Announcement

Collapse
No announcement yet.

The UEFI SecureBoot Saga For Linux Continues

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • #41


    If you cannot see that secureboot is heading to some heavy Digital Restrictions Management... The solution is to stop accepting a proprietary bios and invest more money into the coreboot project or somethign similar so it supports more recent boards. Then stay away from this EFI junk. If you give in now in 5 years time any software you get will have to first be agreed and signed by Microsoft, literally software will only be able to be installed from the microsoft store. Even if I was a Windows users I would not want this anywhere near my platform. Originally we had TPM and that was agreed that it would NEVER EVER ship enabled, and the customer would be responsible for taking ownership and enabling.

    It's time to take back control from the hardware manufacturers, you should boycot anything with EFI or secure boot. The best solution for redhat is to start selling redhat certified hardware and forget about installing on secure boot platforms - how many manufactures claim that installing linux voids your warrenty anyway. Spend the time complaining to whatever trade regulator there is about anti-competative behaviour. We NEED to go back to the 90's and fight this war over again, and this time microsoft needs to die and stay dead.

    Comment


    • #42
      Like it or not, Secure Boot is a reality, and there is nothing anyone can do to prevent it from making its way into desktops and notebooks.

      Does Red Hat's actions make it look as though they have sold out? Maybe. So? Who cares? At least they are taking steps to ensure that Linux remains installable on commodity desktops and notebooks, and that they will be providing all the tools needed to ensure that one can sign their stuff and whitelist out-of-tree / custom / proprietary drivers. I quite like the idea of using a signed shimloader to chainload GRUB2 as a starting point.

      Also, as stated before, Microsoft has committed themselves to Secure Boot, and you can bet subsequent versions of Windows (eg: Windows 9 and later) may even outright mandate Secure Boot as an installation requirement, with OEMs and motherboard vendors being barred from providing a 'Disable Secure Boot' option in the UEFI menu. This means that Linux distributions will eventually have to work with Secure Boot whether we like it or not, and delaying the inevitable is NOT the way to go about it. Better to have all the pains and headaches right now in flushing out how Linux can be made to play nice with Secure Boot so that a more elegant implementation can be achieved in subsequent years.

      I, for one, would rather have Linux running well on Secure Boot and distributions providing tools to facilitate self-signing so that we can continue doing what we want on our computers, such as installing new / custom kernels or out-of-tree / proprietary drivers.

      EDIT: Ideally, the establishment of a central signing authority for Linux would be the better solution in the long term. That, combined with the releasing of software tools to allow every single Tom, Dick or Harry to sign their own software, kernel, kernel modules, out-of-tree drivers, proprietary drivers etc etc would essentially make Secure Boot a non-issue. After all, Linux users tend to know what they are doing and will only run unsigned code if they are certain about its origins and source. Making it easy for these users to sign such third-party code on their own for use in their operating system should be a priority.
      Last edited by Sonadow; 03 June 2012, 04:19 AM.

      Comment


      • #43
        Just so you know America (USA) is not the center of the world, there is no way we can let American (USA) companies (Microsoft and Verisign) control our hardware, regardless of what OS we are using. Red Hat are an American company and thus are in the pockets of Microsoft and the american government. They cannot be trusted.

        Having a global Linux signing key is also unacceptable, whate about custom built kernels? Or BSD and other non Linux. The fact is this is all money going to Verisgn a commercial non open source american company. This is a huge security risk. The point is I should receive my computer, it starts up, and asks me to create a password, I select one and then keys are generated in a secure tamper resitant storage. These keys are then used to sign operating systems I trust by my own verification, and entering the password again. There is nothing stopping Microsoft putting rootkits, or even vndors putting in root kits into their own version of Windows, and then signing this as if it was secure when it clearly is not. The same would go for fedora, they are an American company I do not trust them after this, I do not trust them to have a key for software on my computer without my input.

        Just because Microsoft decide OEMS have to do something does not mean we should all bow down and do it.

        The point about consumers is if you refuse to buy something because of some reason, then it gets fixed. Therefore what we can do about SecureBoot is boycot. I for one am removing all my contacts, phone, email, social, from any one who will be using a Secure Boot system as it currently stands. I will not be buying any new hardware. If you do not boycot EFI and Secure Boot then you clearly are just another Microsoft/American puppet using Linux and free software to be cool, and not becuase you really believe anything.

        Originally posted by Sonadow View Post
        Like it or not, Secure Boot is a reality, and there is nothing anyone can do to prevent it from making its way into desktops and notebooks.

