LWN.net Logo

Garrett: Secure Boot and Restricted Boot

Garrett: Secure Boot and Restricted Boot

Posted Mar 27, 2013 17:53 UTC (Wed) by zdzichu (subscriber, #17118)
In reply to: Garrett: Secure Boot and Restricted Boot by mjg59
Parent article: Garrett: Secure Boot and Restricted Boot

Like Surface Pro tablet? I suppose it isn't Windows 8 certified, which is amusing for product by Microsoft.


(Log in to post comments)

Garrett: Secure Boot and Restricted Boot

Posted Mar 27, 2013 17:56 UTC (Wed) by mjg59 (subscriber, #23239) [Link]

You've verified that it doesn't let you return to setup mode?

Garrett: Secure Boot and Restricted Boot

Posted Mar 27, 2013 18:54 UTC (Wed) by dpquigl (subscriber, #52852) [Link]

From what I understand Surface Pro Tablets are Windows RT devices. They are ARM processors and the secure boot standard doesn't allow for ARM devices to turn off the secure boot functionality. However this isn't any different from the rest of the embedded world. Jail breaking a device and removing the security check doesn't make it any more free. You needed to exploit your device just to do what you wanted to.

Garrett: Secure Boot and Restricted Boot

Posted Mar 27, 2013 19:01 UTC (Wed) by mjg59 (subscriber, #23239) [Link]

You understand incorrectly. Surface RT devices are ARM and run Windows RT. Surface Pro devices are x86 and run Windows 8.

Garrett: Secure Boot and Restricted Boot

Posted Apr 3, 2013 12:40 UTC (Wed) by xilun (subscriber, #50638) [Link]

> Windows RT devices. They are ARM processors and the secure boot standard doesn't allow for ARM devices to turn off the secure boot functionality.

s/secure boot standard/Microsoft/

And given this arbitrary restriction (which makes no sense from the security POV, installing system software on a tablet being already arguably more difficult than on a fully featured computer): s/secure boot/restricted boot/

Garrett: Secure Boot and Restricted Boot

Posted Apr 3, 2013 15:18 UTC (Wed) by hummassa (subscriber, #307) [Link]

I find it funny -- strike that.
I find it HILARIOUS when people try to make a distinction between "secure" boot and "restricted boot". The infrastructure is the same, only varying the degree of control that Theoretically the end user has over the keys used to sign the bootloader and the loaded OS.

Garrett: Secure Boot and Restricted Boot

Posted Apr 3, 2013 16:34 UTC (Wed) by raven667 (subscriber, #5198) [Link]

Isn't the question of who controls policy the fundamental difference between beneficial security technology (firewalls, encryption, IDS, integrity checking, etc.) and oppressive security technology (firewalls, encryption, IDS, integrity checking, etc.) ? It seems that you are arguing that all security technology is bad because it can be used for bad things, a position usually held by authoritarians (who would of course retain all the security technology for their own use), although I doubt you belong to that group.

Garrett: Secure Boot and Restricted Boot

Posted Apr 3, 2013 18:11 UTC (Wed) by hummassa (subscriber, #307) [Link]

> It seems that you are arguing that all security technology is bad because it can be used for bad things

No, that is not what I am arguing at all. I am arguing specifically (for some time now) that:

1. "secure" boot technology is not secure at all; and
2. that anything beyond "make grub* be loaded, to load whatever I want after" is a waste of time and effort AND a collaboration with microsoft's efforts to keep linux out of the next generation of PCs|tablets|whatever_gadgets coming.

* substitute for favorite|possible bootloader here

Garrett: Secure Boot and Restricted Boot

Posted Apr 3, 2013 19:24 UTC (Wed) by raven667 (subscriber, #5198) [Link]

> 1. "secure" boot technology is not secure at all;

In what way is this architecture for simple integrity checking of the boot firmware and boot loader insecure against remote unauthorized attackers modifying the firmware or boot loader to hide and persist their root kits? The only attack surface I can see is the code which reads config variables which are under the possible control of an attacker, and I'm sure that code is limited and could be audited or fixed in the field to close any holes which are discovered.

Other application-security issues (buffer overflows in the browser or OS) are really not what this is about and no one is pretending that this is a miracle cure for unrelated security problems.

> 2. that anything beyond "make grub* be loaded, to load whatever I want after" is a waste of time and effort AND a collaboration with microsoft's efforts to keep linux out of the next generation of PCs|tablets|whatever_gadgets coming.

So any integrity checking of the kernel by the bootloader or of userspace by the kernel, none of which is defined by UEFI Secure Boot, is a bad thing? Is tripwire or AIDE a bad thing too? The whole point of the shim is to have total control over what boots after and to still allow you to verify that it hasn't been modified without your permission. A local user can trojan their own system if they want, I guess, Secure Boot won't attempt to stop them, but a remote attacker won't be able to do so from the running OS. At least that's the intent.

I don't see how MS is keeping Linux off the next generation of PCs when they already signed a boot loader that can boot any Linux system on a PC. As far as other gadgets, they are a mix of open and restricted devices, and no one is arguing against fighting boot-locking whenever it is encountered, MS isn't unique in this regard, most of the boot locked devices run Linux.

Garrett: Secure Boot and Restricted Boot

Posted Apr 3, 2013 21:41 UTC (Wed) by paulj (subscriber, #341) [Link]

When the kernel is insecure, when user-space is unlikely to be any better, why on earth would a rootkit *need* to modify the firmware? **ALL** it needs to do is arrange for an exploit to run early during boot. That exploit needn't even involve modifying any system binaries, if it can just exploit a bug in reading some data (which there are surely plenty - how well do,e.g., config file parsers get tested for security bugs?).

A "Secure" boot of utterly insecure software is meaningless.

Garrett: Secure Boot and Restricted Boot

Posted Apr 3, 2013 22:08 UTC (Wed) by raven667 (subscriber, #5198) [Link]

That is one opinion, but the kernel and userspace will never be any better or more secure than they are today and some people aren't willing to just throw up their hands and accept insecurity as the normal state of affairs without trying to do something about it. What you describe is correct, an exploit can be driven from config read during early boot, or attacker supplied code that exploits the system but the attack surface of config parsers is fairly small and well defined while the point where attacker supplied code can be run can be pushed later and later in the boot process via nested signature checking. Even in the case of an thoroughly compromised system the update process can be blocked but not modified so that the holes can be closed as they are found, leaving a working system which can be more reliably cleaned. Secure Boot gives you a small beachhead with which you have the opportunity to retake control of your system from a remote attacker, nothing more.

Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds