Implementing UEFI Secure Boot in Fedora
May. 30th, 2012 11:11 pm![[personal profile]](https://www.dreamwidth.org/img/silk/identity/user.png)
Edit 16:17EDT 31/5/12: Clarification of who gets the $99
Edit 02:10EDT 01/6/12: Clarification that it's a one-off payment
(Brief disclaimer - while I work for Red Hat, I'm only going to be talking about Fedora here. Anything written below represents only my opinions and my work on Fedora, not Red Hat's opinions or future plans)
Fedora 17 was released this week. It's both useful and free, and serves as a welcome addition to any family gathering. Do give it a go. But it's also noteworthy for another reason - it's the last Fedora release in the pre-UEFI secure boot era. Fedora 18 will be released at around the same time as Windows 8, and as previously discussed all Windows 8 hardware will be shipping with secure boot enabled by default. While Microsoft have modified their original position and all x86 Windows machines will be required to have a firmware option to disable this or to permit users to enrol their own keys, it's not really an option to force all our users to play with hard to find firmware settings before they can run Fedora. We've been working on a plan for dealing with this. It's not ideal, but of all the approaches we've examined we feel that this one offers the best balance between letting users install Fedora while still permitting user freedom.
Most hardware you'll be able to buy towards the end of the year will be Windows 8 certified. That means that it'll be carrying a set of secure boot keys, and if it comes with Windows 8 pre-installed then secure boot will be enabled by default. This set of keys isn't absolutely fixed and will probably vary between manufacturers, but anything with a Windows logo will carry the Microsoft key[1].
We explored the possibility of producing a Fedora key and encouraging hardware vendors to incorporate it, but turned it down for a couple of reasons. First, while we had a surprisingly positive response from the vendors, there was no realistic chance that we could get all of them to carry it. That would mean going back to the bad old days of scouring compatibility lists before buying hardware, and that's fundamentally user-hostile. Secondly, it would put Fedora in a privileged position. As one of the larger distributions, we have more opportunity to talk to hardware manufacturers than most distributions do. Systems with a Fedora key would boot Fedora fine, but would they boot Mandriva? Arch? Mint? Mepis? Adopting a distribution-specific key and encouraging hardware companies to adopt it would have been hostile to other distributions. We want to compete on merit, not because we have better links to OEMs.
An alternative was producing some sort of overall Linux key. It turns out that this is also difficult, since it would mean finding an entity who was willing to take responsibility for managing signing or key distribution. That means having the ability to keep the root key absolutely secure and perform adequate validation of people asking for signing. That's expensive. Like millions of dollars expensive. It would also take a lot of time to set up, and that's not really time we had. And, finally, nobody was jumping at the opportunity to volunteer. So no generic Linux key.
The last option wasn't hugely attractive, but is probably the least worst. Microsoft will be offering signing services through their sysdev portal. It's not entirely free (there's a one-off $99 fee to gain access edit: The $99 goes to Verisign, not Microsoft - further edit: once paid you can sign as many binaries as you want), but it's cheaper than any realistic alternative would have been. It ensures compatibility with as wide a range of hardware as possible and it avoids Fedora having any special privileges over other Linux distributions. If there are better options then we haven't found them. So, in all probability, this is the approach we'll take. Our first stage bootloader will be signed with a Microsoft key.
We've decided to take a multi-layer approach to our signing for a fairly simple reason. Signing through the Microsoft signing service is a manual process, and that's a pain. We don't want to have bootloader updates delayed because someone needs to find a copy of Internet Explorer and a smartcard and build packages by hand. Instead we're writing a very simple bootloader[2]. This will do nothing other than load a real bootloader (grub 2), validate that it's signed with a Fedora signing key and then execute it. Using the Fedora signing key there means that we can build grub updates in our existing build infrastructure and sign them ourselves. The first stage bootloader should change very rarely, and we don't envisage updating it more than once per release cycle. It shouldn't be much of a burden on release management.
What about grub? We've already switched Fedora 18 over to using grub 2 by default on EFI systems, but it still needs some work before it's ready for secure boot. The first thing is that we'll be disabling the module loading. Right now you can load arbitrary code into grub 2 at runtime, and that defeats the point of secure boot. So that'll be disabled. Next we'll be adding support for verifying that the kernel it's about to boot is signed with a trusted key. And finally we'll be sanitising the kernel command line to avoid certain bits of functionality that would permit an attacker to cause even a signed kernel to launch arbitrary code. These restrictions will all vanish if secure boot is disabled.
Secure boot is built on the idea that all code that can touch the hardware directly is trusted, and any untrusted code must go through the trusted code. This can be circumvented if users can execute arbitrary code in the kernel. So, we'll be moving to requiring signed kernel modules and locking down certain aspects of kernel functionality. The most obvious example is that it won't be possible to access PCI regions directly from userspace, which means all graphics cards will need kernel drivers. Userspace modesetting will be a thing of the past. Again, disabling secure boot will disable these restrictions.
Signed modules are obviously troubling from a user perspective. We'll be signing all the drivers that we ship, but what about out of tree drivers? We don't have a good answer for that yet. As before, we don't want any kind of solution that works for us but doesn't work for other distributions. Fedora-only or Ubuntu-only drivers are the last thing anyone wants, and this really needs to be handled in a cross-distribution way.
Secure boot is designed to protect against malware code running before the operating system. This isn't a hypothetical threat. Pre-boot malware exists in the wild, and some of it is nastier than you expect. So obviously bootloaders need to be signed, since otherwise you'd just replace the signed bootloader with an unsigned one that installed malware and booted your OS.
But what about the kernel? The kernel is just code. If I take a signed Linux bootloader and then use it to boot something that looks like an unsigned Linux kernel, I've instead potentially just booted a piece of malware. And if that malware can attack Windows then the signed Linux bootloader is no longer just a signed Linux bootloader, it's a signed Windows malware launcher and that's the kind of thing that results in that bootloader being added to the list of blacklisted binaries and suddenly your signed Linux bootloader isn't even a signed Linux bootloader. So kernels need to be signed.
And modules? Again, modules are just code. It's a little trickier, but if your signed kernel loads an unsigned module then that unsigned module can set up a fake UEFI environment and chain into a compromised OS bootloader. Now the attacker just has to include a signed kernel and a minimal initramfs that loads their malware module. It'd slow down boot by a couple of seconds, but other than that it'd be undetectable. X? If you can access the registers on a GPU then you can get the GPU to DMA over the kernel and execute arbitrary code. Trickier again, but still achievable - and if you've locked down every other avenue of attack, it's even attractive.
If we produce signed code that can be used to attack other operating systems then those other operating systems are justified in blacklisting us. That doesn't seem like a good outcome.
A lot of our users want to build their own kernels. Some even want to build their own distributions. Signing our bootloader and kernel is an impediment to that. We'll be providing all the tools we use for signing our binaries, but for obvious reasons we can't hand out our keys. There's three approaches here. The first is for a user to generate their own key and enrol it in their system firmware. We'll trust anything that's signed with a key that's present in the firmware. The second is to rebuild the shim loader with their own key installed and then pay $99 and sign that with Microsoft. That means that they'll be able to give copies to anyone else and let them install it without any fiddling. The third is to just disable secure boot entirely, at which point the machine should return to granting the same set of freedoms as it currently does.
A system in custom mode should allow you to delete all existing keys and replace them with your own. After that it's just a matter of re-signing the Fedora bootloader (like I said, we'll be providing tools and documentation for that) and you'll have a computer that will boot Fedora but which will refuse to boot any Microsoft code. It may be a little more awkward for desktops because you may have to handle the Microsoft-signed UEFI drivers on your graphics and network cards, but this is also solvable. I'm looking at ways to implement a tool to allow you to automatically whitelist the installed drivers. Barring firmware backdoors, it's possible to configure secure boot such that your computer will only run software you trust. Freedom means being allowed to run the software you want to run, but it also means being able to choose the software you don't want to run.
We've been working on this for months. This isn't an attractive solution, but it is a workable one. We came to the conclusion that every other approach was unworkable. The cause of free software isn't furthered by making it difficult or impossible for unskilled users to run Linux, and while this approach does have its downsides it does also avoid us ending up where we were in the 90s. Users will retain the freedom to run modified software and we wouldn't have accepted any solution that made that impossible.
But is this a compromise? Of course. There's already inequalities between Fedora and users - trademarks prevent the distribution of the Fedora artwork with modified distributions, and much of the Fedora infrastructure is licensed such that some people have more power than others. This adds to that inequality. It's not the ideal outcome for anyone, and I'm genuinely sorry that we weren't able to come up with a solution that was better. This isn't as bad as I feared it would be, but nor is it as good as I hoped it would be.
Microsoft's certification requirements for ARM machines forbid vendors from offering the ability to disable secure boot or enrol user keys. While we could support secure boot in the same way as we plan to on x86, it would prevent users from running modified software unless they paid money for a signing key. We don't find that acceptable and so have no plans to support it.
Thankfully this shouldn't be anywhere near as much of a problem as it would be in the x86 world. Microsoft have far less influence over the ARM market, and the only machines affected by this will be the ones explicitly designed to support Windows. If you want to run Linux on ARM then there'll be no shortage of hardware available to you.
No. We've spent some time thinking about all of this and are happy that we can implement it in the Fedora 18 timescale, but there's always the possibility that we've missed something or that a new idea will come up. If we can increase user freedom without making awful compromises somewhere else then we'll do it.
[1] In fact, chances are that everything will carry the Microsoft key. Secure boot requires that UEFI drivers also be signed. The signing format only permits a single signature per binary. For compatibility, approximately all add-on hardware shipped will be signed with Microsoft's key, and that means that all system vendors have to recognise Microsoft's key in order to permit that hardware to run on their systems.
[2] Current source is here. It relies on a port of the UEFI crypto library and OpenSSL that I have building with some handholding, and which I'll upload as soon as possible.
Edit 02:10EDT 01/6/12: Clarification that it's a one-off payment
(Brief disclaimer - while I work for Red Hat, I'm only going to be talking about Fedora here. Anything written below represents only my opinions and my work on Fedora, not Red Hat's opinions or future plans)
Fedora 17 was released this week. It's both useful and free, and serves as a welcome addition to any family gathering. Do give it a go. But it's also noteworthy for another reason - it's the last Fedora release in the pre-UEFI secure boot era. Fedora 18 will be released at around the same time as Windows 8, and as previously discussed all Windows 8 hardware will be shipping with secure boot enabled by default. While Microsoft have modified their original position and all x86 Windows machines will be required to have a firmware option to disable this or to permit users to enrol their own keys, it's not really an option to force all our users to play with hard to find firmware settings before they can run Fedora. We've been working on a plan for dealing with this. It's not ideal, but of all the approaches we've examined we feel that this one offers the best balance between letting users install Fedora while still permitting user freedom.
