Re: future of dual booting Windows and Fedora, redux

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



* Vitaly Zaitsev via devel:

> On 26/07/2022 20:05, Chris Murphy wrote:
>> Summary: Windows 10/11 increasingly enables Bitlocker (full disk encryption) out of the box with the encryption key sealed in the TPM. Two different issues result:
>
> Microsoft has published a new security bulletin on the current state
> of Secure Boot:
> https://docs.microsoft.com/en-us/windows/security/information-protection/secure-the-windows-10-boot-process
>
> The most important note:
>
>> Secured-core PCs require Secure Boot to be enabled and configured to distrust the Microsoft 3rd Party UEFI CA signature, by default, to provide customers with the most secure configuration of their PCs possible.
>
> TL;DR. The new certified by Microsoft devices will be able to load
> only Microsoft Windows in the UEFI Secure Boot enabled mode.
>
> "Microsoft <3 Linux", "Microsoft is a friend", "Microsoft has
> changed", - they said.

But they also say this:

| The default state of Secure Boot has a wide circle of trust which can
| result in customers trusting boot components they may not need. Since
| the Microsoft 3rd Party UEFI CA certificate signs the bootloaders for
| all Linux distributions, trusting the Microsoft 3rd Party UEFI CA
| signature in the UEFI database increase[]s the attack surface of
| systems. A customer who intended to only trust and boot a single Linux
| distribution will trust all distributions–much more than their desired
| configuration.

And this is an accurate description of the situation. 

Unfortunately, Fedora promoted this broken model with pervasive
cross-distribution/cross-OS trust as well.  People are generally quick
to criticize those who control a PKI, but very few organizations are
willing to step up to hold the key material for the key of last resort
because of the risk inherent to that.  Consequently, pretty much all
distributions hide behind the Microsoft key, instead of running their
own PKI and working with OEMs to get it accepted by the firmware.

I wonder if this Secure Boot interoperability failure is the result of
using PKI in a situation where it is really not applicable.  Based on a
shim/first-stage boot loader, Microsoft cannot really tell what it will
boot eventually, and no meaningful security review is possible.  It
doesn't help that Microsoft does not embed the name of the party who
submitted an UEFI driver for signing in the signature itself.  (If
Microsoft is able to authenticate driver authors properly, this would
allow the firmware to provide an informative prompt for unknown boot
loaders.)

Maybe the answer to that this issue is to have a minimal
(cross-distribution) boot loader that displays the SHA-256 hash of
second-stage boot loaders (requiring physical presence before booting),
and offer to to enrol their hashes for future automated boots (similar
to SSH's leap-of-faith authentication).  The second stage boot loader
can have a long-term distribution-specific key embedded in it and is
also supposed to be minimal, so that distribution upgrades do not
require re-enrollment of the per-distribution boot loader.

I doubt it will be acceptable to Linux distributions, though.  People
taught Linux to extract public keys from signed UEFI binaries in an
attempt to avoid runnig their own PKI.  And if Microsoft drastically
cuts back signing services (because the new model doesn't need Microsoft
signatures anymore), they would no longer be able to offload which Linux
kernel module authors to trust to Microsoft.

Thanks,
Florian
_______________________________________________
devel mailing list -- devel@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to devel-leave@xxxxxxxxxxxxxxxxxxxxxxx
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/devel@xxxxxxxxxxxxxxxxxxxxxxx
Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure




[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Fedora Announce]     [Fedora Users]     [Fedora Kernel]     [Fedora Testing]     [Fedora Formulas]     [Fedora PHP Devel]     [Kernel Development]     [Fedora Legacy]     [Fedora Maintainers]     [Fedora Desktop]     [PAM]     [Red Hat Development]     [Gimp]     [Yosemite News]

  Powered by Linux