, this is the approach we'll take. Our first stage bootloader will be signed with a Microsoft key.
http://www.zdnet.com/blog/open-source/linus-torvalds-on-windows-8-uefi-and-fedora/11187
What Fedora ended up doing was using Microsoft's secure boot key signing services through their sysdev portal for one-off $99 fee.
Debian é£å¶ã¯ DebConf 12 ã®æç¹ã§ã¯ä½ã決ã¾ãããæ¥å¹´ã® Wheezy ã¾ã§ã«ã¯æ±ºãããã¨ãããã¨ãããã
http://www.phoronix.com/scan.php?page=news_item&px=MTEzNjU
While this work was discussed, nothing genuinely new was brought up during the 45-minute discussion. It's still not decided what approach Debian will ultimately support whether it's like Fedora using GRUB2 and singing the entire stack, Ubuntu using efilinux and only signing the low-level bits, or some entirely new approach for handling EFI/SecureBoot. However, something has to be decided for Debian 7.0 "Wheezy" seeing as when it ships early next year there will be a number of motherboards and PCs shipping with this headache-inducing technology.
ããããè²ã
ãªåãã¯ããã®ã ãã©ãã¾ã æ´»åä¸ã§æ±ºå®ççãªã¢ããã¼ãã¯æ±ºã¾ã£ã¦ããªãã
Linux ãªã®ã§ãè¤æ°ã®ã¢ããã¼ããå
±åãã¦ãããã¨ã«ãªãã¨ã¯æããã
ãããã«ãPC ã¡ã¼ã«ã¼ã Canonical ãªã©ã® Linux ç¨ã®éµãå
¨ã¦ã® PC ã«æè¼ããã¢ããã¼ã·ã§ã³ã¯ä½ãã¯ãã
(Dell ã Ubuntu ã¢ãã«ãåºããããã¦ããã®ã§ãä¸é¨ PC ã«ã¯æè¼ããããããããªã)
å®è³ªçã«ãä»å¾ã®å
¨ã¦ã® PC ã«æè¼ãããã®ã¯ãã¤ã¯ãã½ããã®éµã ããªã®ã§ã
Secure Boot ãæå¹ãª PC ã«å¯¾å¿ããããã«ã¯ã
ã©ããã§ãã¤ã¯ãã½ããã®ç½²åãå¿
è¦ã¨ãªãã®ãç¾å®ããªã
ãã¤ã¯ãã½ããã®ç½²åãµã¼ãã¹ (æå) ã使ã£ã¦èªåã®ã¢ã¸ã¥ã¼ã«ã«ç½²åãã¦ããããã¨ãã§ãããããããªããã©ã
The Linux Foundation ãå¾
ãããã¦ãããããªã®ã§ãå人ã§æç¶ããã¦ã¹ã ã¼ãºã«é²ãã¨ã¯æããªãã
(The Linux Foundation ã ããå¾
ãããã¦ããã¨ããå¯è½æ§ãããã®ã§ããã£ã¦ã¿ã価å¤ã¯ãããããããªã)
http://sysdev.microsoft.com/
http://msdn.microsoft.com/en-us/library/windows/hardware/gg463091.aspx
ã¨ããããã§ãã¾ã ã¾ã 調æ»ä¸ã
SUSE ã® MOK ã使ãèãæ¹ããshim ã«ã¤ãã¦ãããã®ãã¡ã¾ã¨ãã¦ã¿ãã
http://mjg59.dreamwidth.org/17542.html
http://mjg59.dreamwidth.org/20303.html
https://www.suse.com/blogs/uefi-secure-boot-details/