Getting the machine booted
Most hardware you'll be able to buy towards the end of the year will be Windows 8 certified. That means that it'll be carrying a set of secure boot keys, and if it comes with Windows 8 pre-installed then secure boot will be enabled by default. This set of keys isn't absolutely fixed and will probably vary between manufacturers, but anything with a Windows logo will carry the Microsoft key[1].
We explored the possibility of producing a Fedora key and encouraging hardware vendors to incorporate it, but turned it down for a couple of reasons. First, while we had a surprisingly positive response from the vendors, there was no realistic chance that we could get all of them to carry it. That would mean going back to the bad old days of scouring compatibility lists before buying hardware, and that's fundamentally user-hostile. Secondly, it would put Fedora in a privileged position. As one of the larger distributions, we have more opportunity to talk to hardware manufacturers than most distributions do. Systems with a Fedora key would boot Fedora fine, but would they boot Mandriva? Arch? Mint? Mepis? Adopting a distribution-specific key and encouraging hardware companies to adopt it would have been hostile to other distributions. We want to compete on merit, not because we have better links to OEMs.
An alternative was producing some sort of overall Linux key. It turns out that this is also difficult, since it would mean finding an entity who was willing to take responsibility for managing signing or key distribution. That means having the ability to keep the root key absolutely secure and perform adequate validation of people asking for signing. That's expensive. Like millions of dollars expensive. It would also take a lot of time to set up, and that's not really time we had. And, finally, nobody was jumping at the opportunity to volunteer. So no generic Linux key.
The last option wasn't hugely attractive, but is probably the least worst. Microsoft will be offering signing services through their sysdev portal. It's not entirely free (there's a one-off $99 fee to gain access edit: The $99 goes to Verisign, not Microsoft - further edit: once paid you can sign as many binaries as you want), but it's cheaper than any realistic alternative would have been. It ensures compatibility with as wide a range of hardware as possible and it avoids Fedora having any special privileges over other Linux distributions. If there are better options then we haven't found them. So, in all probability, this is the approach we'll take. Our first stage bootloader will be signed with a Microsoft key.
Bootloaders
We've decided to take a multi-layer approach to our signing for a fairly simple reason. Signing through the Microsoft signing service is a manual process, and that's a pain. We don't want to have bootloader updates delayed because someone needs to find a copy of Internet Explorer and a smartcard and build packages by hand. Instead we're writing a very simple bootloader[2]. This will do nothing other than load a real bootloader (grub 2), validate that it's signed with a Fedora signing key and then execute it. Using the Fedora signing key there means that we can build grub updates in our existing build infrastructure and sign them ourselves. The first stage bootloader should change very rarely, and we don't envisage updating it more than once per release cycle. It shouldn't be much of a burden on release management.
What about grub? We've already switched Fedora 18 over to using grub 2 by default on EFI systems, but it still needs some work before it's ready for secure boot. The first thing is that we'll be disabling the module loading. Right now you can load arbitrary code into grub 2 at runtime, and that defeats the point of secure boot. So that'll be disabled. Next we'll be adding support for verifying that the kernel it's about to boot is signed with a trusted key. And finally we'll be sanitising the kernel command line to avoid certain bits of functionality that would permit an attacker to cause even a signed kernel to launch arbitrary code. These restrictions will all vanish if secure boot is disabled.
Kernel
Secure boot is built on the idea that all code that can touch the hardware directly is trusted, and any untrusted code must go through the trusted code. This can be circumvented if users can execute arbitrary code in the kernel. So, we'll be moving to requiring signed kernel modules and locking down certain aspects of kernel functionality. The most obvious example is that it won't be possible to access PCI regions directly from userspace, which means all graphics cards will need kernel drivers. Userspace modesetting will be a thing of the past. Again, disabling secure boot will disable these restrictions.
Signed modules are obviously troubling from a user perspective. We'll be signing all the drivers that we ship, but what about out of tree drivers? We don't have a good answer for that yet. As before, we don't want any kind of solution that works for us but doesn't work for other distributions. Fedora-only or Ubuntu-only drivers are the last thing anyone wants, and this really needs to be handled in a cross-distribution way.
Wait signed what
Secure boot is designed to protect against malware code running before the operating system. This isn't a hypothetical threat. Pre-boot malware exists in the wild, and some of it is nastier than you expect. So obviously bootloaders need to be signed, since otherwise you'd just replace the signed bootloader with an unsigned one that installed malware and booted your OS.
But what about the kernel? The kernel is just code. If I take a signed Linux bootloader and then use it to boot something that looks like an unsigned Linux kernel, I've instead potentially just booted a piece of malware. And if that malware can attack Windows then the signed Linux bootloader is no longer just a signed Linux bootloader, it's a signed Windows malware launcher and that's the kind of thing that results in that bootloader being added to the list of blacklisted binaries and suddenly your signed Linux bootloader isn't even a signed Linux bootloader. So kernels need to be signed.
And modules? Again, modules are just code. It's a little trickier, but if your signed kernel loads an unsigned module then that unsigned module can set up a fake UEFI environment and chain into a compromised OS bootloader. Now the attacker just has to include a signed kernel and a minimal initramfs that loads their malware module. It'd slow down boot by a couple of seconds, but other than that it'd be undetectable. X? If you can access the registers on a GPU then you can get the GPU to DMA over the kernel and execute arbitrary code. Trickier again, but still achievable - and if you've locked down every other avenue of attack, it's even attractive.
