decoration decoration
Stories

GROKLAW
When you want to know more...
decoration
For layout only
Home
Archives
Site Map
Search
About Groklaw
Awards
Legal Research
Timelines
ApplevSamsung
ApplevSamsung p.2
ArchiveExplorer
Autozone
Bilski
Cases
Cast: Lawyers
Comes v. MS
Contracts/Documents
Courts
DRM
Gordon v MS
GPL
Grokdoc
HTML How To
IPI v RH
IV v. Google
Legal Docs
Lodsys
MS Litigations
MSvB&N
News Picks
Novell v. MS
Novell-MS Deal
ODF/OOXML
OOXML Appeals
OraclevGoogle
Patents
ProjectMonterey
Psystar
Quote Database
Red Hat v SCO
Salus Book
SCEA v Hotz
SCO Appeals
SCO Bankruptcy
SCO Financials
SCO Overview
SCO v IBM
SCO v Novell
SCO:Soup2Nuts
SCOsource
Sean Daly
Software Patents
Switch to Linux
Transcripts
Unix Books

Gear

Groklaw Gear

Click here to send an email to the editor of this weblog.


You won't find me on Facebook


Donate

Donate Paypal


No Legal Advice

The information on Groklaw is not intended to constitute legal advice. While Mark is a lawyer and he has asked other lawyers and law students to contribute articles, all of these articles are offered to help educate, not to provide specific legal advice. They are not your lawyers.

Here's Groklaw's comments policy.


What's New

STORIES
No new stories

COMMENTS last 48 hrs
No new comments


Sponsors

Hosting:
hosted by ibiblio

On servers donated to ibiblio by AMD.

Webmaster
It has to be user-specific keys. | 246 comments | Create New Account
Comments belong to whoever posts them. Please notify us of inappropriate comments.
No
Authored by: Anonymous on Saturday, March 02 2013 @ 03:44 PM EST
"...don't you see a need for being able to trust someone besides yourself
or Microsoft?"

Its not about "a need", its about who picks the trustee...

If that "trust" is determined by someone else, and I have no say, then
I don't trust. And that includes "distro". I don't use Ubuntu partly
because they have a confirmed habit of selling "trust" to commercial
interests. (much the same reason I don't use Windows) So why would I trust their
key?

But even without the buntu commercialization efforts, I wouldn't trust what I
don't know. I use Slackware, but if it suddenly required running signed keys
that I didn't control, I'd switch to BSD.

Its my hardware, bought and paid for, and my receipt says "sales
receipt" not "license". So I own it, and the terms of use are my
own, not someone else who thinks they know my needs better than I do.

The obvious solution is don't get into the situation in the first place. If the
hardware advertises secure boot Win8 kool-aid compliance, buy something else.

[ Reply to This | Parent | # ]

It has to be user-specific keys.
Authored by: cassini2006 on Sunday, March 03 2013 @ 04:04 PM EST

Following the secure boot logic, only user generated keys should be trusted. If you want to trust something your distribution sends, then the key should be resigned by the user. This avoids the problem of someone breaking the distribution's master key, and then sending around malware accordingly.

The "breaking the master key problem" is the problem as with Microsoft's approach (b). Sooner or later, someone will break Microsoft's key, and the key cannot be revoked. If Microsoft's key was ever revoked, then a flotilla of Windows PCs would instantly stop working and that would be bad.

The security model changes significantly when the key revocation is done on a per user basis as in (c). With user based keys, you are only wiping out one computer at a time. Also, it is possible to develop a procedure where the users are appropriately notified of what is going on, what happened, and downtime is scheduled accordingly. Importantly, for uninfected PCs, updates could be blocked until a secure key-chain was established.

It could be argued that if malware was capable of rooting a computer, and forging a distribution key, then it could also forge the user's specific key. At this point, the secure model (c) degenerates into (a), running Linux as normal and attempting to design a secure O/S. Hence, the observation that the secure boot model is a waste of time. However, for some applications, the modest security improvement would be welcome.

[ Reply to This | Parent | # ]

Groklaw © Copyright 2003-2013 Pamela Jones.
All trademarks and copyrights on this page are owned by their respective owners.
Comments are owned by the individual posters.

PJ's articles are licensed under a Creative Commons License. ( Details )