        Does Red Hat's actions make it look as though they have sold out? Maybe. So? Who cares? At least they are taking steps to ensure that Linux remains installable on commodity desktops and notebooks, and that they will be providing all the tools needed to ensure that one can sign their stuff and whitelist out-of-tree / custom / proprietary drivers. I quite like the idea of using a signed shimloader to chainload GRUB2 as a starting point.

        Also, as stated before, Microsoft has committed themselves to Secure Boot, and you can bet subsequent versions of Windows (eg: Windows 9 and later) may even outright mandate Secure Boot as an installation requirement, with OEMs and motherboard vendors being barred from providing a 'Disable Secure Boot' option in the UEFI menu. This means that Linux distributions will eventually have to work with Secure Boot whether we like it or not, and delaying the inevitable is NOT the way to go about it. Better to have all the pains and headaches right now in flushing out how Linux can be made to play nice with Secure Boot so that a more elegant implementation can be achieved in subsequent years.

        I, for one, would rather have Linux running well on Secure Boot and distributions providing tools to facilitate self-signing so that we can continue doing what we want on our computers, such as installing new / custom kernels or out-of-tree / proprietary drivers.

        EDIT: Ideally, the establishment of a central signing authority for Linux would be the better solution in the long term. That, combined with the releasing of software tools to allow every single Tom, Dick or Harry to sign their own software, kernel, kernel modules, out-of-tree drivers, proprietary drivers etc etc would essentially make Secure Boot a non-issue. After all, Linux users tend to know what they are doing and will only run unsigned code if they are certain about its origins and source. Making it easy for these users to sign such third-party code on their own for use in their operating system should be a priority.

        Comment


        • #44
          Coreboot

          My next system will either have Coreboot or a regular bios. Under no circumstance will it have UEFI because I simply dissagree with what it stands for. It is NOT secure!

          Comment


          • #45
            Is the current method of doing things really *that* bad that it requires this SecureBoot functionality to save us?

            Comment


            • #46
              Originally posted by johnc View Post
              Is the current method of doing things really *that* bad that it requires this SecureBoot functionality to save us?
              No. It's all about Microsoft wanting control of our machines. The UEFI spec itself is has bugs which could compromise the security of SecureBoot. Anybody who really wanted to infect the computer still could be able to do it. On the other side Coreboot is BIOS which _only_ initialises hardware, so the security lies in the operating system. We all know, how secure the systems are, don't we? I hope for a major breach of SecureBoot to happen soon, so that it won't become the standard.

              Comment


              • #47
                Check this PDF link....



                Secure my ass.

                Comment


                • #48
                  Originally posted by slojam View Post
                  Agreed. This sucks. My respect for Redhat goes down a notch. Don't give 'em an inch, don't play their game.
                  I still think that they are the good guys here. They're a commercial entity and they need to survive in an UEFI world. So besides protesting, they also need to have a "plan B" ready for when the s**t hits the fan. Having an healthy Red Hat is important for the whole Linux community IMHO.

                  Comment


                  • #49
                    Redhat...

                    is a company who owes it's investors a share. I do believe they want to do right. But when you have MS craamming their .. up your A$$ and telling you to smile for the cameras....

                    I am unsure what to think about RH. I hope all works out. The next couple of years will certainly shed a light on things.

                    Comment


                    • #50
                      Originally posted by x616e View Post
                      Just so you know America (USA) is not the center of the world, there is no way we can let American (USA) companies (Microsoft and Verisign) control our hardware, regardless of what OS we are using. Red Hat are an American company and thus are in the pockets of Microsoft and the american government. They cannot be trusted.
                      You do have a point. USA is not the center of the world, and I agree that we should not let American companies control our systems.
                      It also gives Microsoft an unfair advantage that they get to have their key pre-installed, while other vendors (such as Red Hat, Novell and Canonical) does not.

                      Originally posted by x616e View Post
                      The point about consumers is if you refuse to buy something because of some reason, then it gets fixed. Therefore what we can do about SecureBoot is boycot. I for one am removing all my contacts, phone, email, social, from any one who will be using a Secure Boot system as it currently stands. I will not be buying any new hardware. If you do not boycot EFI and Secure Boot then you clearly are just another Microsoft/American puppet using Linux and free software to be cool, and not becuase you really believe anything.
                      What a joke. Then you will all alone and left with no friends. Everyone will be using SecureBoot systems.

                      Consumers refuse to buy something? Wow, I wish we had educated consumers, we don't. Most people are dumb and uneducated.

                      Comment

                      Working...
                      X