If we produce signed code that can be used to attack other operating systems then those other operating systems are justified in blacklisting us. That doesn't seem like a good outcome.
Customisation
A lot of our users want to build their own kernels. Some even want to build their own distributions. Signing our bootloader and kernel is an impediment to that. We'll be providing all the tools we use for signing our binaries, but for obvious reasons we can't hand out our keys. There's three approaches here. The first is for a user to generate their own key and enrol it in their system firmware. We'll trust anything that's signed with a key that's present in the firmware. The second is to rebuild the shim loader with their own key installed and then pay $99 and sign that with Microsoft. That means that they'll be able to give copies to anyone else and let them install it without any fiddling. The third is to just disable secure boot entirely, at which point the machine should return to granting the same set of freedoms as it currently does.
But I don't trust Microsoft
A system in custom mode should allow you to delete all existing keys and replace them with your own. After that it's just a matter of re-signing the Fedora bootloader (like I said, we'll be providing tools and documentation for that) and you'll have a computer that will boot Fedora but which will refuse to boot any Microsoft code. It may be a little more awkward for desktops because you may have to handle the Microsoft-signed UEFI drivers on your graphics and network cards, but this is also solvable. I'm looking at ways to implement a tool to allow you to automatically whitelist the installed drivers. Barring firmware backdoors, it's possible to configure secure boot such that your computer will only run software you trust. Freedom means being allowed to run the software you want to run, but it also means being able to choose the software you don't want to run.
You've sold out
We've been working on this for months. This isn't an attractive solution, but it is a workable one. We came to the conclusion that every other approach was unworkable. The cause of free software isn't furthered by making it difficult or impossible for unskilled users to run Linux, and while this approach does have its downsides it does also avoid us ending up where we were in the 90s. Users will retain the freedom to run modified software and we wouldn't have accepted any solution that made that impossible.
But is this a compromise? Of course. There's already inequalities between Fedora and users - trademarks prevent the distribution of the Fedora artwork with modified distributions, and much of the Fedora infrastructure is licensed such that some people have more power than others. This adds to that inequality. It's not the ideal outcome for anyone, and I'm genuinely sorry that we weren't able to come up with a solution that was better. This isn't as bad as I feared it would be, but nor is it as good as I hoped it would be.
What about ARM
Microsoft's certification requirements for ARM machines forbid vendors from offering the ability to disable secure boot or enrol user keys. While we could support secure boot in the same way as we plan to on x86, it would prevent users from running modified software unless they paid money for a signing key. We don't find that acceptable and so have no plans to support it.
Thankfully this shouldn't be anywhere near as much of a problem as it would be in the x86 world. Microsoft have far less influence over the ARM market, and the only machines affected by this will be the ones explicitly designed to support Windows. If you want to run Linux on ARM then there'll be no shortage of hardware available to you.
Is this all set in stone?
No. We've spent some time thinking about all of this and are happy that we can implement it in the Fedora 18 timescale, but there's always the possibility that we've missed something or that a new idea will come up. If we can increase user freedom without making awful compromises somewhere else then we'll do it.
[1] In fact, chances are that everything will carry the Microsoft key. Secure boot requires that UEFI drivers also be signed. The signing format only permits a single signature per binary. For compatibility, approximately all add-on hardware shipped will be signed with Microsoft's key, and that means that all system vendors have to recognise Microsoft's key in order to permit that hardware to run on their systems.
[2] Current source is here. It relies on a port of the UEFI crypto library and OpenSSL that I have building with some handholding, and which I'll upload as soon as possible.
no subject
Date: 2012-05-31 06:24 am (UTC)More importantly, doesn't the GPL require that you provide sufficient source to reconstruct the binary artefacts that constitute the program? (We now proceed to argue about what constitutes a "program" that isn't executable code). Either I can modify the kernel (in which case I don't understand the point of this signature chaining being _required_) or I can't (in which case it's a GPL violation to distribute it).
I may also be confused about how mandatory all this is.
no subject
Date: 2012-05-31 06:39 am (UTC)list of kernel restrictions?
From:Re: list of kernel restrictions?
From:Re: list of kernel restrictions?
From: (Anonymous) - Date: 2012-06-01 05:38 am (UTC) - ExpandRe: list of kernel restrictions?
From:Re: list of kernel restrictions?
From: (Anonymous) - Date: 2012-06-01 08:10 am (UTC) - ExpandRe: list of kernel restrictions?
From:GPL
From: (Anonymous) - Date: 2012-05-31 07:13 am (UTC) - ExpandRe: GPL
From: (Anonymous) - Date: 2012-05-31 07:37 pm (UTC) - ExpandRe: GPL
From: (Anonymous) - Date: 2012-06-01 12:53 am (UTC) - ExpandStop this nonsense now!
From: (Anonymous) - Date: 2012-06-04 11:41 am (UTC) - ExpandRe: Stop this nonsense now!
From: (Anonymous) - Date: 2012-06-06 11:16 pm (UTC) - ExpandRe: Stop this nonsense now!
