Re: Red Hat Will Pay Microsoft To Get Past UEFI Restrictions

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



> We're told that Fedora's bootloader is going to get signed – and by that,  
> that must mean "grub", right?

No. A tiny loader before grub with the Microsoft key is the plan. That's
actually technically quite smart as it means you don't have to keep going
back to Microsoft. Of course in reality because EFI is buggy and full of
work arounds you will. And since it's probably a revenue stream I can
imagine Microsoft will be keen to revoke keys and charge lots of $99
whenever it can as well.

> And, grub can boot an arbitrary Linux kernel, right?

The signed loader would load a signed grub which would load a signed
kernel which would load only signed modules (no vmware, no nvidia. no
virtualbox, no 3rd party downloaded GPL kernel modules, no security
patches applied by hand, no custom reconfigurations, no board
workarounds, no tmapi on thinkpad). In practice in many cases it will
also have to sign all the firmware that is loaded into the drivers so you
won't be able to update the firmware.

You'd also have to turn off the kernel debugger features, much of
firewire, some X features, uvesafb, lrmi, dosemu (but not dosbox),
systemtap, setserial, and a whole host of other things. You probably have
to mandate SELinux as well and prevent anyone from setting certain
attributes on packages that are not signed etc.

There are some really non-obvious ones and I'm keeping them under my
(free) hat until after Red Hat try this including a couple of gems I
think I'll sit on until a RHEL with this "feature" is released.

Also every time a hole is found Fedora will have to revoke that kernel,
force everyone to upgrade or if they have an older unsupported kernel
leave them stranded.

Out of support releases are also an interesting problem. If a hole is
found they need to revoke the key. If they do that the users machine is
crippled. It's potentially a criminal matter in many EU states as well so
whoever issues the revocation could end up in jail. Nobody is really too
sure. This is all untested waters.

> So, a virus that wants to compromise a signed, secure bootload chain, can't  
> it simply install Fedora's signed grub, configured to boot a bare-bones  
> Linux kernel, nothing will prevent that, right?

Not it would just use a kernel hole and if it was targetting windows it
would use the early bit of the kernel boot up, compromise itself at init
(very early very quiet so basically invisible), and then bootstrap
windows 8 either directly or virtualised while lying that the secure boot
was done.

> Red Hat's private key. The kernel will be configured to load only kernel  
> modules that are also signed by Red Hat's private key. OEMs that supply OEM  
> binary blobs, for stuff like RAID cards, etc, that are certified with RHEL,  
> will get Red Hat to sign their kernel modules for them, also for a token  
> certification key. That's the hood, welded shut, that's absolutely mandatory  
> for a secured bootloader to have any logical purpose, whatsoever.

Correct - and you need to lock it down way more than that. Also I can't
see Red Hat directly signing third party binary blobs. If it does that it
implicitly believes they are lawful and also acquires some liability for
them in they malfuction.

> Fedora is not going to be a part of this. In order to boot Fedora, it will  
> be necessary to disable the secure bootload, on the hardware.

It will be up to the Fedora Board to stop Red Hat corrupting the goals of
the Fedora project in this way - or if they won't for people who dislike
it to dump Fedora - particularly package maintainers.

Alan
-- 
users mailing list
users@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe or change subscription options:
https://admin.fedoraproject.org/mailman/listinfo/users
Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines
Have a question? Ask away: http://ask.fedoraproject.org


[Index of Archives]     [Older Fedora Users]     [Fedora Announce]     [Fedora Package Announce]     [EPEL Announce]     [EPEL Devel]     [Fedora Magazine]     [Fedora Summer Coding]     [Fedora Laptop]     [Fedora Cloud]     [Fedora Advisory Board]     [Fedora Education]     [Fedora Security]     [Fedora Scitech]     [Fedora Robotics]     [Fedora Infrastructure]     [Fedora Websites]     [Anaconda Devel]     [Fedora Devel Java]     [Fedora Desktop]     [Fedora Fonts]     [Fedora Marketing]     [Fedora Management Tools]     [Fedora Mentors]     [Fedora Package Review]     [Fedora R Devel]     [Fedora PHP Devel]     [Kickstart]     [Fedora Music]     [Fedora Packaging]     [Fedora SELinux]     [Fedora Legal]     [Fedora Kernel]     [Fedora OCaml]     [Coolkey]     [Virtualization Tools]     [ET Management Tools]     [Yum Users]     [Yosemite News]     [Gnome Users]     [KDE Users]     [Fedora Art]     [Fedora Docs]     [Fedora Sparc]     [Libvirt Users]     [Fedora ARM]

  Powered by Linux