decoration decoration
Stories

GROKLAW
When you want to know more...
decoration
For layout only
Home
Archives
Site Map
Search
About Groklaw
Awards
Legal Research
Timelines
ApplevSamsung
ApplevSamsung p.2
ArchiveExplorer
Autozone
Bilski
Cases
Cast: Lawyers
Comes v. MS
Contracts/Documents
Courts
DRM
Gordon v MS
GPL
Grokdoc
HTML How To
IPI v RH
IV v. Google
Legal Docs
Lodsys
MS Litigations
MSvB&N
News Picks
Novell v. MS
Novell-MS Deal
ODF/OOXML
OOXML Appeals
OraclevGoogle
Patents
ProjectMonterey
Psystar
Quote Database
Red Hat v SCO
Salus Book
SCEA v Hotz
SCO Appeals
SCO Bankruptcy
SCO Financials
SCO Overview
SCO v IBM
SCO v Novell
SCO:Soup2Nuts
SCOsource
Sean Daly
Software Patents
Switch to Linux
Transcripts
Unix Books

Gear

Groklaw Gear

Click here to send an email to the editor of this weblog.


You won't find me on Facebook


Donate

Donate Paypal


No Legal Advice

The information on Groklaw is not intended to constitute legal advice. While Mark is a lawyer and he has asked other lawyers and law students to contribute articles, all of these articles are offered to help educate, not to provide specific legal advice. They are not your lawyers.

Here's Groklaw's comments policy.


What's New

STORIES
No new stories

COMMENTS last 48 hrs
No new comments


Sponsors

Hosting:
hosted by ibiblio

On servers donated to ibiblio by AMD.

Webmaster
Here he is now | 246 comments | Create New Account
Comments belong to whoever posts them. Please notify us of inappropriate comments.
Here he is now
Authored by: Anonymous on Friday, March 01 2013 @ 09:36 PM EST

http://www.youtube.com/watch?v=V2aq5M3Q76U

And somewhere down the stream he notes that he asked Intel
if they were going to fix a bug he had found to which they
replied "no". Flashing BIOS has always been a little
risky, this sounds like a nightmare to me.

[ Reply to This | Parent | # ]

Linus Torvalds Suggests How To Handle UEFI Secure Boot Crisis
Authored by: cassini2006 on Friday, March 01 2013 @ 10:35 PM EST

I can only see three scenarios where this secure boot makes sense:
a) To use secure boot only long enough to boot and run Linux as normal.
b) To deliver a computer that the RIAA and/or Microsoft trusts, such that you can't steal their precious DRM protected products.
c) To deliver a computer that only runs code that the user authorizes.

I'm not sure what Option (c) gives you that Option (a) does not. Specifically, most of the hacks that work against Option (a) also work against Option (c). However, for some secure applications, it would be nice if the kernel would only trust code specifically authorized by the user. Unfortunately, for this security guarantee to be meaningful, the BIOS itself would have to have the user's key (and only the user's key.)

Obviously, Option (b) is the RIAA's, MPAA's, and Microsoft's dream. It also makes Windows Genuine Advantage from Microsoft work much better. However, many computers are used in applications that have nothing to do with the activities involving Music, Movies or Microsoft. I just can't see implementing Option (b) being a priority for most users of Linux, because they have better things to do.

Linus's solution of either (a) avoiding secure boot, or (c) making the user authorize everything, is fine by me. It is my expectation, that any implementation of (c) will cover the case where a single administrator (the "user") is controlling a farm consisting of millions of PCs. This is far too interesting of a commercial application to ignore.

My biggest issue, by far, is that I don't see how Option (b) prevents Windows from being affected by a root kit. As long as a key is in widespread use, and publicly available, it will be cracked. Microsoft can't revoke the key, because it will break millions of deployed computers. Option (b) doesn't work. This is all a huge waste of time.

[ Reply to This | Parent | # ]

Linus Torvalds Suggests How To Handle UEFI Secure Boot Crisis
Authored by: jjs on Saturday, March 02 2013 @ 12:42 AM EST
Having read the chains, this appears to be about running binary-only modules
with linux, not linux secure boot. Linus has NEVER supportd binary-only -
that's one reason linux doesn't have a stable kernel module API.


So right now you can,using a shim, boot vanilla linux from secure boot.
However, if you want to use the proprietary Nvidia driver (for example), you
need a signed module. If Red Hat wants to support the module, they can sign it
right now. No change to linux needed.


---
(Note IANAL, I don't play one on TV, etc, consult a practicing attorney, etc,
etc)

[ Reply to This | Parent | # ]

Linus Torvalds Suggests How To Handle UEFI Secure Boot Crisis
Authored by: luvr on Saturday, March 02 2013 @ 12:16 PM EST
“If you've set up your own chain of trust instead, anything signed by Microsoft will be rejected.”
It's high time to set up my own chain of trust, then!

[ Reply to This | Parent | # ]

Groklaw © Copyright 2003-2013 Pamela Jones.
All trademarks and copyrights on this page are owned by their respective owners.
Comments are owned by the individual posters.

PJ's articles are licensed under a Creative Commons License. ( Details )