From: (Anonymous) - Date: 2012-07-20 01:58 am (UTC) - ExpandRe: GPL
From: (Anonymous) - Date: 2012-06-02 01:03 am (UTC) - Expand(no subject)
From: (Anonymous) - Date: 2012-06-01 03:05 am (UTC) - Expand(no subject)
From: (Anonymous) - Date: 2012-07-13 07:35 pm (UTC) - Expand(no subject)
From: (Anonymous) - Date: 2012-12-30 03:55 pm (UTC) - ExpandCustomization
From: (Anonymous) - Date: 2012-06-01 10:14 am (UTC) - Expandno subject
Date: 2012-05-31 06:35 am (UTC)I've got a question which could possibly be answered by the sysdev.microsoft.com site were it not "offline for maintenance" right now.
You say users can "rebuild the shim loader with their own key installed and then pay $99 and sign that with Microsoft. That means that they'll be able to give copies to anyone else and let them install it without any fiddling." But without audits and strict rules for how they use and handle their own signing keys, it seems like this makes the whole system completely useless. It would be as if the Certificate Authorities of the https PKI sold subordinate roots willy-nilly (which it turns out they actually do, but for a whole lot more than $99 and they don't advertise it to the general public!). What am I missing here?
Also, what is Fedora's plan if Microsoft changes these terms of their $99 signing program to exclude you?
no subject
Date: 2012-05-31 06:41 am (UTC)If what we're planning to do becomes impossible then we'll need to find an alternative. Right now I'm not worrying about that too much.
(no subject)
From: (Anonymous) - Date: 2012-05-31 06:54 am (UTC) - Expand(no subject)
From:(no subject)
From: (Anonymous) - Date: 2012-06-01 02:39 pm (UTC) - Expand(no subject)
From: (Anonymous) - Date: 2012-06-03 08:33 am (UTC) - Expand(no subject)
From: (Anonymous) - Date: 2012-05-31 03:01 pm (UTC) - Expand(no subject)
From:win update mod firmware?
From: (Anonymous) - Date: 2012-05-31 07:41 pm (UTC) - Expand(no subject)
From: (Anonymous) - Date: 2012-06-05 03:33 pm (UTC) - Expandrisk management
From: (Anonymous) - Date: 2012-06-06 01:41 am (UTC) - ExpandBlacklist key
From: (Anonymous) - Date: 2012-06-24 11:54 am (UTC) - ExpandExactly
From: (Anonymous) - Date: 2012-05-31 07:36 pm (UTC) - Expandno subject
Date: 2012-05-31 06:47 am (UTC)Because the first option, to be quite frank, sounds beyond unacceptable to me.
signed doesn't mean encrypted
Date: 2012-05-31 07:50 am (UTC)(no subject)
From:checking the signed binary
From: (Anonymous) - Date: 2012-05-31 01:28 pm (UTC) - ExpandRe: checking the signed binary
From:Re: checking the signed binary
From: (Anonymous) - Date: 2012-05-31 02:41 pm (UTC) - ExpandRe: checking the signed binary
From:Re: checking the signed binary
From: (Anonymous) - Date: 2012-05-31 03:52 pm (UTC) - ExpandRe: checking the signed binary
From:Re: checking the signed binary
From:Virtualization
Date: 2012-05-31 06:54 am (UTC)Re: Virtualization
Date: 2012-05-31 08:45 am (UTC)In such a system it seems to be always possible to trick software into thinking it is running on bare metal. Is there something else (e.g. some hardware device) that would not work in such a situation?
Re: Virtualization
From: (Anonymous) - Date: 2012-05-31 06:25 pm (UTC) - ExpandRe: Virtualization
From:Re: Virtualization
From: (Anonymous) - Date: 2012-06-01 12:04 pm (UTC) - ExpandRe: Virtualization
From: (Anonymous) - Date: 2012-05-31 01:23 pm (UTC) - ExpandRe: Virtualization
From: (Anonymous) - Date: 2012-05-31 02:11 pm (UTC) - ExpandRe: Virtualization
From: (Anonymous) - Date: 2012-05-31 02:31 pm (UTC) - ExpandRe: Virtualization
From:Complexity
Date: 2012-05-31 08:02 am (UTC)In order for all of this to be useful, you need to be able to blacklist some keys. I'm not sure how this would work, is it possible to just update the list or do you have to flash a new EFI? Who can update the list, only Microsoft? Could you blacklist the Microsoft key?
Obviously, once a key is blacklisted, all OSes using that key won't be able to boot. If it's a malware, you just won't be able to boot your OS (obviously a malware would remove the official signed bootloader and put his own one).
So in the end I guess it's a technology that will only be able to protect Microsoft Windows, and I'm not even sure that the threat is that great. Do we have numbers about the quantity of bootloader-level malware out there? The only benefit I see is that Microsoft Windows users will know that their OS is compromised right away (by not booting at all) instead of the OS to be able to make bad things unnoticed.
Will bare motherboards (to build a custom computer) include Microsoft keys as well? If all computers start to use locked-down bootloaders, it will be a pain to install other OSes on all x86 hardware (except Apple hardware I guess, which would be overly weird since Apple is one of the most closed-down OS out there).
Re: Complexity
Date: 2012-05-31 01:30 pm (UTC)It'll protect us some as well, though the idea of using Linux to attack windows may cause an increase the number of attempts against Linux systems.
Motherboards that carry the windows 8 client logo must include Microsoft keys. Others may at their option.
-- pjones
Re: Complexity
From: (Anonymous) - Date: 2012-05-31 02:55 pm (UTC) - ExpandRe: Complexity
From: (Anonymous) - Date: 2012-05-31 03:16 pm (UTC) - ExpandRe: Complexity
From: (Anonymous) - Date: 2012-05-31 02:37 pm (UTC) - ExpandRe: Complexity
From: (Anonymous) - Date: 2012-05-31 04:24 pm (UTC) - ExpandRe: Complexity
From: (Anonymous) - Date: 2012-05-31 08:00 pm (UTC) - ExpandRe: Complexity
From: (Anonymous) - Date: 2012-06-06 10:38 pm (UTC) - ExpandFedora revocation
Date: 2012-05-31 08:45 am (UTC)Options are not mutually exclusive
Date: 2012-05-31 08:58 am (UTC)You've talked about each of the options as if they were mutually exclusive. They aren't, you should consider implementing all of them. This should be considered security defence in depth, preparation, for the inevitable day when Microsoft changes the key signing rules.
In particular you should be giving as many manufacturers as possible a Fedora key and a linux key so they become accustomed to the idea of working with people other than Microsoft and you actually have some say when Microsoft changes the rules. I assume that you are aware that Microsoft is "boiling the frog". You should be doing your best to minimize this - think long term and not just the next release.
Re: Options are not mutually exclusive
Date: 2012-05-31 01:38 pm (UTC)-- pjones
Re: Options are not mutually exclusive
From: (Anonymous) - Date: 2012-05-31 02:21 pm (UTC) - ExpandRe: Options are not mutually exclusive
From: (Anonymous) - Date: 2012-06-08 08:22 am (UTC) - ExpandRe: Options are not mutually exclusive
From: (Anonymous) - Date: 2012-06-01 04:27 pm (UTC) - Expandno subject
Date: 2012-05-31 09:06 am (UTC)no subject
Date: 2012-05-31 11:40 am (UTC)no subject
Date: 2012-05-31 09:09 am (UTC)no subject
Date: 2012-05-31 11:40 am (UTC)(no subject)
From: (Anonymous) - Date: 2012-05-31 12:05 pm (UTC) - Expand(no subject)
From:(no subject)
From:Intent of distribution counts?
From: (Anonymous) - Date: 2012-05-31 07:14 pm (UTC) - ExpandRe: Intent of distribution counts?
From: (Anonymous) - Date: 2012-06-01 03:20 am (UTC) - Expand(no subject)
From: (Anonymous) - Date: 2012-06-02 01:02 am (UTC) - Expand(no subject)
From:(no subject)
From: (Anonymous) - Date: 2012-06-03 05:03 am (UTC) - Expand(no subject)
From: (Anonymous) - Date: 2012-06-04 04:01 pm (UTC) - Expand(no subject)
From: (Anonymous) - Date: 2012-06-03 05:15 am (UTC) - Expand(no subject)
From: (Anonymous) - Date: 2012-05-31 12:40 pm (UTC) - Expand(no subject)
From: (Anonymous) - Date: 2012-05-31 09:39 pm (UTC) - ExpandWhat about tracing modules?
Date: 2012-05-31 09:18 am (UTC)Re: What about tracing modules?
Date: 2012-05-31 11:41 am (UTC)Re: What about tracing modules?
From: (Anonymous) - Date: 2012-05-31 12:14 pm (UTC) - ExpandRe: What about tracing modules?
From:Re: What about tracing modules?
From: (Anonymous) - Date: 2012-06-01 05:52 am (UTC) - ExpandRe: What about tracing modules?
From: (Anonymous) - Date: 2012-06-01 12:20 pm (UTC) - ExpandRe: What about tracing modules?
From: (Anonymous) - Date: 2012-06-01 07:07 pm (UTC) - ExpandRe: What about tracing modules?
From: (Anonymous) - Date: 2012-06-07 09:37 am (UTC) - ExpandRe: What about tracing modules?
From: (Anonymous) - Date: 2012-05-31 01:10 pm (UTC) - ExpandRe: What about tracing modules?
From:Re: What about tracing modules?
From:Re: What about tracing modules?
From:Re: What about tracing modules?
From:Re: What about tracing modules?
From: (Anonymous) - Date: 2012-06-01 01:19 pm (UTC) - ExpandRe: What about tracing modules?
From:What if Microsoft won't sign the bootloader?
Date: 2012-05-31 11:53 am (UTC)I do understand that this is the easy way, disabling secure boot is an option, setting up own key is an option. However, if that happens, the damage will be done. Is there any reason for going down that route?
Re: What if Microsoft won't sign the bootloader?
Date: 2012-05-31 11:56 am (UTC)Re: What if Microsoft won't sign the bootloader?
From: (Anonymous) - Date: 2012-05-31 12:11 pm (UTC) - ExpandRe: What if Microsoft won't sign the bootloader?
From:Re: What if Microsoft won't sign the bootloader?
From: (Anonymous) - Date: 2012-05-31 12:45 pm (UTC) - ExpandRe: What if Microsoft won't sign the bootloader?
From:Re: What if Microsoft won't sign the bootloader?
From: (Anonymous) - Date: 2012-05-31 01:17 pm (UTC) - ExpandRe: What if Microsoft won't sign the bootloader?
From:Re: What if Microsoft won't sign the bootloader?
From: (Anonymous) - Date: 2012-05-31 01:38 pm (UTC) - ExpandRe: What if Microsoft won't sign the bootloader?
From: (Anonymous) - Date: 2012-05-31 02:18 pm (UTC) - ExpandRe: What if Microsoft won't sign the bootloader?
From:Re: What if Microsoft won't sign the bootloader?
From: (Anonymous) - Date: 2012-05-31 02:36 pm (UTC) - ExpandRe: What if Microsoft won't sign the bootloader?
From: (Anonymous) - Date: 2012-05-31 08:10 pm (UTC) - ExpandRe: What if Microsoft won't sign the bootloader?
From: (Anonymous) - Date: 2012-05-31 12:45 pm (UTC) - ExpandRe: What if Microsoft won't sign the bootloader?
From:Re: What if Microsoft won't sign the bootloader?
From: (Anonymous) - Date: 2012-05-31 03:15 pm (UTC) - ExpandRe: What if Microsoft won't sign the bootloader?
From: (Anonymous) - Date: 2012-06-01 12:26 pm (UTC) - ExpandRe: What if Microsoft won't sign the bootloader?
From: (Anonymous) - Date: 2012-06-01 05:56 am (UTC) - ExpandRe: What if Microsoft won't sign the bootloader?
From: (Anonymous) - Date: 2012-06-03 05:24 am (UTC) - ExpandRe: What if Microsoft won't sign the bootloader?
From: (Anonymous) - Date: 2012-06-08 08:34 am (UTC) - ExpandRe: What if Microsoft won't sign the bootloader?
From: (Anonymous) - Date: 2012-06-03 05:20 am (UTC) - ExpandRe: What if Microsoft won't sign the bootloader?
From: (Anonymous) - Date: 2012-06-20 07:19 pm (UTC) - ExpandThanks
Date: 2012-05-31 11:56 am (UTC)Best Regards, David
Re: Thanks
Date: 2012-05-31 12:42 pm (UTC)It will be a good reason to dump Fedora as Fedora will no longer be free or open source software at that point, nor able to run third party modules or many debugging tools.
Re: Thanks
From: (Anonymous) - Date: 2012-05-31 12:48 pm (UTC) - ExpandRe: Thanks
From: (Anonymous) - Date: 2012-05-31 11:53 pm (UTC) - ExpandRe: Thanks
From: (Anonymous) - Date: 2012-05-31 03:30 pm (UTC) - ExpandRe: Thanks
From: (Anonymous) - Date: 2012-05-31 07:52 pm (UTC) - ExpandCertificate instead of shim code with embedded signature
Date: 2012-05-31 12:44 pm (UTC)Did I miss something?
Re: Certificate instead of shim code with embedded signature
Date: 2012-05-31 12:46 pm (UTC)Re: Certificate instead of shim code with embedded signature
From: (Anonymous) - Date: 2012-05-31 12:50 pm (UTC) - ExpandRe: Certificate instead of shim code with embedded signature
From: (Anonymous) - Date: 2012-05-31 08:56 pm (UTC) - ExpandRe: Certificate instead of shim code with embedded signature
From:Grub 2 and Compatibility Support Modules
Date: 2012-05-31 01:15 pm (UTC)(also, thank you for your posts. You're the guy documenting and solving these difficult problems for the rest of the planet :) )
Re: Grub 2 and Compatibility Support Modules
Date: 2012-05-31 01:17 pm (UTC)Signed FSF's petition yet?
Date: 2012-05-31 01:47 pm (UTC)http://www.fsf.org/campaigns/secure-boot-vs-restricted-boot/statement
28,000 signatures so far. Pass it on.
Ciarán O'Riordan
An wath happend if
Date: 2012-05-31 02:46 pm (UTC)and/or say Linux only can provide they own and unique key and companig can select if add or not them?
The signing format only permits a single signature per binary?
Date: 2012-05-31 03:20 pm (UTC)That sounds like a large piece of brokenness. Is it too late to fix it? If it is, in hindsight, what standard was it and what year was it when we should have seen this coming and objected?
Re: The signing format only permits a single signature per binary?
Date: 2012-05-31 03:23 pm (UTC)[1] And it turns out we weren't the only ones...
Re: The signing format only permits a single signature per binary?
From:Re: The signing format only permits a single signature per binary?
From: (Anonymous) - Date: 2012-05-31 05:27 pm (UTC) - Expandwhat about video driver blobs?
Date: 2012-05-31 04:05 pm (UTC)Re: what about video driver blobs?
Date: 2012-05-31 04:09 pm (UTC)Re: what about video driver blobs?
From: (Anonymous) - Date: 2012-06-01 12:34 am (UTC) - ExpandRe: what about video driver blobs?
From: (Anonymous) - Date: 2012-06-01 01:28 am (UTC) - ExpandRe: what about video driver blobs?
From:Re: what about video driver blobs?
From: (Anonymous) - Date: 2012-06-01 06:19 am (UTC) - ExpandRe: what about video driver blobs?
From: (Anonymous) - Date: 2012-06-03 05:31 am (UTC) - ExpandRe: what about video driver blobs?
From: (Anonymous) - Date: 2012-06-06 02:05 am (UTC) - ExpandTotally unacceptable
Date: 2012-05-31 04:17 pm (UTC)Re: Totally unacceptable
Date: 2012-05-31 04:34 pm (UTC)-- pjones
Re: Totally unacceptable
From: (Anonymous) - Date: 2012-05-31 05:30 pm (UTC) - ExpandRe: Totally unacceptable
From: (Anonymous) - Date: 2012-05-31 07:50 pm (UTC) - ExpandRe: Totally unacceptable
From: (Anonymous) - Date: 2012-05-31 09:16 pm (UTC) - ExpandRe: Totally unacceptable
From:Re: Totally unacceptable
From: (Anonymous) - Date: 2012-05-31 11:08 pm (UTC) - ExpandRe: Totally unacceptable
From: (Anonymous) - Date: 2012-06-03 05:35 am (UTC) - ExpandRe: Totally unacceptable
From: (Anonymous) - Date: 2012-06-04 04:14 pm (UTC) - ExpandRe: Totally unacceptable
From:Re: Totally unacceptable
From: (Anonymous) - Date: 2012-06-18 08:28 am (UTC) - ExpandRe: Totally unacceptable
From: (Anonymous) - Date: 2012-07-04 11:45 am (UTC) - ExpandGeneric Linux Key
Date: 2012-05-31 05:07 pm (UTC)Re: Generic Linux Key
Date: 2012-06-06 02:16 am (UTC)1) Use the Microsoft key that ALL consumer hardware is going to have, and hence always work.
2) Use a Linux CA that a small fraction of hardware is going to have, and hence only work on a small fraction of hardware
The vast, VAST majority of Linux users get started out of pure curiosity, and just to tinker. They do not usually start out as Free Software supporters (yes, exceptions exist, and I don't care about your personal anecdotes) until _after_ they're exposed in depth to Free Software. Making it hard for novice users to even give Linux a try means that the Linux adoption rate will go from it's current snail pace to (worst case) a sub-1.0 rate (as in, less users come in than leave, due to age or those of us who just give up on Linux ever being a truly competetive desktop OS).
Paying Microsoft
Date: 2012-05-31 06:19 pm (UTC)Re: Paying Microsoft
Date: 2012-06-01 01:39 am (UTC)One time $99 fee...
Date: 2012-05-31 07:16 pm (UTC)But that is, essentially, what Microsoft are charging the $99 for. I'm sure folks at Microsoft believe they're doing this for a good cause, but of course it'll eventually turn into a clusterf*k when their suits decide to see if their competition can survive without hardware support longer than it takes to get to court...
Re: One time $99 fee...
Date: 2012-05-31 09:32 pm (UTC)Is no firmware vendor questioning whether or not Microsoft is the best entity to do the signing?
Re: One time $99 fee...
From: (Anonymous) - Date: 2012-06-01 03:13 pm (UTC) - ExpandRe: One time $99 fee...
From: (Anonymous) - Date: 2012-06-02 09:02 pm (UTC) - ExpandRe: One time $99 fee...
From: (Anonymous) - Date: 2012-06-11 09:43 pm (UTC) - ExpandHow will RHEL handle the problem?
Date: 2012-05-31 07:23 pm (UTC)Re: How will RHEL handle the problem?
Date: 2012-05-31 07:45 pm (UTC)-- pjones
Just say NO. Loudly, and clearly.
Date: 2012-05-31 07:45 pm (UTC)MS will lead them on for a couple of years, and then quietly insist that x86 vendors comply with the same restrictions that ARM vendors have already kowtowed to.
At which point, only Redhat Linux will boot and run. No others. Or at least not until all of the others also sign-up and pay MS for permission to run non-MS software on end-user hardware.
Then, a year or two later, MS will raise the signing fees, and eventually begin blacklisting Linux systems for various "reasons".
By then, it's too late to do anything about the situation.
Much, MUCH better to just not comply from Day-1. Don't pay MS for key-signing. This means that a user has to enter the BIOS *once* to get Linux installed. Big Deal.
Hardware vendors will be loath to ever implement stage-2 as a result -- they'll refuse to disable non-secureboot because it would lock them out of the Linux market.
But if we pay-up to MS on Day-1, then the hardware vendors will not have as big an issue with locking everyone out later on.
Just say NO. This is a very clever MS scheme, and an very bad idea for Redhat to comply.
Re: Just say NO. Loudly, and clearly.
Date: 2012-05-31 07:53 pm (UTC)Re: Just say NO. Loudly, and clearly.
From: (Anonymous) - Date: 2012-05-31 09:18 pm (UTC) - ExpandRe: Just say NO. Loudly, and clearly.
From:Re: Just say NO. Loudly, and clearly.
From: (Anonymous) - Date: 2012-05-31 09:59 pm (UTC) - ExpandRe: Just say NO. Loudly, and clearly.
From:Re: Just say NO. Loudly, and clearly.
From: (Anonymous) - Date: 2012-06-03 05:37 am (UTC) - ExpandRe: Just say NO. Loudly, and clearly.
From: (Anonymous) - Date: 2012-06-04 09:47 pm (UTC) - ExpandRe: Just say NO. Loudly, and clearly.
From: (Anonymous) - Date: 2012-06-06 02:23 am (UTC) - ExpandRe: Just say NO. Loudly, and clearly.
From: (Anonymous) - Date: 2012-06-05 08:51 pm (UTC) - ExpandTime to make calls to your congressional representative.
Date: 2012-05-31 07:48 pm (UTC)Re: Time to make calls to your congressional representative.
Date: 2012-06-01 03:52 am (UTC)Re: Time to make calls to your congressional representative.
From: (Anonymous) - Date: 2012-06-01 04:15 pm (UTC) - Expandregarding blindness...
From: (Anonymous) - Date: 2012-06-02 03:12 am (UTC) - ExpandRe: regarding blindness...
From:Re: regarding blindness...
From: (Anonymous) - Date: 2012-06-02 10:14 pm (UTC) - ExpandRe: regarding blindness...
From: